A Novel Image Encryption Technique using Multi-wave based Carrier Image

被引:2
作者
Panduranga, H. T. [1 ]
Kumar, Naveen S. K. [1 ]
机构
[1] Univ Mysore, Dept Elect, PG Ctr, Hassan, Karnataka, India
来源
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING | 2012年 / 38卷
关键词
image encryption; Carrier Image; multi-wave;
D O I
10.1016/j.proeng.2012.06.350
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information security is a very important topic in fast growing communication technologies. Image security is also a part of this information security. In this paper we propose a novel technique for image encryption based on carrier image. Here, pixels of a carrier image are created by amplitude values of multiple sine waves generated by alphanumeric password. Finally this carrier image is added with original image to obtain encrypted image. Decryption process involves the same procedure to create carrier image and it is added with the encrypted image to get original (decrypted) image. Experiment is conducted for various combinations of multiple waves to generate various patterns in carrier image. (C) 2012 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Noorul Islam Centre for Higher Education
引用
收藏
页码:2998 / 3004
页数:7
相关论文
共 50 条
  • [31] Comment on 'A technique for image encryption using digital signature'
    Encinas, L. Hernandez
    Dominguez, A. Peinado
    OPTICS COMMUNICATIONS, 2006, 268 (02) : 261 - 265
  • [32] An image encryption algorithm based on irregular wave representation
    Xiaoling Huang
    Guodong Ye
    Multimedia Tools and Applications, 2018, 77 : 2611 - 2628
  • [33] A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map Image Encryption Using Combined Chaotic Map
    Parvees, M. Y. Mohamed
    Samath, J. Abdul
    Raj, I. Kaspar
    Bose, B. Parameswaran
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1067 - 1072
  • [34] An image encryption algorithm based on irregular wave representation
    Huang, Xiaoling
    Ye, Guodong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2611 - 2628
  • [35] Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map
    Mokhnache, Abdelaziz
    Ziet, Lahcene
    TRAITEMENT DU SIGNAL, 2020, 37 (01) : 95 - 100
  • [36] A novel permutation-diffusion technique for image encryption based on the Imperialist Competitive Algorithm
    Keyvan Golalipour
    Multimedia Tools and Applications, 2023, 82 : 725 - 746
  • [37] A novel permutation-diffusion technique for image encryption based on the Imperialist Competitive Algorithm
    Golalipour, Keyvan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (01) : 725 - 746
  • [38] Image Security using Image Encryption and Image Stitching
    Kankonkar, Jyoti T. G.
    Naik, Nitesh
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 151 - 154
  • [39] A Novel Image Encryption Scheme Using Lorenz Attractor
    Kumar, Gelli M. B. S. S.
    Chandrasekaran, V.
    ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 3653 - 3657
  • [40] Medical Image Encryption Using Modified Identity Based Encryption
    Purnamasari, Dian Neipa
    Sudarsono, Amang
    Kristalina, Prima
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2019, 7 (02) : 524 - 536