Secure Image Transcoding technique using chaotic key based algorithm with improved security

被引:0
作者
Anoop, B. N. [1 ]
George, Sudhish N. [1 ]
Deepthi, P. P. [1 ]
机构
[1] NIT Calicut, Dept ECE, Calicut 673601, Kerala, India
来源
2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S) | 2013年
关键词
Transcoding; Chaotic Key Based Algorithm (CKBA); Encryption; Known-plaintext attack (KPA);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transcoding is the direct digital-to-digital data conversion of one encoding to another. This paper proposes a system of secure image transcoder which mainly focuses on multimedia applications such as web browsing through mobile phones, in order to improve their delivery to client devices with wide range of communication, storage and display capabilities. In this work, we propose a secure image transcoding technique based on a chaotic key. To improve the security of the above mentioned system, we have incorporated a variable block size selection prior to this stage. We analyzed the security of the proposed system and it is proved that the proposed system is highly secure against several forms of attack. The performance of the system is evaluated for different images and it is verified that the system is having less resource complexity with good performance.
引用
收藏
页码:693 / 697
页数:5
相关论文
共 10 条
  • [1] Anoop B N, 2012, INT J ADV COMPUTER R, V2
  • [2] Desai S., 2011, 2011 3rd International Conference on Electronics Computer Technology (ICECT 2011), P389, DOI 10.1109/ICECTECH.2011.5941629
  • [3] Dynamic adaptation in an image transcoding proxy for mobile Web browsing
    Han, R
    Bhagwat, P
    LaMaire, R
    Mummert, T
    Perret, V
    Rubas, J
    [J]. IEEE PERSONAL COMMUNICATIONS, 1998, 5 (06): : 8 - 17
  • [4] Huafei Zhu, 2010, 2010 3rd IEEE International Conference on Ubi-Media Computing (U-Media 2010), P113, DOI 10.1109/UMEDIA.2010.5543914
  • [5] Sahithi M., 2012, Implementation of Random Number Generator Using LFSR for High Secured Multi Purpose Applications". In, V3, P3287
  • [6] Silva CP, 2000, AEROSP CONF PROC, P279, DOI 10.1109/AERO.2000.879402
  • [7] Smith JR, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 3, P7, DOI 10.1109/ICIP.1998.998987
  • [8] Secure transcoders for single layer video data
    Thomas, Nithin
    Redmill, David
    Bull, David
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (03) : 196 - 207
  • [9] YAO Ye, 2006, ICSP2006 P 16 20 NOV, V4
  • [10] Yen JC, 2000, ISCAS 2000: IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - PROCEEDINGS, VOL IV, P49, DOI 10.1109/ISCAS.2000.858685