scholarly journals Securing Digital Color Image based on Hybrid Substitution Cipher

2020 ◽  
Vol 4 (2) ◽  
pp. 86-95
Author(s):  
Moch Sjamsul Hidajat ◽  
Ichwan Setiarso

This study proposes securing digital color images with hybrid substitution cryptographic methods combined with the Vigenere and Beaufort methods. The hybrid process is carried out using the help of two randomly generated keys. The first key is a matrix with an 8-bits value and the second key is a matrix with a binary value. The binary key is used to determine the Vigenere or Beaufort process, while the 8-bit key is used for modulus operations based on the Vigenere or Beaufort algorithm. At the test stage used a standard image that has an RGB color channel as a dataset. The quality of the cryptographic method is measured by several measuring instruments such as MSE, PSNR, and SSIM to determine the quality of encryption visually and the perfection of decryption, besides that it is used Entropy, NPCR and UACI to determine the probability of encryption resistance and quality against differential attacks. The TIC TOC function is also used to measure the computing speed of the encryption and decryption process. Measurement results using all measuring instruments indicate that the proposed method has very satisfying results and has fast computing. Keywords – Cryptography, Substitution Cipher, Modulus Function, Encryption, Decryption, Image Transmission 

2019 ◽  
Vol 8 (3) ◽  
pp. 7674-7679

This objective of this paper is primarily focused on RGB color and Gray scale color based key positioning steganography which has been used to overcome the disadvantages of the Least Significant Bit replacement algorithm and helps to embed the audio data in the color images. The given audio data of various sizes is used to embed in the green color channel of the 24 bit color image sequentially by the key based LSB positioning algorithm. Here the audio threshold is another major area where the focus has been laid as increasing the size of the audio data[26] which can be sent through an image without losing the quality of the audio. This method of hiding the audio data through an image helps to authenticate the sender[25] and verifies whether the data has been really sent to the valid user or is used to prevent morphed secret details by the attacker in the middle. The proposed algorithm has been tested against various existing algorithm to study how effectively the algorithm is working, and how effectively it overcomes the drawbacks of the present algorithms. The algorithm is scalable to serve the purpose of authenticating the different demographical region users living all over world and also to identify that the message is reaching only to the valid user[31].


Author(s):  
Rana Saad Mohammed ◽  
Khalid Kadhim Jabbar ◽  
Hussien Abid Hilal

Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, the quality of the resulting image, and the time consumed. On the other hand, dealing with the color image under the spatial domain in this filed is considered as another challenge added to the proposed method that make it sensitivity and difficulty. The proposed method aims to encode a color image by dealing with the main color components of the red (R), green (G), and blue (B) components of a color image to strengthen the dependence of each component by modifying a two dimensional logistic- sine coupling map (2D- LSCM). This is to satisfy the statistical features and reduce time-consumption, and benefit from a mixing step of the second of advanced encryption standard (AES) candidates (serpent block cipher) and modified it to achieve in addition of confusion and diffusion processes. The experimental results showed that our proposed method had the ability to resist against statistical attacks and differential attacks. It also had a uniform histogram, a large key space, complex and faster, closer Shannon entropy to 8, and low correlation values between two adjacent pixels compared with other methods.


2019 ◽  
Vol 9 (3) ◽  
pp. 4165-4168 ◽  
Author(s):  
M. O. Al-Dwairi ◽  
A. Y. Hendi ◽  
Z. A. AlQadi

Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.


2018 ◽  
Vol 7 (3.13) ◽  
pp. 104 ◽  
Author(s):  
Musbah J. Aqel ◽  
Ziad ALQadi ◽  
Ammar Ahmed Abdullah

Digital RGB color images are considered as the most widely used data type through the internet, so there is a need for efficient and secure techniques to transmit and protect these digital images and this is a matter of high priority process. Many researchers had developed different techniques to increase the security of image transmission, and most of these techniques suffer from the low speed of the encryption-decryption process. In this paper, a novel technique is proposed that could be used for digital color image encryption-decryption. The performance of this technique is compared with the performance of other techniques and it has shown the advantages of using this technique over other techniques in enhancing the throughput and speed of encryption-decryption process. 


2008 ◽  
Vol 5 (1) ◽  
pp. 155-159
Author(s):  
Baghdad Science Journal

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP


Author(s):  
Benaïssa Mohamed ◽  
Bassou Abdesselam ◽  
Beladgham Mohammed ◽  
Taleb Ahmed Abdelmalik ◽  
Moulay Lakhdar Abdelmounaim

Author(s):  
Ashish Dwivedi ◽  
Nirupma Tiwari

Image enhancement (IE) is very important in the field where visual appearance of an image is the main. Image enhancement is the process of improving the image in such a way that the resulting or output image is more suitable than the original image for specific task. With the help of image enhancement process the quality of image can be improved to get good quality images so that they can be clear for human perception or for the further analysis done by machines.Image enhancement method enhances the quality, visual appearance, improves clarity of images, removes blurring and noise, increases contrast and reveals details. The aim of this paper is to study and determine limitations of the existing IE techniques. This paper will provide an overview of different IE techniques commonly used. We Applied DWT on original RGB image then we applied FHE (Fuzzy Histogram Equalization) after DWT we have done the wavelet shrinkage on Three bands (LH, HL, HH). After that we fuse the shrinkage image and FHE image together and we get the enhance image.


Author(s):  
Inmaculada Méndez ◽  
Esther Secanilla ◽  
Juan P. Martínez ◽  
Josefa Navarro

In a global approach about the need of paying attention to staff working with and for older people with dementia and other diseases in residential care, it is necessary to investigate their emotional well-being to provide strategies to improve their quality of life and therefore their quality of patient care. Professional caregivers of people with dementia and other diseases have specific psycho-sociological problems. They are more prone to stress which can sometimes lead to the “burnout” due to specific functions in the workplace. To define the sample was decided to compare two residential centers of two regions, Murcia and Barcelona. We proceeded to the administration of the following measuring instruments: the scale Maslach Burnout Inventory (MBI) and an ad hoc survey conducted for professional caregivers. Finally, the results offer the possibility of carrying out programs to prevent emotional exhaustion in professional carers, as well as the possibility of designing psychoeducational programs for staff care and even future proactive and reactive interventions.


1989 ◽  
Vol 4 (2) ◽  
pp. 117-122 ◽  
Author(s):  
J.-F. Dreyfus ◽  
D. Cremniter ◽  
J.D. Guelfi

SummaryWe are still confronted by numerous different nosographic models and problems concerning the objective evaluation of patients progress during treatment. It is interesting to consider the consequences of this situation in psychiatry which still involves a relative diversity of practical methods used in clinical trials. The recommendations of the USA Food and Drug Administration, on the one hand, constitute a highly structured and precise reference. The World Health Organization, on the other hand, promulgates general recommendations resulting from a compromise designed to satisfy the greatest number of clinicians.Despite the apparently diverse principles and the different practical methods they propose, both those sets of recommendations have been useful in inspiring clinicians to reflect upon these different methodological approaches. The qualities of the inclusion criteria used in the study of patients and the sensitivity of the different measuring instruments have allowed psychotropic drug users as well as producers to recognize the need for a certain rigour in clinical trials.The FDA and WHO guidelines have certainly improved the quality of clinical trials in psychopharmacology. However, they also represent a source of resistance to innovation.A series of consensus meetings to first reconcile US and European points of view and later to include new techniques in the recognized sets of methods would therefore be helpful.


Sign in / Sign up

Export Citation Format

Share Document