Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function

Print
PDF
IJCA Proceedings on International conference on Green Computing and Technology
© 2013 by IJCA Journal
ICGCT - Number 2
Year of Publication: 2013
Authors:
Smita R. Chunamari
D. G. Borse

Smita R Chunamari and D G Borse. Article: Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function. IJCA Proceedings on International conference on Green Computing and Technology ICGCT(2):39-45, October 2013. Full text available. BibTeX

@article{key:article,
	author = {Smita R. Chunamari and D. G. Borse},
	title = {Article: Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function},
	journal = {IJCA Proceedings on International conference on Green Computing and Technology},
	year = {2013},
	volume = {ICGCT},
	number = {2},
	pages = {39-45},
	month = {October},
	note = {Full text available}
}

Abstract

In post globalization era of computer networks and communication, image and video plays a significance role; rather the fashion of text based systems will be replaced by the image based system. The associated threats and challenges related to image security and its authentication is an active research issues. In order to ensure a full proof security mechanism for image the notion of message authentication code for data authentication and notion of encryption for preserving confidentiality need to be combined. In this paper a complete frame work of crypto-system has been proposed, where the parameterization of hash value of encrypted image is done in such a way that it should be exactly same with zero difference error of hash value that of the parent unencrypted original image. It will have enormous scope into various medical imaging systems where privacy preservation is an important issue. Designing parametric hashing algorithm, which is invariant to encryption only by accepting small part of statistical signature of the original unencrypted image to emerge despite the encryption process is a non trivial task. The proposed work formulates authentication of encrypted data by using notion of authentication code and a novel but yet simple hashing algorithm which are usable with encrypted image s. The implementation results of various images, where the hash value is being computed without the decryption of the original input image, thus validates the authentication without compromising the privacy information. Since the hash value is computed without decrypting the original data, one can prove authenticity without actually revealing the information.

References

  • O. S. Faragallah, Utilization of Security Techniques for Multimedia Applications , Ph. D. Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, 2007.
  • A. J. Menezes, P. C. V. Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press Boca Raton,USA, 1996.
  • L. Qiao, Multimedia Security and Copyright Protection , Ph. D. Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, Illinois, USA, 1998.
  • W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice- Hall Upper Saddle River, USA, 1999.
  • C. E. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715, October 1949.
  • S. Li, G. Chen and X. Zheng, Chaos-Based Encryption for Digital Images and Videos, Chapter 4 in Multimedia Security Handbook, CRC Press LLC, February 2004.
  • Y. Mao and M. Wu, A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption, IEEE Transactions on Image Processing, Vol. 15, No. 7, pp. 2061-2075, July 2006.
  • Y. Mao, Research on Chaos-Based Image Encryption and Watermarking Technology, Ph. D. Thesis, Department of Automatation, Nanjing University of Science & Technology, Nanjing, China, August 2003.
  • J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, 1999.
  • R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6TM Block Cipher , M. I. T laboratory for Computer Science, 545 Technology Square, Cambridge, MA 02139, USA, 1998.
  • R. F. Sewell, Bulk Encryption Algorithm for Use with RSA , Electronics Letters , Vol. 29, No. 25, pp. 2183-2185, 9 Dec. 1993.
  • H. E. H. Ahmed, H. M. Kalash, and O. S. Faragallah, Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , International Conference on Electrical Engineering (ICEE '07), pp. 1-7, 11-12 April 2007.
  • Z. Lv, L. Zhang, and J. Guo, "A Symmetric Image Encryption Scheme Based on Composite Chaotic Dispersed Dynamics System," Proc. Of Second Symposium on Computer Science and Computational Technology, pp. 191–194, 2009.
  • M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki, ?A Modified AES Based Algorithm for Image Encryption?, World Academy of Science, Engineering and Technology 27 2007.
  • Mohammad Ali Bani Younes and Aman Jantan ?Image Encryption Using Block-Based Transformation Algorithm? IAENG International Journal of Computer Science, 35,2008.
  • Mohammad Ali Bani Younes and Aman Jantan, ?An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption?, IJCSNS International Journal of Computer Science and Network Security, VOL. 8 , April 2008.
  • Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen?, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008.
  • Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, Image Encryption Using Advanced Hill Cipher Algorithm, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009.
  • Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, Digital image encryption algorithm based on chaos and improved DES?, IEEE International Conference on Systems, Man and Cybernetics, 2009.
  • Kamali, S. H. , Shakerian, R. , Hedayati, M. ,Rahmani, M. , A new modified version of Advance Encryption Standard based algorithm for image encryption, Electronics and Information Engineering (ICEIE), 2010 International Conference.
  • Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar, ?Image Encryption Using Affine Transform and XOR Operation?, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011).
  • Sesha Pallavi Indrakanti, P. S. Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No. 8, 2011.
  • Kuldeep Singh, Komalpreet Kaur, Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it?, International Journal of Computer Applications (0975 – 8887) Volume 23– No. 6, June 2011.
  • Qais H. Alsafasfeh , Aouda A. Arfoa, Image Encryption Based on the General Approach for Multiple Chaotic Systems, Journal of Signal and Information Processing, 2011.
  • Ibrahim S I Abuhaiba, Maaly A S Hassan, ?Image Encryption Using Differential Evolution Approach In Frequency Domain? Signal & Image Processing: An International Journal (SIPIJ) Vol. 2, No. 1, March 2011.
  • Tariq Shah, Iqtadar Hussain, Muhammad Asif Gondal , Hasan Mahmood, Statistical analysis of S-box in image encryption applications based on majority logic criterion, International Journal of the Physical Sciences Vol. 6(16), pp. 4110-4127, 18 August, 2011