Image Encryption Using Binary Key-images
Dept. of Electr. & Comput. Eng., Tufts Univ., Medford, MA, USADOI: 10.1109/ICSMC.2009.5346780 Conference: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009
This paper introduces a new concept for image encryption using a binary Â¿key-imageÂ¿. The key-image is either a bit plane or an edge map generated from another image, which has the same size as the original image to be encrypted. In addition, we introduce two new lossless image encryption algorithms using this key-image technique. The performance of these algorithms is discussed against common attacks such as the brute force attack, ciphertext attacks and plaintext attacks. The analysis and experimental results show that the proposed algorithms can fully encrypt all types of images. This makes them suitable for securing multimedia applications and shows they have the potential to be used to secure communications in a variety of wired/wireless scenarios and real-time application such as mobile phone services.
Conference Paper: A new image encryption algorithm using Truncated P-Fibonacci Bit-planes[Show abstract] [Hide abstract]
ABSTRACT: Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encrypt images. Simulation results and security analysis are provided to show the encryption performance of the proposed algorithm.Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on; 01/2012
Conference Paper: Measuring the Availability of Images Posted on Social Media Sites[Show abstract] [Hide abstract]
ABSTRACT: The amount of data stored in social media sites is humongous. It has very large in numbers and very diverse in variety. Researchers have already started using this information in various information security applications such as censorship resistance. When image data from social media sites are used in computational applications for hiding data or obfuscating data, it is important to retrieve the particular data used in the encoding process to retrieve the original data. Therefore, the availability of the image data is an important concern. In this paper, we investigated the availabilities of the images on Flickr. We examined nearly one million images hosted on Flickr and measured their availability in a two year period. We used the EXIF parameters normally generated by the cameras to further categorize the availabilities.Computer Communications and Networks (ICCCN), 2012 21st International Conference on; 07/2012
- [Show abstract] [Hide abstract]
ABSTRACT: The ever-growing penetration of communication networks, digital and Internet technologies in our everyday lives has the transmission of text data, as well as multimedia data such as images and videos, possible. Digital images have a vast usage in a number of applications, including medicine and providing security authentication, for example. This applicability becomes evident when images, such as walking or people's facial features, are utilized in their identification. Considering the required security level and the properties of images, different algorithms may be used. After key generation using logistic chaos signals, a scrambling function is utilized for image agitation in both horizontal and vertical axes, and then a block-chaining mode of operation may be applied to encrypt the resultant image. The results demonstrate that using the proposed method drastically degrades the correlation between the image components and also the entropy is increased to an acceptable level. Therefore, the image will become greatly resistant to differential attacks. However, the increasing scrambling rounds and the decreasing number of bits of the blocks result in increasing the entropy and decreasing the correlation.Journal of Electronic Imaging 01/2013; 22(1-1):013025-013025. DOI:10.1117/1.JEI.22.1.013025 · 0.67 Impact Factor
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.