Secured image storage and transmission technique suitable for IoT using Tangle and a novel image encryption technique

被引:2
作者
Rajitha, B. [1 ]
Makhija, Nishkarsh [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Allahabad, India
基金
英国科研创新办公室;
关键词
Image encryption; Blockchain; Tangle; NPCR; Correlation; UACI; RC4; algorithm; S-Box; CHAOTIC SYSTEM; ALGORITHM; BLOCKCHAIN; TRANSFORM; INTERNET; THINGS; MODEL; MAP;
D O I
10.1007/s11042-023-14794-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, there has been tremendous growth in the use of IoT based applications. It is making its footprint strong with day to day life uses as well as industrial uses. IoT has vast applications ranging from medical, automobile industry, daily task automation, security surveillance and a lot more. Surveillance based IoT system shares images over internet for information exchange between filed experts and technical members for faster analysis about the locations and if it has any unauthorized activity. So these image information exchange should be secured. Thus this paper proposes a new technique for achieving this task in two phases. In first phase the secret/informative image is encrypted using a novel encryption technique. In second phase this encrypted image is shared to receiver team using a highly secured Tangle(latest secured transmission model advanced from Blockchain).Tangle eliminates the drawback of the traditional blockchain while providing its security features like decentralization, high reliability, and low cost to transfer and store users image information data. Tangle can be combined with IoT to make it more stronger. The proposed method has been tested on various images and its performance has been compared using standard metrics such as Correlation, number of pixels change rate (NPCR), the unified average changed intensity(UACI), information entropy analysis, key space analysis, etc. The proposed technique was found to be better than literature methods like the entropy value is near to an ideal value 8, which is considered safe from brute force attack.
引用
收藏
页码:36793 / 36814
页数:22
相关论文
共 50 条
  • [31] A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos
    Kamran, Muhammad Islam
    Khan, Muazzam A.
    Alsuhibany, Suliman A.
    Ghadi, Yazeed Yasin
    Arshad
    Arif, Jameel
    Ahmad, Jawad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 657 - 672
  • [32] A novel permutation-diffusion technique for image encryption based on the Imperialist Competitive Algorithm
    Golalipour, Keyvan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (01) : 725 - 746
  • [33] A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map Image Encryption Using Combined Chaotic Map
    Parvees, M. Y. Mohamed
    Samath, J. Abdul
    Raj, I. Kaspar
    Bose, B. Parameswaran
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1067 - 1072
  • [34] Comment on 'A technique for image encryption using digital signature'
    Encinas, L. Hernandez
    Dominguez, A. Peinado
    OPTICS COMMUNICATIONS, 2006, 268 (02) : 261 - 265
  • [35] A novel colour image encryption algorithm using S-box technique
    Kakade, Kiran Shrimant
    Sarkar, Swagata
    Asha, S.
    Sivakumaran, C.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 255 - 266
  • [36] A Novel Image Encryption Technique using RGB pixel displacement for Color Images
    Somaraj, Shrija
    Hussain, Mohammed Ali
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 275 - 279
  • [37] Image encryption technique based on fractional chaotic time series
    Wu, Guo-Cheng
    Baleanu, Dumitru
    Lin, Zhen-Xiang
    JOURNAL OF VIBRATION AND CONTROL, 2016, 22 (08) : 2092 - 2099
  • [38] A Two Layer Chaotic Network Based Image Encryption Technique
    Jain, Anchal
    Rajpal, Navin
    2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS (NCCCS), 2012, : 182 - 186
  • [39] A Robust and Fast Image Encryption Scheme Based on a Mixing Technique
    Yepdia, Lee Mariel Heucheun
    Tiedeu, Alain
    Kom, Guillaume
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [40] An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption
    Younes, Mohammad Ali Bani
    Jantan, Aman
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 191 - 197