Image Security using Image Encryption and Image Stitching

被引:0
|
作者
Kankonkar, Jyoti T. G. [1 ]
Naik, Nitesh [1 ]
机构
[1] Goa Coll Engn, Dept Comp Engn, Farmagudi, Goa, India
关键词
Image Encryption; Image Stitching; logistic map function; linear feedback shift register;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [1] Image Encryption Technique for Improvement of Image Security
    Devade, Sanket Pandurang
    Metkar, Shilpa P.
    AMBIENT COMMUNICATIONS AND COMPUTER SYSTEMS, RACCCS 2017, 2018, 696 : 671 - 682
  • [2] Image Encryption and Compression for Medical Image Security
    Puech, W.
    2008 FIRST INTERNATIONAL WORKSHOPS ON IMAGE PROCESSING THEORY, TOOLS AND APPLICATIONS (IPTA), 2008, : 37 - 38
  • [3] Enhanced the Security of Image Steganography Through Image Encryption
    Bhardwaja, Rupali
    Khanna, Divya
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [4] On the security of image encryption method
    Jan, JK
    Tseng, YM
    INFORMATION PROCESSING LETTERS, 1996, 60 (05) : 261 - 265
  • [5] The security of an image encryption method
    Li, SJ
    Zheng, X
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2002, : 925 - 928
  • [6] Biometric authentication and image encryption for image security in cloud framework
    Vishruti Kakkad
    Meshwa Patel
    Manan Shah
    Multiscale and Multidisciplinary Modeling, Experiments and Design, 2019, 2 : 233 - 248
  • [7] Biometric authentication and image encryption for image security in cloud framework
    Kakkad, Vishruti
    Patel, Meshwa
    Shah, Manan
    MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2019, 2 (04) : 233 - 248
  • [8] Using Blowfish Encryption to Enhance Security Feature of an Image
    Gowda, Shreyank N.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND MANAGEMENT (ICICM 2016), 2016, : 126 - 129
  • [9] An Advanced Image Encryption Standard Providing Dual Security: encryption using Hill Cipher & RGB image steganography
    Debnath, Dipanwita
    Deb, Suman
    Kar, Nirmalya
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2015, : 178 - 183
  • [10] A Novel Encryption Method for Image Security
    Al-Husainy, Mohammed Abbas Fadhil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (01): : 1 - 8