A Novel Data Encryption Approach in the Grid-Structured Binary Image

被引:1
作者
Barik, Ram Ch [1 ]
Sahu, Sitanshu S. [2 ]
Bhoi, Subhendu P. [3 ]
Changder, Suvamoy [4 ]
机构
[1] Vikash Inst Technol, Dept Comp Sci & Engn, Bargarh 768028, Odisha, India
[2] Birla Inst Technol, Dept Elect & Commun Engn, Mesra 835215, Jharkhand, India
[3] Rajendra Auto Coll, Dept Comp Sci, Bolangir 767002, Odisha, India
[4] Natl Inst Technol, Dept Comp Sci & Engn, Durgapur 713209, W Bengal, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING & COMMUNICATION SYSTEMS, MCCS 2015 | 2018年 / 453卷
关键词
Grid structured; Cryptography; Binary image; Texture Shuffling pattern; CRYPTANALYSIS; SCHEME;
D O I
10.1007/978-981-10-5565-2_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data hiding from external malicious access is an important and timely issue. Cryptography is the backbone of information or processed data security. The existing cryptography techniques provide good security; however, its computational complexity is also very high. Hence, there is a need of an efficient as well simple cryptography approach. In this context, the paper proposes a novel technique for cryptography in the form of binary textures. The binary textures provide a form of security corresponding to the original message. The binary textures are generated, reshuffled, and arranged in an image form to make it robust from malicious access. The reliability of the proposed approach has been illustrated with some empirical case studies. The overall cryptography process in a digital image makes it a simple, low-cost, and effective methodology for the secure communication.
引用
收藏
页码:103 / 115
页数:13
相关论文
共 16 条
[1]   Cryptanalysis of an encryption scheme for binary images [J].
Chang, CC ;
Yu, TX .
PATTERN RECOGNITION LETTERS, 2002, 23 (14) :1847-1852
[2]   Large encrypting binary images with higher security [J].
Chung, KL ;
Chang, LC .
PATTERN RECOGNITION LETTERS, 1998, 19 (5-6) :461-468
[3]   High-capacity reversible data hiding in binary images using pattern substitution [J].
Ho, Yu-An ;
Chan, Yung-Kuan ;
Wu, Hsien-Chu ;
Chu, Yen-Ping .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :787-794
[4]   Edge-based image steganography [J].
Islam, Saiful ;
Modi, Mangat R. ;
Gupta, Phalguni .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[5]   Data hiding method in binary images based on block masking for key authentication [J].
Jung, Ki-Hyun ;
Yoo, Kee-Young .
INFORMATION SCIENCES, 2014, 277 :188-196
[6]  
Kocarev L., 2002, CIRCUITS SYSTEMS MAG, V1, P1531
[7]   Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Chengqing ;
Lo, Kwok-Tung .
SIGNAL PROCESSING, 2011, 91 (04) :949-954
[8]   Digital information encrypted in an image using binary encoding [J].
Lin, Kuang Tsan .
OPTICS COMMUNICATIONS, 2008, 281 (13) :3447-3453
[9]   Binary Image Data Hiding Using Matrix Encoding Technique in Sensors [J].
Phan Trung Huy ;
Kim, Cheonshik .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[10]   A Non-adaptive Partial Encryption of Grayscale Images Based on Chaos [J].
Som, Sukalyan ;
Sen, Sayani .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :663-671