Skip to main content
Erschienen in: Innovations in Systems and Software Engineering 1/2019

28.01.2019 | S.I. : CSI2017

A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage

verfasst von: D. Boopathy, M. Sundaresan

Erschienen in: Innovations in Systems and Software Engineering | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Image encryption is one of the techniques which is used to maintain the image confidentiality. Trust is needed to be created and retained in the cloud between the service provider and the end user. The existing image encryption methods are using a map structure, Rubik cube method, DCT-based approach and s-box designs. The existing algorithms are mostly designed with the concept of offline image encryption. While coming to the online encryption, the image encryption algorithms needed to be redefined with a lightweight approach with an improved security level or same security level of existing algorithms. These things are taken into consideration in the proposed multi-dimensional encryption technique design. The proposed technique is using two phases to perform the encryption. The proposed technique’s two phases are image pixel shuffling phase and image pixel rearrange phase. The proposed technique is already tested successfully on the standard grayscale images, and the results were obtained and it satisfied the objectives. In this paper, the proposed technique was tested on the standard color images and the gained results. Those results have been used to analyze the performance and efficiency of proposed technique with the existing technique, by using different parameters which include PSNR, MSE, information entropy, coefficient correlation, NPCR and UPCI.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Desai D, Prasad A, Crasto J (2012) Chaos-based system for image encryption. Int J Comput Sci Inf Technol 3(4):4809–4811 Desai D, Prasad A, Crasto J (2012) Chaos-based system for image encryption. Int J Comput Sci Inf Technol 3(4):4809–4811
3.
Zurück zum Zitat Sakthidasan K, Santhosh Krishna BV (2011) A new chaotic algorithm for image encryption and decryption of digital color images. Int J Inf Educ Technol 1(2):137–141 Sakthidasan K, Santhosh Krishna BV (2011) A new chaotic algorithm for image encryption and decryption of digital color images. Int J Inf Educ Technol 1(2):137–141
4.
Zurück zum Zitat Agarwal N, Sharma H (2013) An efficient pixel-shuffling based approach to simultaneously perform image compression, encryption and steganography. IJCSMC 2(5):376–385 Agarwal N, Sharma H (2013) An efficient pixel-shuffling based approach to simultaneously perform image compression, encryption and steganography. IJCSMC 2(5):376–385
5.
Zurück zum Zitat Kester Quist-Aphetsi (2013) Image encryption based on the RGB PIXEL transposition and shuffling. Int J Comput Netw Inf Secur 7:43–50 Kester Quist-Aphetsi (2013) Image encryption based on the RGB PIXEL transposition and shuffling. Int J Comput Netw Inf Secur 7:43–50
6.
Zurück zum Zitat Zhao J, Guo W, Ye R (2014) A chaos-based image encryption scheme using permutation-substitution architecture. Int J Comput Trends Technol 15(4):174–185CrossRef Zhao J, Guo W, Ye R (2014) A chaos-based image encryption scheme using permutation-substitution architecture. Int J Comput Trends Technol 15(4):174–185CrossRef
7.
Zurück zum Zitat Lohit Kumar D, Reddy AR, Jilani SAK (2016) Implementation of 128-bit AES algorithm in MATLAB. Int J Eng Trends Technol 33(3):126–129CrossRef Lohit Kumar D, Reddy AR, Jilani SAK (2016) Implementation of 128-bit AES algorithm in MATLAB. Int J Eng Trends Technol 33(3):126–129CrossRef
8.
Zurück zum Zitat Boopathy D, Sundaresan M (2013) Multidimensional approach for securing images on cloud. ICGST J Graph Vis Image Process 17(02):31–38 Boopathy D, Sundaresan M (2013) Multidimensional approach for securing images on cloud. ICGST J Graph Vis Image Process 17(02):31–38
9.
Zurück zum Zitat Boopathy D, Sundaresan M (2013) Securing public data storage in cloud environment. In: ICT and critical infrastructure: 48th annual convention of Computer Society of India, Visakhapatnam, India, pp 555-562 Boopathy D, Sundaresan M (2013) Securing public data storage in cloud environment. In: ICT and critical infrastructure: 48th annual convention of Computer Society of India, Visakhapatnam, India, pp 555-562
