Scroll to Top

Volume : III, Issue : V, June - 2013

SECURE IMAGE DA T ABY THREE ST AGES OF ENCRYPTION USING BLOCK BASED TRANSFORMA TION

GAYATHRI D. AND SUMETRAMENARIA

Published By : Laxmi Book Publication

Abstract :

Information security is an incr easingly important problem in the present era of advanced technology , because of which encryption is becoming very important to ensure security . Popular application of multimedia technology and incr easing transmission ability of network gradually leads us to acquire information directly and clearly thr ough Images. The digital images, which ar e transmitted over the internet, must be protected fr om unauthorized access during storage and transmission for communication, copyright protection and authentication purposes. This can be accomplished using image encryption which is an intelligent hiding of information. Encryption is the process of converting an image fr om readable form to unreadable form. In this paper , I have encrypted an image at thr ee stages for incr easing the entropy and to decrease the correlation between the pixels using block based transformation.Experimental results demonstrate that the algorithm is sensitive to initial conditions to resist the brute-force attack.

Keywords :


Article :


Cite This Article :

GAYATHRI D. AND SUMETRAMENARIA, (2013). SECURE IMAGE DA T ABY THREE ST AGES OF ENCRYPTION USING BLOCK BASED TRANSFORMA TION. Indian Streams Research Journal, Vol. III, Issue. V, http://oldisrj.lbp.world/UploadedData/2510.pdf

References :

  1. D. Xiao, X. Liao, and P . Wei. Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons and Fractals, 40(5):2191 – 2199, 2009
  2. . L. Wang and K. Smith. On chaotic simulated annealing[J]. IEEE Trans on Neural Networks. 1998, 9(4): 716-718
  3. Han Hen and Neri Merhav. On the Threshold Effect in the Estimation of Chaotic Sequences[J]. IE
  4. . Liang Zhao et.al. A Network of Globally Coupled Chaotic Maps for Adaptive Multi-Resolution Image Segmentation[C]. Proceedings of the VII Brazilian Symposium on Neural Networks (SBRN'02
  5. Andrew B. W atson NASA Ames Research Center,” Image Compression Using the Discrete Cosine Transform”, Mathematica Journal, 4(1), 1994, p. 81-88.
  6. Chinmaya Kumar Nayak1, Anuja Kumar Acharya2 and Satyabrata Das3 “Image Encryption Using an Enhanced Block Based Transformation Algorithm” International Journal of Research and Reviews in Computer Science (IJRRCS) V ol. 2, No. 2, April 2011.

Article Post Production

Article Indexed In

Comments :

Enter Name :
Email ID :
Comments :

Previous Comments :

Creative Commons License
Indian Streams Research Journal by Laxmi Book Publication is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://oldisrj.lbp.world/Default.aspx.
Permissions beyond the scope of this license may be available at http://oldisrj.lbp.world/Default.aspx
Copyright � 2014 Indian Streams Research Journal. All rights reserved
Looking for information? Browse our FAQs, tour our sitemap, or contact ISRJ
Read our Privacy Policy Statement and Plagairism Policy. Use of this site signifies your agreement to the Terms of Use