J Shanghai Jiaotong Univ Sci ›› 2021, Vol. 26 ›› Issue (4): 488-493.doi: 10.1007/s12204-021-2318-0
THAMANAM Srinivasa Rao *, NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K
出版日期:
2021-08-28
发布日期:
2021-06-06
通讯作者:
THAMANAM Srinivasa Rao
E-mail:sthamana@gitam.edu
THAMANAM Srinivasa Rao *, NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K
Online:
2021-08-28
Published:
2021-06-06
Contact:
THAMANAM Srinivasa Rao
E-mail:sthamana@gitam.edu
摘要: Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner.
中图分类号:
THAMANAM Srinivasa Rao, NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K. A Novel Image Encryption Technique Based on Inter Block Difference[J]. J Shanghai Jiaotong Univ Sci, 2021, 26(4): 488-493.
THAMANAM Srinivasa Rao , NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K. A Novel Image Encryption Technique Based on Inter Block Difference[J]. J Shanghai Jiaotong Univ Sci, 2021, 26(4): 488-493.
[1] | EL ABBADI N K, MOHAMAD A, ABDULHAMEED M. Image encryption based on singular value decomposition [J]. Journal of Computer Science,2014, 10(7): 1222-1230. |
[2] | NASKAR P K, CHAUDHURI A, CHAUDHURI A. A secure symmetric image encryption based on linear geometry [C]//2014 Applications and Innovations in Mobile Computing. Kolkata, India: IEEE, 2014: 67-74. |
[3] | YE R S, ZENG S J, LUN P Q, et al. An image encryption scheme based on bit circular shift and bidirectional diffusion [J]. International Journal of Information Technology and Computer Science, 2014, 6(1):82-92. |
[4] | KR NASKAR P, CHAUDHURI A. A secure symmetric image encryption based on bit-wise operation [J].International Journal of Image, Graphics and Signal Processing, 2014, 6(2): 30-38. |
[5] | CHEN J X, ZHU Z L, LIU Z J, et al. A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J]. Optics Express,2014, 22(6): 7349-7361. |
[6] | ALGHAMDI A S, ULLAH H. A secure Iris image encryption technique using bio-chaotic algorithm [J]. International Journal of Computer and Network Security,2010, 2(4): 78-84. |
[7] | ALGHAMDI A S, ULLAH H, MAHMUD M, et al. Bio-chaotic stream cipher-based Iris image encryption [C]//2009 International Conference on Computational Science and Engineering. Vancouver, BC, Canada:IEEE, 2009: 739-744. |
[8] | SUN Y Y, CHEN L N, XU R D, et al. An image encryption algorithm utilizing Julia sets and Hilbert curves[J]. PLoS One, 2014, 9(1): e84655. |
[9] | ARUL MURUGAN C, KARTHIGAIKUMAR P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms[J]. Mobile Networks and Applications, 2018.https://doi.org/10.1007/s11036-018-1058-3 (published online). |
[10] | DAWAHDEH Z E, YAAKOB S N, RAZIF BIN OTHMAN R. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].Journal of King Saud University-Computer and Information Sciences, 2018, 30(3): 349-355. |
[11] | YASSER I, KHALIFA F, MOHAMED M A, et al. A new image encryption scheme based on hybrid chaotic maps [J]. Complexity, 2020, 2020: 1-23. |
[12] | ES-SABRY M, EL AKKAD N, MERRAS M, et al. A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators[J]. Soft Computing, 2020, 24(5): 3829-3848. |
[1] | SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud[J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670. |
[2] | JENG Fuh-gwoa (郑富国), LIN Kai-siangb (林恺翔), LIN Chih-hungc (林志鸿), CHEN Tzung-herb. Visual Multi-Secret Sharing with Friendliness[J]. 上海交通大学学报(英文版), 2014, 19(4): 455-465. |
[3] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J]. 上海交通大学学报(英文版), 2014, 19(4): 440-442. |
[4] | LONG Yu1* (龙宇), CHEN Ke-fei2 (陈克非), MAO Xian-ping1 (毛贤平). New Constructions of Dynamic Threshold Cryptosystem[J]. 上海交通大学学报(英文版), 2014, 19(4): 431-435. |
[5] | WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao. Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing[J]. 上海交通大学学报(英文版), 2014, 19(4): 398-405. |
[6] | GUO Jie*(郭捷), XU Jia-yun (徐家运), BAO Jia-li (鲍佳立). Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video[J]. 上海交通大学学报(英文版), 2014, 19(4): 385-391. |
[7] | SUN Jin (孙 瑾), HU Yu-pu (胡予濮), ZHANG Le-you (张乐友). Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model[J]. 上海交通大学学报(英文版), 2011, 16(6): 672-676. |
阅读次数 | ||||||||||||||||||||||||||||||||||
全文 93
|
|
|||||||||||||||||||||||||||||||||
摘要 |
|
|||||||||||||||||||||||||||||||||