partial encryption
Recently Published Documents


TOTAL DOCUMENTS

85
(FIVE YEARS 11)

H-INDEX

11
(FIVE YEARS 0)

Author(s):  
G. Suseela ◽  
Y. Asnath Victy Phamila

Due to the significance of image data over the scalar data, the camera-integrated wireless sensor networks have attained the focus of researchers in the field of smart visual sensor networks. These networks are inexpensive and found wide application in surveillance and monitoring systems. The challenge is that these systems are resource deprived systems. The visual sensor node is typically an embedded system made up of a light weight processor, low memory, low bandwidth transceiver, and low-cost image sensor unit. As these networks carry sensitive information of the surveillance region, security and privacy protection are critical needs of the VSN. Due to resource limited nature of the VSN, the image encryption is crooked into an optimally lower issue, and many findings of image security in VSN are based on selective or partial encryption systems. The secure transmission of images is more trivial. Thus, in this chapter, a security frame work of smart visual sensor network built using energy-efficient image encryption and coding systems designed for VSN is presented.


Author(s):  
G. Suseela ◽  
Y. Asnath Victy Phamila

Due to the significance of image data over the scalar data, the camera-integrated wireless sensor networks have attained the focus of researchers in the field of smart visual sensor networks. These networks are inexpensive and found wide application in surveillance and monitoring systems. The challenge is that these systems are resource deprived systems. The visual sensor node is typically an embedded system made up of a light weight processor, low memory, low bandwidth transceiver, and low-cost image sensor unit. As these networks carry sensitive information of the surveillance region, security and privacy protection are critical needs of the VSN. Due to resource limited nature of the VSN, the image encryption is crooked into an optimally lower issue, and many findings of image security in VSN are based on selective or partial encryption systems. The secure transmission of images is more trivial. Thus, in this chapter, a security frame work of smart visual sensor network built using energy-efficient image encryption and coding systems designed for VSN is presented.


2020 ◽  
Vol 68 (11) ◽  
pp. 7201-7217
Author(s):  
Mehrshad Kafi ◽  
Sorina Dumitrescu

Encryption and Watermarking are image processing tools that are used mostly separately. Encrypting a document completely obscures it and watermarking is applied mostly for copy right protection. For entertainment type videos, partial encryption and watermarking may be integrated such that both objectives are attained. We report in this paper a novel combined partial encryption and watermarking algorithm for digital videos using chaotic system and support image. Watermarks are generated by using iris information of the authentic user or the authentic producer of the digital video. Watermarks of full size and half size are embedded in the luminance frame (s) of the video using simple LSB steganography. A sequence of color frames is watermarked in two phases, and partially encrypted in two layers, the watermarks considered are encrypted before embedding. The luminance frame (s) is (are) preprocessed before embedding with the watermarks to defy stega-analysis. Chaotic logistic map and a gray level support digital image is used for obtaining unique row/column sequences as well as for generating robust random binary sequences. A support color digital image is used in the first layer encryption of the digital video. Modified Rabinovich 4 dimensional hyper-chaotic system is used for second layer encryption. Encryption algorithm is applied in R, G, B frames separately. The technique may also be applied for integrated encryption and watermarking of digital images.


Author(s):  
C. R. Revanna ◽  
C. Keshavamurthy

The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.


Author(s):  
Gustavo Rodríguez- Cardona ◽  
Leonardo Humberto Ramírez- Beltrán ◽  
Marco Tulio Ramírez- Torres

The present investigation is proposing a new partial encryption algorithm for digital image, using the synchronization of cellular automata based on the local rule 90. Unlike other partial encryption algorithm, which become vulnerable to attacks such as Replacement Attack or Reconstruction Attack, this system encodes different bit planes, in function of the secret key, that is, for each block of clear text, different bits are encrypted to prevent that with an elimination operation of the encrypted bits information can be revealed. The synchronization of cellular automata has proven to be a useful tool for data encryption because it is sensitivity to initial conditions and, in addition, rule 90 is considered a chaotic standard. Both characteristics ensure cryptographic and perceptive security. Based on the results of the security analysis, this research could be an attractive option for image encryption with less computer cost and without compromising information confidentiality.


2019 ◽  
Vol 178 (19) ◽  
pp. 1-4
Author(s):  
Sushant Jillawar ◽  
Trishala Sawant ◽  
Ajinkya Khurud ◽  
Jayashree Katti

Sign in / Sign up

Export Citation Format

Share Document