Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
Assistant Professor, C.S.E Department, Guru Kashi University, Talwandi Sabo (Bathinda), Punjab
3
There is a major trend is to minimize the computational requirement for the secure multimedia communication. So some selective encryption techniques are used where only parts of the image data are encrypted rather than the full image [11]. Chaotic methods are very sensitive to small change in key so even with the knowledge of the key approximate values; there is no possibility for the attacker to break the cipher [3], [4]. This paper organized as follows in section I we present general guide lines about cryptography. In section II we survey on already existing research papers, finally we conclude in section III.
1. Introduction:
Nowadays information security is becoming more important in data storage and transmission. Images are widely used in several processes, so the protection of image from unauthorized access is very important. Encryption is a process for converting plain text to cipher text. An original message (image) is known as plaintext and Coded message (image) is called cipher text. The evolution of encryption is moving towards a future of endless possibilities. Everyday new methods of encryption techniques are discovered. There exists many traditional encryption techniques like DES, AES or IDEA etc for providing high security to the data that may be textual or image form. It is difficult to use them directly in multimedia data because of some shortcomings on the key space, encryption speed and other aspects. So many other techniques have also been developed for image encryption. On the other hand some scrambling (replacement of pixels with each other) and transformation (image is first divided into blocks the shuffle blocks) techniques are used mainly for image encryption which are very simple and are easy to implement. But due to the simplicity of these techniques, the decryption process is also very simple so a third person can easily crack the algorithm. Thus to provide high degree of security these techniques are combined with other strong techniques [1], [2], [7]. Some complex encryption techniques are also present like image encryption approaches using chaos, stream cipher and hash based techniques [11]. Some researchers have also done improvements in DES and AES [4], [6], [10]. Volume 2, Issue 3 May June 2013
2. Literature review
2.1 New image encryption and compression method based on independent component analysis, 2003. Masanori Ito, Ayman Alfaou, Ali Mansour proposed a new compression and encryption technique is purposed. The compression is done with the help of DCT. Firstly the image is divided into small squares blocks after this DCT (discreet cosine transformation) is applied and obtain DCT components. Most of DCT components have high energy in low frequency bands; they use only low frequency components through a simple low pass filter. After the compression the small blocks are rotated randomly and save the rotation matrix as a key. The encryption technique is inspired by blind source separation. The compressed and rotated DCT blocks are mixed together. It is observed that when compression ratio is between 0.1 to 0.5 the best performance can be achieved. Therefore by using this technique we can achieve a fast and secure image transmission [8]. 2.2 Image based steganography and cryptography, 2003. Domenico Bloisi and Luca Iocchi develop a technique ISC (image based steganography and cryptography) is developed which integrates steganography and cryptography. The encryption is done by one time pad key which is effective type of encryption. On the other hand for steganography the method used is also very effective like F5. The strength of this system resides in the new concept of key image. Involving two images (cover and key) in place of one (cover) which enables to change the cover coefficient randomly. This opportunity does not Page 350
3. Conclusion:
Image encryption is attractive area for research in these days because communication with the help of multimedia objects increasing rapidly. In this paper, we have surveyed five techniques developed by different scientist. We have studied chaotic based technique which is very secure because its high sensitivity. Some transformation techniques are used which are also an effective way for encryption. Emended low area 32-bit AES for image encryption/decryption is the smallest design from all encryption techniques. Compression and encryption both are combined and formed a new technique which is effective but needs additional operating requirements. So every technique has its own merits and demerits we can use any technique according to our convenience. Table1: Comparison of different techniques
References:
[1] X.Fei, G.Xi-cong and Luoyang An image encryption algorithm based on scrambling and substitution using hybrid chaotic systems 2009 IEEE. [2] X.Xiaolin and F.Jiali Research and implementation of image encryption algorithm based on zigzag transformation and inner product polarization 2010 IEEE. [3] H.H.Nien, W.T.Huang, C.M.Hung, C.K. Huang and Y.H. Hsu Hybrid image encryption using multichaos-system 2009 IEEE. [4] Z.Yun-peng, Z.Zheng-jun, L.Wei, N.Xuan, C.shuiping, D.Wei-di Digital image encryption algorithm based on chaos and improved DES 2009 IEEE. [5] S.H.Kamali, R.Shakerian, M.Hedayati, M.Rahmani a new modified version of advance encryption standard based algorithm for image encryption 2010 IEEE. [6] M.Zeghid, M.Machhout, L.Khriji, A.Baganne and R.Tourki a modified AES based algorithm for image encryption 2007.
Page 351
Authors:
Sandeep Kaur, Lecturer C.S.E Department, MIMIT Malout, Qualification: B-Tech(C.S.E) from Guru Gobind Singh College of Engg. & Tech., Talwandi Sabo., M-Tech(Comp. Engg.) from Punjabi University Patiala. Sukhpreet Sing, Assistant Professor, C.S.E Department, Guru Kashi University Talwandi Sabo, Qualification: B-Tech(C.S.E) from Chitkara Instt. of Engg. & Tech., Rajpura, MTech(Comp. Engg.) from Punjabi University Patiala. Sonia Sharma, Associate Professor, I.T. Department, MIMIT Malout, Qualification: BTech(C.S.E), M-Tech(Comp. Engg.), Ph.d Pursuing
Page 352