A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

被引:3
作者
Mondal, Arindom [1 ]
Alain, Kazi Md Rokibul [1 ]
Ali, G. G. Md Nawaz [1 ,2 ]
Chong, Peter Han Joo [3 ]
Morimoto, Yasuhiko [4 ]
机构
[1] Khulna Univ Engn & Technol, Dept Comp Sci & Engn, Khulna, Bangladesh
[2] Clemson Univ, Dept Automot Engn, Clemson, SC 29631 USA
[3] Auckland Univ Technol, Dept Elect & Elect Engn, Auckland, New Zealand
[4] Hiroshima Univ, Grad Sch Informat Engn, Higashihiroshima 7398521, Japan
基金
日本学术振兴会;
关键词
Image secrecy; Multi-stage encryption; Visual Cryptography; One time pad; Steganography; Least Significant Bit;
D O I
10.3837/tiis.2019.05.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.
引用
收藏
页码:2698 / 2717
页数:20
相关论文
共 24 条
[1]  
Aeloor Deepak, 2013, SECURITY COMPUTING C, P330
[2]  
Alamri S. S., 2010, INT J COMPUTER SCI, V7, P33
[3]  
[Anonymous], 2010, 2010 2 INT C COMPUTI
[4]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[5]  
[Anonymous], INT J SIGNAL IMAGE P
[6]  
[Anonymous], MULTIMED TOOLS APPL
[7]  
Ge Huayong, 2011, 2011 4th International Congress on Image and Signal Processing (CISP 2011), P252, DOI 10.1109/CISP.2011.6099953
[8]  
Hu F., 2016, An Image Compression and Encryption Scheme Based on Deep Learning
[9]  
JoshiJesalkumari A., 2013, INT J COMPUT APPL TE, V2, P350
[10]  
Judith G., 2011, INT J SIGNAL IMAGE P, V2