Secured image storage and transmission technique suitable for IoT using Tangle and a novel image encryption technique

被引:2
作者
Rajitha, B. [1 ]
Makhija, Nishkarsh [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Allahabad, India
基金
英国科研创新办公室;
关键词
Image encryption; Blockchain; Tangle; NPCR; Correlation; UACI; RC4; algorithm; S-Box; CHAOTIC SYSTEM; ALGORITHM; BLOCKCHAIN; TRANSFORM; INTERNET; THINGS; MODEL; MAP;
D O I
10.1007/s11042-023-14794-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, there has been tremendous growth in the use of IoT based applications. It is making its footprint strong with day to day life uses as well as industrial uses. IoT has vast applications ranging from medical, automobile industry, daily task automation, security surveillance and a lot more. Surveillance based IoT system shares images over internet for information exchange between filed experts and technical members for faster analysis about the locations and if it has any unauthorized activity. So these image information exchange should be secured. Thus this paper proposes a new technique for achieving this task in two phases. In first phase the secret/informative image is encrypted using a novel encryption technique. In second phase this encrypted image is shared to receiver team using a highly secured Tangle(latest secured transmission model advanced from Blockchain).Tangle eliminates the drawback of the traditional blockchain while providing its security features like decentralization, high reliability, and low cost to transfer and store users image information data. Tangle can be combined with IoT to make it more stronger. The proposed method has been tested on various images and its performance has been compared using standard metrics such as Correlation, number of pixels change rate (NPCR), the unified average changed intensity(UACI), information entropy analysis, key space analysis, etc. The proposed technique was found to be better than literature methods like the entropy value is near to an ideal value 8, which is considered safe from brute force attack.
引用
收藏
页码:36793 / 36814
页数:22
相关论文
共 50 条
  • [21] A novel multi-dimensional multiple image encryption technique
    Patro, K. Abhimanyu Kumar
    Acharya, Bibhudendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 12959 - 12994
  • [22] A Novel Image Compression Technique and Secured Transmission of Compressed Satellite Images Via Optical Fiber Using 6D Hyper Chaos
    Das, Banhi
    Saha, Arijit
    Sikder, Somali
    JOURNAL OF THE INDIAN SOCIETY OF REMOTE SENSING, 2025, 53 (02) : 511 - 530
  • [23] A technique for image encryption using digital signature
    Sinha, A
    Singh, K
    OPTICS COMMUNICATIONS, 2003, 218 (4-6) : 229 - 234
  • [24] A novel image compression technique and secured transmission of compressed images via optical fiber using higher dimensional chaotic map
    Das, Banhi Dutta Choudhuri
    Sikder, Somali
    Saha, Arijit
    JOURNAL OF OPTICS-INDIA, 2024,
  • [25] A secured Transmission of data using 3D chaotic map encryption and data hiding technique
    Kharat, Pradeep H.
    Shriramwar, S. S.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 1243 - 1247
  • [26] Secured Compound Image Compression Using Encryption Techniques
    Radha, V.
    Maheswari, D.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL I, 2011, : 540 - 542
  • [27] A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic
    Khan, Majid
    Munir, Noor
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (02) : 849 - 867
  • [28] RDH TECHNIQUE FOR IMAGE ENCRYPTION
    Gayathri, C.
    Karthigaikumar, P.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [29] A Technique for Image Encryption Using the Modular Multiplicative Inverse Property of Mersenne Primes
    Shanooja, M. A.
    Kumar, M. N. Anil
    SYMMETRY-BASEL, 2025, 17 (02):
  • [30] An Image Encryption Technique Using Scan Based Approach and Image as Key
    Somaraj, Shrija
    AliHussain, Mohammad
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 645 - 653