Image Encryption using Legendre Sequence and DCT

被引:0
|
作者
Savithri, G. [1 ]
Dhingra, Swati [1 ]
Madan, Meghna [1 ]
Natarajan, P. [1 ]
机构
[1] VIT Univ, SCOPE, Vellore, Tamil Nadu, India
关键词
Encryption; Legendre Sequence; Psuedo-Random Numbers;
D O I
10.1109/ICRAECT.2017.15
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the fears in the field of communication is insecurity of data. Pseudo random noise (PRN), which is similar to noise and also fulfills a greater number of the standard tests for statistical randomness, can be used as a key for encryption. Using Legendre PN sequence which is based on prime numbers, an image encryption technique has been proposed in this paper. Based on the number of pixels in the image, Legendre sequences are generated for a set of prime numbers and concatenated to generate the required length sequence. This sequence is then used to encrypt the secret image that generates noise like pattern. This encrypted image is later embedded into a larger image using DCT technique to have double security. The proposed algorithm using Legendre sequence when tested on various images has always produced a PSNR value of cover image above 20, proving that changes made to cover image is very less. Identification of key to decrypt the original image is impossible to detect as multiple Legendre sequences are used to form PN sequence. Steganography with DCT adds to improvement in security. The above algorithm can be extended to color images and the robustness of the algorithm can be tested using different attacking methods.
引用
收藏
页码:154 / 158
页数:5
相关论文
共 50 条
  • [1] Chaotic Image Encryption Using Bezier Curve in DCT Domain Scrambling
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    Wang, Ning
    [J]. DIGITAL ENTERPRISE AND INFORMATION SYSTEMS, 2011, 194 : 30 - 41
  • [2] A Novel Image Steganography Technique Using AES Encryption in DCT Domain
    Sahu, Aman
    Pradhan, Chittaranjan
    [J]. DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 349 - 354
  • [3] A Color Image Encryption Technique using Reality Preserving Fractional DCT
    Pandurangi, Bhagyashri R.
    Patil, Meenakshi. R.
    Pujari, Anuradha M.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 832 - 836
  • [4] Image encryption using sequence generated by cyclic group
    Kandar, Shyamalendu
    Chaudhuri, Dhaibat
    Bhattacharjee, Apurbaa
    Dhara, Bibhas Chandra
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 117 - 129
  • [5] Image information hiding encryption using chaotic sequence
    Liu, Zhen
    Xi, Lifeng
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT II, PROCEEDINGS, 2007, 4693 : 202 - 208
  • [6] A secure image compression-encryption algorithm using DCT and hyperchaotic system
    Huang, Huiqing
    Cheng, Dongsheng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (22) : 31329 - 31347
  • [7] A secure image compression-encryption algorithm using DCT and hyperchaotic system
    Huiqing Huang
    Dongsheng Cheng
    [J]. Multimedia Tools and Applications, 2022, 81 : 31329 - 31347
  • [8] Highly Secure Image Steganography Algorithm using Curvelet Transform and DCT Encryption
    ElSayed, Ahmed
    Elleithy, Abdelrahman
    Thunga, Prasanthi
    Wu, Zhengping
    [J]. 2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [9] An Encryption Algorithmof Image Based on Chaotic Sequences and DCT
    Yan, ShanJun
    Mi, Junli
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON VIRTUAL REALITY (ICVR 2018), 2018, : 70 - 73
  • [10] Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT
    Shaheen, Ahmad M.
    Sheltami, Tarek R.
    Al-Kharoubi, Talal M.
    Shakshuki, Elhadi
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (12) : 4733 - 4750