Image Encryption Using Binary Key-images
Dept. of Electr. & Comput. Eng., Tufts Univ., Medford, MA, USADOI: 10.1109/ICSMC.2009.5346780 Conference: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009
This paper introduces a new concept for image encryption using a binary Â¿key-imageÂ¿. The key-image is either a bit plane or an edge map generated from another image, which has the same size as the original image to be encrypted. In addition, we introduce two new lossless image encryption algorithms using this key-image technique. The performance of these algorithms is discussed against common attacks such as the brute force attack, ciphertext attacks and plaintext attacks. The analysis and experimental results show that the proposed algorithms can fully encrypt all types of images. This makes them suitable for securing multimedia applications and shows they have the potential to be used to secure communications in a variety of wired/wireless scenarios and real-time application such as mobile phone services.
- [Show abstract] [Hide abstract]
ABSTRACT: In order to prevent images from unauthorized access and distribution, the images should be encrypted before transmitting to different customers. The traditional encryption algorithms such as RSA, DES and AES are not suitable for encrypting images due to their high computational complexity. To this end, this paper proposes a new image encryption algorithm that has a lower computational complexity. Compared to those traditional encryption algorithms, the proposed scheme can be considered as a lightweight encryption algorithm.
Conference Paper: Measuring the Availability of Images Posted on Social Media Sites[Show abstract] [Hide abstract]
ABSTRACT: The amount of data stored in social media sites is humongous. It has very large in numbers and very diverse in variety. Researchers have already started using this information in various information security applications such as censorship resistance. When image data from social media sites are used in computational applications for hiding data or obfuscating data, it is important to retrieve the particular data used in the encoding process to retrieve the original data. Therefore, the availability of the image data is an important concern. In this paper, we investigated the availabilities of the images on Flickr. We examined nearly one million images hosted on Flickr and measured their availability in a two year period. We used the EXIF parameters normally generated by the cameras to further categorize the availabilities.
Conference Paper: A new image encryption algorithm using Truncated P-Fibonacci Bit-planes[Show abstract] [Hide abstract]
ABSTRACT: Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encrypt images. Simulation results and security analysis are provided to show the encryption performance of the proposed algorithm.
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.