10.
Zurück zum Zitat Boopathy D, Sundaresan M (2015) Secured cloud data storage—prototype trust model for public cloud storage. In: International conference on information and communication technology for sustainable development, Ahmadabad, India, pp 329–337 Boopathy D, Sundaresan M (2015) Secured cloud data storage—prototype trust model for public cloud storage. In: International conference on information and communication technology for sustainable development, Ahmadabad, India, pp 329–337
11.
Zurück zum Zitat Boopathy D, Sundaresan M (2016) Framework model and algorithm of request based one time passkey (ROTP) mechanism to authenticate cloud users in secured way. In: 3rd international conference on computing for sustainable global development, New Delhi, India, pp 5317–5322 Boopathy D, Sundaresan M (2016) Framework model and algorithm of request based one time passkey (ROTP) mechanism to authenticate cloud users in secured way. In: 3rd international conference on computing for sustainable global development, New Delhi, India, pp 5317–5322
12.
Zurück zum Zitat Boopathy D, Sundaresan M (2017) A framework for user authentication and authorization using request based one time passkey and user active session identification. Int J Comput Appl 172(10):18–23 Boopathy D, Sundaresan M (2017) A framework for user authentication and authorization using request based one time passkey and user active session identification. Int J Comput Appl 172(10):18–23
13.
Zurück zum Zitat Boopathy D, Sundaresan M (2014) Data type identification and extension validator framework model for public cloud storage. In: Big data analytics—proceedings of the 50th annual convention of Computer Society of India, New Delhi, India, pp 533–541 Boopathy D, Sundaresan M (2014) Data type identification and extension validator framework model for public cloud storage. In: Big data analytics—proceedings of the 50th annual convention of Computer Society of India, New Delhi, India, pp 533–541
14.
Zurück zum Zitat Boopathy D, Sundaresan M (2014) Data encryption framework model with watermark security for data storage in public cloud model. In: IEEE eighth international conference on computing for sustainable global development, New Delhi, India, pp 1040–1044 Boopathy D, Sundaresan M (2014) Data encryption framework model with watermark security for data storage in public cloud model. In: IEEE eighth international conference on computing for sustainable global development, New Delhi, India, pp 1040–1044
15.
Zurück zum Zitat Boopathy D, Sundaresan M (2014) Enhanced encryption and decryption gateway model for cloud data security in cloud storage. In: Emerging ICT for bridging the future—49th annual convention of Computer Society of India, Hyderabad, India, pp 415–421 Boopathy D, Sundaresan M (2014) Enhanced encryption and decryption gateway model for cloud data security in cloud storage. In: Emerging ICT for bridging the future—49th annual convention of Computer Society of India, Hyderabad, India, pp 415–421
16.
Zurück zum Zitat Boopathy D, Sundaresan M (20163) Policy based data encryption mechanism framework model for data storage in public cloud service deployment model. In: Elsevier fourth international joint conference on advances in computer science, Haryana, India, pp 423–429 Boopathy D, Sundaresan M (20163) Policy based data encryption mechanism framework model for data storage in public cloud service deployment model. In: Elsevier fourth international joint conference on advances in computer science, Haryana, India, pp 423–429
17.
Zurück zum Zitat Boopathy D, Sundaresan M (2017) IDOCA and ODOCA—enhanced technique for secured cloud data storage. Int J Intell Eng Syst 10(06):49–59 Boopathy D, Sundaresan M (2017) IDOCA and ODOCA—enhanced technique for secured cloud data storage. Int J Intell Eng Syst 10(06):49–59
Metadaten
Titel
A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage
verfasst von
D. Boopathy
M. Sundaresan
Publikationsdatum
28.01.2019
Verlag
Springer London
Erschienen in
Innovations in Systems and Software Engineering / Ausgabe 1/2019
Print ISSN: 1614-5046
Elektronische ISSN: 1614-5054
DOI
https://doi.org/10.1007/s11334-019-00323-9

Weitere Artikel der Ausgabe 1/2019

Innovations in Systems and Software Engineering 1/2019 Zur Ausgabe

Premium Partner