A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA

Fractals ◽  
2017 ◽  
Vol 25 (01) ◽  
pp. 1750011
Author(s):  
D. C. MISHRA ◽  
HIMANI SHARMA ◽  
R. K. SHARMA ◽  
NAVEEN KUMAR

In this paper, we present a novel technique for security of two-dimensional data with the help of cryptography and steganography. The presented approach provides multilayered security of two-dimensional data. First layer security was developed by cryptography and second layer by steganography. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. This paper proposes a novel approach for encryption and decryption of information in the form of Word Data (.doc file), PDF document (.pdf file), Text document, Gray-scale images, and RGB images, etc. by using Vigenere Cipher (VC) associated with Discrete Fourier Transform (DFT) and then hiding the data behind the RGB image (i.e. steganography). Earlier developed techniques provide security of either PDF data, doc data, text data or image data, but not for all types of two-dimensional data and existing techniques used either cryptography or steganography for security. But proposed approach is suitable for all types of data and designed for security of information by cryptography and steganography. The experimental results for Word Data, PDF document, Text document, Gray-scale images and RGB images support the robustness and appropriateness for secure transmission of these data. The security analysis shows that the presented technique is immune from cryptanalytic. This technique further provides security while decryption as a check on behind which RGB color the information is hidden.

2018 ◽  
Vol 18 (04) ◽  
pp. 1850020
Author(s):  
Himani Sharma ◽  
D. C. Mishra ◽  
R. K. Sharma ◽  
Naveen Kumar

Conventional techniques for security of data, designed by using only one of the security mechanisms, cryptography or steganography, are suitable for limited applications only. In this paper, we propose a crypto-stego system that would be appropriate for secure transmission of different forms of data. In the proposed crypto-stego system, we present a mechanism to provide secure transmission of data by multiple safety measures, firstly by applying encryption using Affine Transform and Discrete Cosine Transform (DCT) and then merging this encrypted data with an image, randomly chosen from a set of available images, and sending the image so obtained to the receiver at the other end through the network. The data to be sent over a communication channel may be a gray-scale or colored image, or a text document (doc, .txt, or .pdf file). As it is encrypted and sent hidden in an image, it avoids any attention to itself by the observers in the network. At the receiver’s side, reverse transformations are applied to obtain the original information. The experimental results, security analysis and statistical analysis for gray-scale images, RGB images, text documents (.doc, .txt, .pdf files), show robustness and appropriateness of the proposed crypto-stego system for secure transmission of the data through unsecured network. The security analysis and key space analysis demonstrate that the proposed technique is immune from cryptanalysis.


Author(s):  
D. C. Mishra ◽  
R. K. Sharma

In this cryptosystem, we have considered RGB images for two-dimensional (2D) data security. Security of RGB images during transmission is a major concern, discussed globally. This paper proposes a novel technique for color image security by random hill cipher (RHC) over SLn(𝔽) domain associated with 2D discrete wavelet transform. Existing techniques have discussed the security of image data on the basis of the keys only (which provide only one layer of security for image data), but in the proposed cryptosystem, the keys and the arrangement of RHC parameters are imperative for correct decryption of color image data. Additionally, key multiplication side (pre or post) with the RGB image data should inevitably be known, to correctly decrypt the encrypted image data. So, the proposed cryptosystem provides three layers of security for RGB image data. In this approach, we have considered keys from the special linear group over a field 𝔽, which provides enormous key-space for the proposed cryptosystem. A computer simulation on standard examples and results is given to support the fixture of the scheme. Security analysis, and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique. This method will have large potential usage in the digital RGB image processing and the security of image data.


Author(s):  
Jesús Benito-Picazo ◽  
Ezequiel López-Rubio ◽  
Enrique Domínguez

Although last improvements in both physical storage technologies and image handling techniques have eased image managing processes, the large amount of information handled nowadays constantly demands more efficient ways to store and transmit image data streams. Among other alternatives for such purpose, the authors find color quantization, which consists of color indexing for minimal perceptual distortion image compression. In this context, artificial intelligence-based algorithms and more specifically, Artificial Neural Networks, have been consolidated as a powerful tool for unsupervised tasks, and therefore, for color quantization purposes. In this work, a novel approach to color quantization is presented based on the Growing Neural Forest (GNF), which is a Growing Neural Gas (GNG) variation where a set of trees is learnt instead of a general graph. Experimental results support the use of GNF for image quantization tasks where it overcomes other self-organized models including SOM, GHSOM and GNG. Future work will include more datasets and different competitive models to compare to.


