International Journal of Advanced and Applied Sciences
Int. j. adv. appl. sci.
EISSN: 2313-3724
Print ISSN: 2313-626X
Volume 4, Issue 2 (February 2017), Pages: 52-60
Title: The clandestine image transmission scheme to prevent from the intruders
Author(s): Saad Al-Mutairi 1, *, S. Manimurugan 2
Affiliation(s):
1Computer Science and Information Technology Faculty, Tabuk University, Tabuk, Saudi Arabia
2College of Computing and Informatics, Saudi Electronics University, Riyadh, Saudi Arabia
https://doi.org/10.21833/ijaas.2017.02.010
Abstract:
The main aim of this technique is to prevent the capture of secret data during the exchange/transfer between the source and destination, without the knowledge of intruder. A secret message is represented as an image, and the same image is encrypted by the Triple Encryption (TE) technique. This can be divided into three types of processes. These processes are Reverse Matrix (RM) encode, Alpha-Encryption (AE) and Hill Cipher (HC) encryption. In the RM process, the original secret image is hidden within a cover image. The encoded cover image pixels are converted as characters using a lookup table in the AE process. The encrypted cipher characters are once again encrypted in the HC encryption process. The main advantage of this proposed technique is that, to strengthen the proposed technique the pixels positions are interchanged in every stage. After the encryption, the cipher’s data are sent to the destination for the reconstruction process. The Triple Decryption (TD) technique is divided into three processes of: Inverse Matrix (IM) decode, Alpha-Decryption (AD) and HC decryption. The received cipher data are decrypted by the HC decryption and AD processes. Finally, the decrypted data is decoded by the IM decode process. In this process, the original secret and cover images are obtained. In addition, to measure the performance of the proposed algorithm, the standard parameters are considered. The results show that the proposed algorithm provided a high Peak Signal to Noise Ratio (PSNR), good Correlation Coefficient (CC), minimum execution time and high CIA (Confidentiality, Integrity and Authentication) compared to existing encryption methods. Therefore, using this proposed method, we can obtain 100% of the original image and the secret data can be prevented from interception by intruders/third parties.
© 2017 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Reverse matrix encode Alphaencryption, Hill cipher, Secret image, Shuffle process
Article History: Received 10 October 2016, Received in revised form 3 February 2017, Accepted 3 February 2017
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2017.02.010
Citation:
Al-Mutairi S, and Manimurugan S (2017). The clandestine image transmission scheme to prevent from the intruders. International Journal of Advanced and Applied Sciences, 4(2): 52-60
http://www.science-gate.com/IJAAS/V4I2/Mutairi.html
References:
Almutairi S and Manimurugan S (2016). An efficient secret image transmission scheme using Dho-encryption technique. International Journal of Computer Science and Information Security (IJCSIS), 14(10): 446-460. | ||||
Anton H (2010). Elementary linear algebra application version. 10th Edition, John Wiley and Sons, New Jersey, USA. | ||||
Cao H and Kot AC (2013). On establishing edge adaptive grid for bilevel image data hiding. IEEE Transactions on Information Forensics and Security, 8(9): 1508-1518. https://doi.org/10.1109/TIFS.2013.2274041 |
||||
Haiping H, Shichao H, Jiutian C, and Ruchuan W (2013). Image hiding algorithm in discrete cosine transform domain based on grey prediction and grey relational analysis. China Communications, 10(7): 57-70. https://doi.org/10.1109/CC.2013.6571289 |
||||
Hu YC (2003). Grey-level image hiding scheme based on vector quantisation. Electronics Letters, 39(2): 202-203. https://doi.org/10.1049/el:20030167 |
||||
Ishimaru A, Zhang C, and Kuga Y (2014). Hard wall imaging of objects hidden by non-penetrating obstacles using modified time reversal technique. IEEE Transactions on Antennas and Propagation, 62(7): 3645-3651. https://doi.org/10.1109/TAP.2014.2317479 |
||||
Kwon O (2014). Single image dehazing based on hidden Markov random field and expectation–maximisation. Electronics Letters, 50(20): 1442-1444. https://doi.org/10.1049/el.2014.2093 |
||||
Lee JD, Chiou YH, and Guo JM (2014). Information hiding based on block match coding for vector quantization-compressed images. IEEE Systems Journal, 8(3): 737-748. https://doi.org/10.1109/JSYST.2012.2232551 |
||||
Li M, Xiao D, Kulsoom A, and Zhang Y (2015). Improved reversible data hiding for encrypted images using full embedding strategy. Electronics Letters, 51(9): 690-691. https://doi.org/10.1049/el.2014.4476 |
||||
Ma K, Zhang W, Zhao X, Yu N, and Li F (2013). Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security, 8(3): 553-562. https://doi.org/10.1109/TIFS.2013.2248725 |
||||
Manimurugan S, Narmatha C, and Porkumaran K (2014a). The new approach of visual cryptography scheme for protecting the grayscale medical images. Journal of Theoretical and Applied Information Technology, 69(3): 552-561. | ||||
Manimurugan S, Porkumaran K, and Narmatha C (2014b). The new block pixel sort algorithm for TVC-encrypted medical image. The Imaging Science Journal, 62(8): 403-414. https://doi.org/10.1179/1743131X14Y.0000000078 |
||||
Nikolaidis A (2015). Reversible data hiding in JPEG images utilising zero quantised coefficients. IET Image Processing, 9(7): 560-568. https://doi.org/10.1049/iet-ipr.2014.0689 |
||||
Qian Z and Zhang X (2016). Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology, 26(4): 636-646. https://doi.org/10.1109/TCSVT.2015.2418611 |
||||
Qin C, Chang CC, and Chiu YP (2014). A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Transactions on Image Processing, 23(3): 969-978. https://doi.org/10.1109/TIP.2013.2260760 PMid:23649221 |
||||
Renza D, Ballesteros DM, and Ortiz HD (2016). Text Hiding in Images Based on QIM and OVSF. IEEE Latin America Transactions, 14(3): 1206-1212. https://doi.org/10.1109/TLA.2016.7459600 |
||||
Wu DC and Tsai WH (2000). Spatial-domain image hiding using image differencing. IEE Proceedings-Vision, Image and Signal Processing, 147(1): 29-37. https://doi.org/10.1049/ip-vis:20000104 |
||||
Wu HT, Dugelay JL, and Shi YQ (2015). Reversible image data hiding with contrast enhancement. IEEE Signal Processing Letters, 22(1): 81-85. https://doi.org/10.1109/LSP.2014.2346989 |
||||
Xiao D and Chen S (2014). Separable data hiding in encrypted image based on compressive sensing. Electronics Letters, 50(8): 598-600. https://doi.org/10.1049/el.2013.3806 |
||||
Zhang X and Zhang W (2014). Semantic image compression based on data hiding. IET Image Processing, 9(1): 54-61. https://doi.org/10.1049/iet-ipr.2014.0321 |
||||
Zhang X, Long J, Wang Z, and Cheng H (2016). Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 26(9): 1622-1631. https://doi.org/10.1109/TCSVT.2015.2433194 |
||||
Zhou J, Sun W, Dong L, Liu X, Au OC and Tang YY (2016). Secure reversible image data hiding over encrypted domain via key modulation. IEEE Transactions on Circuits and Systems for Video Technology, 26(3): 441-452. https://doi.org/10.1109/TCSVT.2015.2416591 |