JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A study of keep the Secret information of Random Sized Images from using Indestructible Security
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A study of keep the Secret information of Random Sized Images from using Indestructible Security
Woo, Seon-mi; Lee, Malrey; Lee, Hyang Ran;
  PDF(new window)
 Abstract
The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.
 Keywords
Local Area Network/Wide Area Network;Images Hiding;Security mechanisms;Secret codes;Security issues;
 Language
English
 Cited by
 References
1.
Panicker, O.A.; Jabeenaa, A.; Hassan Mujeebb, A., "Advanced image encryption and decryption using sandwich phase diffuser and false image along with cryptographical enhancement," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on , vol., no., pp.833,837, 2010, doi: 10.1109/ICUMT.2010.5676538 crossref(new window)

2.
Chao-Shen Chen; Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology," Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT '06. Seventh International Conference on , vol., no., pp.61,66, 2006, doi: 10.1109/PDCAT.2006.71 crossref(new window)

3.
R.; Johar, A.; Soni, V., "An Encryption and Decryption Algorithm for Image Based on DNA," Communication Systems and Network Technologies (CSNT), 2013 International Conference on , vol., no., pp.478,481, 2013, doi: 10.1109/CSNT.2013.105 crossref(new window)

4.
Yunpeng Zhang; Fei Zuo; Zhengjun Zhai; Cai Xiaobin, "A New Image Encryption Algorithm Based on Multiple Chaos System", International Symposium on Electronic Commerce and Security, 347-350, 2008

5.
M. Singh, et al., "Encryption and decryption using a sandwich phase diffuser made by using two speckle patterns and placed in the Fourier plane: Simulation results", Opt. Int. J. Light Electron. Opt. 2008doi:10.1016/j.ijleo.2008.03.025 crossref(new window)

6.
Madan Singh; Arvind Kumar; Kehar Singh, "Encryption by using matrix-added, or matrix-multiplied input images placed in the input plane of a double random phase encoding geometry", Opt Laser Eng, 2009

7.
Hongjuan Liu; Zhiliang Zhu; Huiyan Jiang; Beilei Wang, "A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map", The 9th International Conference for Young Computer Scientists, 3016- 3021, 2009

8.
Aamir Shahzad, Kalum Priyanath Udagepola, Young-keun Lee, Soojin Park, and Malrey Lee, "The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission," International Journal of Distributed Sensor Networks, Article ID 738687..

9.
K. Sakthidasan; B. V. Santhosh Krishna," A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images," International Journal of Information and Education Technology, Vol. 1, No. 2, 2011

10.
Musheer Ahmad; M. Shamsher Alam, "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping," /International Journal on Computer Science and Engineering, Vol.2 (1), 46-50, 2009

11.
Ling Wang; Qun Ye; Yaoqiang Xiao et aI, "An Image Encryption Scheme Based on Cross Chaotic Map", 2008 Congress on Image and Signal Processing, 22-26, 2008

12.
Xu Shu-Jiang; Wang Ying-Long; Wang Ji-Zhi; Tian Min, "A Novel mage Encryption Scheme Based on Chaotic Maps", 2008, ICSP.9th International Conference on Signal Processing, 1014-1018, 2008

13.
Lu Ming-Xin; Lai Xue-Jia; Xiao Guo-Zhen; Qin Lei., "Symmetric Key Cryptosystem with DNA Technology Department of Information Management", Cancer Research Institute, Queen's University, Kingston, Canada, 2001.

14.
Sherif T. Amin; Magdy Saeb; Salah El-Gindi, "A DNA-based Implementation of YAEA Encryption Algorithm, " IASTED International Conference on Computational Intelligence (CI 2006), San Francisco, 2006.

15.
Jui-Cheng; Jiun-In Guo, "A new chaotic key-based design for image encryption and decryption," Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on , vol.4, no., pp.49,52 vol.4, 2000, doi: 10.1109/ISCAS.2000.858685 crossref(new window)

16.
J. Fridrich, "Image Encryption Based on Chaotic Maps", IEEE International Conference on Systems, Man, and Cybernetics, Computaional Cybernetics and Simulations, pp.1105 -1110, 1997

17.
Kumar, M.R.; Linslal, C.L.; Pillai, V.P.M.; Krishna, S.S., "Color image encryption and decryption based on jigsaw transform employed at the input plane of a double random phase encoding system," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on , vol., no., pp.860,862, 2010, doi: 10.1109/ICUMT.2010.5676474 crossref(new window)

18.
Shahzad, A.; Lee, M.; Lee, Y.-K.; Kim, S.; Xiong, N.; Choi, J.-Y.; Cho, Y. "Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information," Symmetry, 2015, 7, 1176-1210 crossref(new window)

19.
Sharma; Devesh Mishra; Ankur Agarwal., "Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform," In Proceedings of the Fifth International Conference on Security of Information and Networks (SIN '12). ACM, New York, NY, USA, 153-157, 2012, doi:10.1145/2388576.2388598 crossref(new window)

20.
El Sawda, R.; Al Falou, A.; Keryer, G.; Assoum, A., "Image Encryption and Decryption by Means of an Optical Phase Mask," Information and Communication Technologies, 2006. ICTTA '06. 2nd , vol.1, no., pp.1474,1477, 0-0 0, doi: 10.1109/ICTTA.2006.1684599 crossref(new window)

21.
Chao-Shen Chen ;Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology," In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '06). IEEE Computer Society, Washington, DC, USA, 61-66, doi:10.1109/PDCAT.2006.71 crossref(new window)