Conference Paper

Proficient Evaluation of Visual Cryptography using Transposition Cipher and Bit Reversal Techniques

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The proposed insertion of the simple low computational burden bit reversal operation has been proven in the literature [4], [36], [45], [46] and experimentally that it leads to significantly improved randomness and statistical characteristics of the overall ciphering process. • The Diffusion II block is the second diffusion block in the proposed cryptosystem. ...
Article
Full-text available
The secrecy of various forms of multimedia data constitutes a significant aspect of the cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image encryption has been investigated in the literature using different transformation domains, such as spatial, discrete Fourier transform, wavelet transform, etc. Although some frequency-based cryptosystems exhibit favorable confusion properties, they may suffer in terms of diffusion properties and fail in terms of some statistical characteristics, which make them vulnerable to various statistical, analytical, and differential attacks. In this regard, we adopt a dual-domain (wavelet and spatial domains) image cryptosystem and propose a novel diffusion process in the wavelet domain to address the problem of weak resilience against the aforementioned attacks. The proposed diffusion process in the wavelet domain is applied only on 1/16 of the pixels of the plain image, which makes it computationally more efficient compared to the existing wavelet domain-based works. In addition, the proposed cryptosystem solves the bell shape histogram problem associated with some frequency-based cryptosystems, which has been verified using different performance metrics in our simulation results. We also introduce a novel key-dependent chaotic variable generator to generate the required initial conditions and control parameters for the adopted enhanced chaotic map. The superiority of the proposed algorithm compared to some of the existing state-of-the-art has been verified through various performance metrics. These include different types of correlation coefficients, histogram visualization, histogram deviation, irregular deviation, mean square error, chi-square test, entropy test, and differential analysis.
Article
Full-text available
As we know that today's era is working on very advance techniques with internet and traditional encryption techniques are just converting the readable images into some unreadable format i.e. cipher text format. This encrypted cipher text can be very conveniently transmitted over the network, but anyone who gets the key can easily get the secret encrypted message from cipher text, but the new and advance Secret sharing scheme is a process of sharing and transmitting the images over the network. But the major drawback over here is that transmitting images over network pulls attackers attention as the images are in noise like format. In the recent study, many researchers tried to make the VSS system more secure. This paper shows the survey of the studies done earlier and thereby analyses the drawbacks and proposed a new technique considering VSS.
Article
Full-text available
Recently, an image encryption scheme combining bit-plane extraction with multiple chaotic maps (IESBC) was proposed. The scheme extracts binary bit planes from the plain-image and performs bit-level permutation and confusion, which are controlled by a pseudo-random sequence and a random image generated by the Logistic map, respectively. As the rows and columns of the four MSBPs are permuted with the same pseudo-random sequence and the encryption process does not involve the statistical characteristics of the plain-image, the equivalent secret key of IESBC can be disclosed in the scenario of known/chosen-plaintext attacks. This paper analyzes the weak points of IESBC and proposes a known-plaintext attack and a chosen-plaintext attack on it. Furthermore, we proposed an enhanced scheme to fix the shortcomings and resist the proposed plaintext attacks. The experimental simulation results demonstrated that the enhanced scheme is excellent in terms of various cryptographic metrics.
Article
Full-text available
Content based image retrieval (CBIR) depends on several factors, such as, feature extraction method (the usage of appropriate features in CBIR), similarity measurement method and mathematical transform (chosen to calculate effective features), feedback usage and etc. All these factors are important in CBIR to enhance image retrieval accuracy and effort. An efficient retrieval mechanism can be achieved by improving some of its influencing factors. For this purpose, this paper provides a brief review of the factors that have an impact (positive or negative) on the CBIR. The usage of low-level image features such as shape, texture and color are assembling information from an image for recuperation. In this paper, various spectral methods of texture features extraction are discussed. In addition, all the current methods of demonstrating image texture features in the modern literature have been investigated for the purpose to achieve the research’s aim (to discover the most adequate features in CBIR that support image retrieval quality and retrieve the relevant images to the query image). This paper also addresses the shortcomings of one spectral approach and the solutions provided by another approach for finding the most effective approach in texture feature representation.
Article
Full-text available
This paper describes the results of efficient measuring methods whereby the encryption capability of four algorithms are evaluated. Specifically this work focuses on measuring the encryption quality, the memory requirement and the execution time of the encryption as an indicator to the usage of the software and the hardware. Also, the security analysis of these schemes is investigated from cryptographic viewpoint; statistical and differential attacks. A number of requirements are therefore identified upon which the algorithms are evaluated. The results of the efficient measuring methods show that each algorithm has its own strengths and weaknesses and no single encryption mechanism is able to get the maximum security with minimum execution time. The paper proposes that it may be possible to develop new algorithms providing adequate means of efficiency with acceptable security.
Conference Paper
The proposed multiplier pertaining to concepts of Vedic Mathematics was designed to reduce propagation delay, design complexity as well as to optimize power consumption in comparison to conventional multipliers. A multiplier is a key element in DSP systems, serving as a building block of most computational digital systems, therefore, speed and power consumption are two important parameters of design. The Vedic Multiplier computed the partial products in a simultaneous manner and the carry was propagated using ripple carry adders. The higher bit-multipliers were designed using lower-bit multipliers, giving the multiplier a modular structure, thereby reducing the design complexity. The designed 8×8 Vedic Multiplier was coded in VHDL. The results were simulated using the Xilinx Tool and synthesized using System Generator tool on the FPGA board Spartan 1×45−324. Upon simulation of the results, the Vedic Multiplier was found to restrict the delay, compared to the Array and Booth Multipliers.
Article
method for image encryption with two stages has been described in the present study. In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, number of bits equal to the length of password are rotated and then reversed. In second stage, extended hill cipher technique is applied by using involutory matrix generated by same password given in second stage to make encryption more secured. Performance of the proposed technique is evaluated by Statistical Analysis, Differential Analysis and also quantifying Mean Square Error (MSE) & Peak Signal to Noise Ratio (PSNR). The proposed approach is implemented for different images using MATLAB. Decryption involves the reverse process of encryption.
An overview of visual cryptography techniques. Multimedia Tools and Applications
  • ibrahim
Content Based Image Retrieval System Implementation through Neural Network
  • gururaj
Visual Cryptography with Cloud Computing for Personal Security of the User
  • Harita Kundalia
  • Deepak Sharma
Content Based Image Retrieval System Implementation through Neural Network
  • C Gururaj
  • D Jayadevappa
  • Satish Tunga
Gesture Controlled Robot
  • K N Lavanya
  • B R Ramyashree
  • T Nischitha
  • C Asha
  • Gururaj
A Study of Different Content Based Image Retrieval Techniques
  • C Gururaj
  • D Jayadevappa
  • Satish Tunga