Digital Image Security

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Digital Image Security: using different cryptographic

techniques and algorithms.


Deep Dilip Nandu
Computer Engineering Department
Shah and Anchor Kutchhi Engineering College
Mumbai.
deep.nandu@sakec.ac.in

Abstract— Nowadays digital images are widely used to information's true meaning. The science or process of
communicate over the internet. This paper is mainly based on encrypting and decrypting information is
different cryptographic techniques used while communicating
with someone over network. The security of these images is a
called cryptography. In encryption the process of
crucial task on the communication channel. A digital image is a encryption the unencrypted data is called plain text and
representation of a real image as a set of numbers that can be the coded or encrypted data is called cipher text. The
stored and handled by a digital computer. In order to translate process or formulas that are used to encrypt and decrypt
the image into numbers, it is divided into small areas called pixels the data are known as the encryption algorithms or
(picture elements). For each pixel, the imaging device records a
number, or a small set of numbers, that describe some property ciphers.
of this pixel, such as its brightness (the intensity of the light) or its For the encryption algorithms to function effectively
colour. To achieve the goals of the security the CIA i.e. there is a variable that is a part of the algorithm. The
confidentiality, integrity, availability various methods are used to variable is called the key, the key is what makes the
secure these digital images such as encryption, steganography
and watermarking. This paper presents a survey of different
ciphers output unique. When an intruder intercepts the
image security techniques and algorithms that have been encrypted message from a particular sender, the intruder
previously proposed. It also provides various aspects used for the has to guess the encryption algorithm used by the user
image security. and also the key used for the encryption. Guessing the
correct variables for this is not easy and it is time
Keywords— security, CIA, steganography, watermarking.
consuming that makes encryption an asset.
There are two types of encryption: -
Symmetric Encryption: Here we use a single key which
I. INTRODUCTION is by the sender to encrypt the message and is shared
The recent growth of networked multimedia systems has among all the authorized systems to decrypt the
increased the need for the protection of digital media. message. This is also known as secret key encryption.
This is particularly important for the protection and Example: AES (advanced encryption standard).
enforcement of intellectual property rights. Digital
media includes text, digital audio, images, video and Asymmetric Encryption: This is also known as public
software. The purpose of the image security is to protect key encryption. This uses two different types of keys a
the unauthorized users from accessing the data of the public and a private key they are different but logically
data. The application of image encryption and video linked. These encryptions often use prime numbers to
encryption are there in various fields such as internet create the keys. Example: RSA.
communication, multimedia systems, medical imaging,
Tele-medicine and military communication.
There are many techniques to secure images including
encryption, watermarking, digital watermarking,
reversible watermarking, cryptography, steganography
etc. In this paper a review on encryption, steganography
and watermarking is presented.
Encryption: Encryption is the method by which
information is converted into secret code that hides the
II. LITERATURE SURVEY
Steganography:
The art and science of hiding information by embedding A. A new image encryption based on hyper chaos, 2008
messages within other, seemingly harmless messages. This method proposed by Gao and Cheng uses hyper
Steganography works by replacing bits of useless or chaos to encrypt the image. This encryption is divided
unused data in regular computer files (such as graphics, into two parts the first part contains total shuffling of the
sound, text, HTML, or even floppy disks) with bits of image pixels, the second part the shuffled part is
different, invisible information. This hidden information encrypted using hyper chaos. The hyper chaos is used to
can be plain text, cipher text, or even images. change the gray values of the image pixels. In the first
Steganography sometimes is used when encryption is part row transformation based on logistic map, using
not permitted. Or, more commonly, steganography is which the plain image is shuffled. After the shuffling of
used to supplement encryption. An encrypted file may the pixel’s encryption is done but the histogram of the
still hide information using steganography, so even if the image does not change it remains same as original
encrypted file is deciphered, the hidden message is not image.
seen. Special software is needed for steganography, and
there are freeware versions available at any good B. An Image Encryption and Authentication scheme,
download site. Steganography (literally meaning covered 2011
writing) dates back to ancient Greece, where common The scheme was proposed by Jing Qiuand ping Wang.
practices consisted of etching messages in wooden This method presents a fast image encryption and