2021 ◽  
Vol 2021 ◽  
pp. 1-23
Author(s):  
Shanshan Li ◽  
Li Zhao ◽  
Na Yang

For the security of medical image, a new algorithm of medical image encryption is designed. The novel algorithm is based on a chaotic system composed of the two-dimensional Sine Logistic modulation map (2D-SLMM) and the two-dimensional Hénon-Sine map (2D-HSM). The main encryption procedure includes zigzag scan scramble, pixel grey value transformation, and dynamic diffusion. On the pixel grey value transformation stage, a password feedback is added. This makes the relationship between password and key more complicated. The proposed scheme is lossless for medical image encryption and decryption. It avoids the problems of low-dimensional chaotic map such as narrow interval and few parameters, as well as the problem of the special texture and contour of medical images. The key space of the novel algorithm is big enough, and the encryption and decryption processing are sensitive to the key. Simulation and experiments validate the effectiveness and efficiency of the novel algorithm. Security analysis proves the algorithm is resistant to common attacks.


Author(s):  
Nuchu Yeswanth Surya Srikar, Et. al.

: Quick Response Code is a machine-readable, two-dimensional barcode consisting of an array of black and white squares which can be scan quickly by any smartphone. It allows encoding over 4000 pulse characters in a two-dimensional barcode. It is used to store a small amount of information like web URL, item data, phone numbers and multimedia data. Due to restricted size in it, QR codes are presently limited in the extent to store the data. But the data in image format uses more space, if you want to store image data in QR code you must enlarge the storage capacity of QR code. In this paper, we propose a very simple form of lossy data compression, in which runs of data is dividing into blocks of equals size. The entire block is stored as a character rather than as the original run with generic HashMap which makes more robust and provides all sorts of security. Finally, our results are compared with other techniques to differentiate the optimality, efficiency of the new technique for producing optimal QR codes.


Robotica ◽  
2000 ◽  
Vol 18 (3) ◽  
pp. 299-303 ◽  
Author(s):  
Carl-Henrik Oertel

Machine vision-based sensing enables automatic hover stabilization of helicopters. The evaluation of image data, which is produced by a camera looking straight to the ground, results in a drift free autonomous on-board position measurement system. No additional information about the appearance of the scenery seen by the camera (e.g. landmarks) is needed. The technique being applied is a combination of the 4D-approach with two dimensional template tracking of a priori unknown features.


2021 ◽  
Vol 83 (1) ◽  
pp. 72-79
Author(s):  
O.A. Kan ◽  
◽  
N.A. Mazhenov ◽  
K.B. Kopbalina ◽  
G.B. Turebaeva ◽  
...  

The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been developed in the Python 3.5.2 programming language. A graphic file is used as the decryption key. Purpose: To develop an algorithm for embedding text information in random pixels of an image. Methods: Among the methods of hiding information in graphic images, the LSB method of hiding information is widely used, in which the lower bits in the image bytes responsible for color encoding are replaced by the bits of the secret message. Analysis of methods of hiding information in graphic files and modeling of algorithms showed an increase in the level of protection of hidden information from detection. Results and their significance: Using the proposed steganography scheme and the algorithm for embedding bytes of a secret message in a graphic file, protection against detection of hidden information is significantly increased. The advantage of this steganography scheme is that for decryption, a key image is used, in which random bytes are pre-embedded. In addition, the entire pixel bits of the container image are used to display the color shades. It can also be noted that the developed steganography scheme allows not only to transmit secret information, but also to add digital fingerprints or hidden tags to the image.


2018 ◽  
Vol 7 (3.6) ◽  
pp. 1 ◽  
Author(s):  
P Srilakshmi ◽  
Ch Himabindu ◽  
N Chaitanya ◽  
S V. Muralidhar ◽  
M V. Sumanth ◽  
...  

This paper proposed novel approach of image steganography for text embedding in spatial domain. In the proposed embedding the message is dumped into the image with reference to a random generated key, based on this key the extraction of text is done from the image. So this method is a highly secured from eavesdropping and highly complex to identify the text data in the image and retrieving the text message from the message is also a resilient process. The extraction is only possible when the key is known. 


Sign in / Sign up

Export Citation Format

Share Document