Image Security using Image Encryption and Image Stitching

被引:0
|
作者
Kankonkar, Jyoti T. G. [1 ]
Naik, Nitesh [1 ]
机构
[1] Goa Coll Engn, Dept Comp Engn, Farmagudi, Goa, India
关键词
Image Encryption; Image Stitching; logistic map function; linear feedback shift register;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [31] Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage
    Lavanya, M.
    Sundar, K. Joseph Abraham
    Saravanan, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (22) : 61313 - 61345
  • [32] Image encryption using Queen
    Nadeem Iqbal
    Multimedia Tools and Applications, 2024, 83 : 10551 - 10585
  • [33] AUTHENTICATION AND ENCRYPTION FOR MEDICAL IMAGE SECURITY SYSTEM
    Kannammal, A.
    Rani, S. Subha
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2014, 29 (04): : 448 - 455
  • [34] Image encryption using Queen
    Iqbal, Nadeem
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10551 - 10585
  • [35] On the Security of a Class of Diffusion Mechanisms for Image Encryption
    Zhang, Leo Yu
    Liu, Yuansheng
    Pareschi, Fabio
    Zhang, Yushu
    Wong, Kwok-Wo
    Rovatti, Riccardo
    Setti, Gianluca
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (04) : 1163 - 1175
  • [36] Security of new encryption algorithm for image cryptosystems
    Lee, W-B
    Chen, T-H
    Lee, C-C
    IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 178 - 187
  • [37] Authentication and encryption for medical image security system
    20151700771893
    1600, Acta Press, Building B6, Suite 101, 2509 Dieppe Avenue S.W., Calgary, AB, T3E 7J9, Canada (29):
  • [38] Security system based on optical image encryption
    Han, JW
    Kim, ES
    OPTICAL PATTERN RECOGNITION VIII, 1997, 3073 : 383 - 388
  • [39] Cryptanalysis and security improvement for selective image encryption
    Hoang, T. M.
    Tran, D.
    EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (08): : 1635 - 1646
  • [40] Cryptanalysis and security improvement for selective image encryption
    T.M. Hoang
    D. Tran
    The European Physical Journal Special Topics, 2014, 223 : 1635 - 1646