tablets and covering them with wax, and tattooing a authentication scheme. In the scheme, a 512-bit message
shaved messenger's head, letting his hair grow back, then authentication code (MAC) of the plain image is
shaving it again when he arrived at his contact point. converted into 64 bytes and these 64 bytes are replaced
Watermarking: - with the image pixels in some way. Replaced pixels are
In digital watermarking technique a watermark signal or then embedded into the image by reversible data
mark is embedded into the source that should be embedding technique. Then the embedded image is
protected from unauthorized use. Watermark technique masked by pseudo random sequence in feedback mode.
is used for copyright protection that has evolved with This code provides encryption and authentication to the
time. This is done to verify the credibility of the user or image.
to identify the identity of the digital content’s owner. It C. Image cryptography: The Genetic Algorithm
can also be used for hidden communication, source Approach, 2011
tracking. The publishers of some magazines used an
The genetic algorithm approach was proposed by Sandeep
invisible watermark to prevent their content from being
Bhowmik and Sriyanker Acharya. In this approach, the
used illegally at unauthorized websites. Genetic algorithm an important method of artificial
TYPES OF WATERMARKING: intelligence has been applied to generate ‘key’ for the
 Visible watermark encryption algorithm. In this work a hybridized technique
Visible watermarking technique generate a visible logo called BlowGA is used which is a combination of Blowfish
or symbol that clearly seen on watermarked image. This and GA. This new approach has outperformed the result both
type of watermark used for showing the ownership of Blowfish and GA separately.
content like TV channel. D. An Encryption and Decryption Algorithm for Image
 Invisible Watermark Based on DNA
This type of watermark is used to find the ownership as
In 2013, a color image encryption algorithm based on
well as prevention from authorized application of image
DNA sequence function and hyper chaotic system was
or content. Here, a watermark can insert information into
proposed. In this paper hyper chaotic system is used to
an image which cannot be seen but can be interrogated
scramble the pixel positions then the data of the colored
with the watermark extraction algorithm.
image is converted into three matrices of R, G, and B
 Robust Watermark
which are then converted into binary matrices and DNA
Robustness watermarking scheme is used for sign
addition operation is performed. The experimental
copyright information of the digital works, the
results and the security analysis show that the algorithm
embedded watermark can resist the common edit
has good encryption effect larger secret key space and
processing and various attacks.
high sensitivity to the secret key.
III. CONCLUSION III. Image Encryption using Different Techniques for
High Security Transmission over a Network
International Journal of Engineering Research and
In the digital world these days, the security of the digital General Science Volume 2, Issue 4, June-July 2014
image is essential and of paramount importance. Image ISSN 2091-2730
are used in many applications in our daily lives. The IV. Digital Image Security: Fusion of Encryption,
security within transfer of information is critical. Steganography and Watermarking (IJACSA)
Various techniques such as encryption, steganography International Journal of Advanced Computer Science
etc. has been evolved over the years the efficiency and and Applications, Vol. 8, No. 5, 2017
energy consumption associated with these techniques V. R. J. Chen, and J. L. Lai. "Image security system
still require improvement. Hence it is necessary to using recursive cellular automata substitution",
acknowledge the integrity and the confidentiality of the Pattern Recognition, vol. 40, pp. 1621-1631, 2007.
VI. M. A. F. Al-Husainy, "A novel encryption method
digital image that is being transmitted over the network.
for image security", International Journal of Security
Some of the image encrypting techniques and algorithms and Its Applications, Vol. 6, No. 1, pp. 1-8, 2012.
are discussed that play crucial role in image VII. TiegangGao, Zengqiang Chen, “A new image
transmission. All the techniques and algorithms are encryption algorithmbased on hyper-chaos”, Physics
unique and have effective application. In this paper we Letters A 372 (2008) 394–400.
studied some conventional cryptographic techniques that VIII. Jing Qiu and Ping Wang, “Image encryption and
provide high security rate. authentication scheme”, IEEE, Computational
Intelligence and Security (CIS), 2011 Seventh
IV. REFERENCES International Conference, 3-4 Dec. 2011, 784 – 787.
IX. SandeepBhowmik and SriyankarAcharya, “Image
I. Image Cryptography: A Survey towards its Growth in Cryptography: The Genetic Algorithm Approach”,
Advance in Electronic and Electric Engineering ISSN IEEE, 2011,978-1-4244-8728-8.
2231-1297, Volume 4, Number 2 (2014), pp. 179-184 X. RanuSoni, Arunjohar and vishakhasoni, “An
II. Study of security enhancement strategies in digital Encryption and Decryption Algorithm for Image
image processing International Journal of Advance Based on DNA”, IEEE, 2013,978-0-7695-4958-3/13.
Research in Science and Engineering volume no.6,
special issue no.3

You might also like