August 2024
·
17 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
August 2024
·
17 Reads
April 2023
·
3 Reads
Lecture Notes in Electrical Engineering
The technique for protecting information whether data or image is called cryptography. In cryptography a data or image is encrypted in such format that it hides the original message in a form which is different and on decryption gives the same message as aftermath. Thus, cryptography can also be referred as an art which is used to secure the data (text/image) by transforming it into a different form. The encrypted form of data or image is called cipher text or image. It is also important for an encryption technique to be efficient; it is said to be efficient if it has high robustness against attacks, has high security and it owes low correlation between encrypted and original image. An ample of survey papers and techniques could be found in literatures taking into account few approaches but still an unerring analysis is needed, that thoroughly takes into account a number of variety of approaches and draw comparison between them highlighting the multiple performance constraints under the variety of probable menaces. In this paper multiple approaches for conventional, modern, chaotic and quantum-chaotic are considered and an absolute examination has performed based on multiple performance constraints. To measure the effectiveness, the techniques are implemented on PYTHON-3.8.8. It is analyzed that the techniques based of Chaos and Quantum-Chaos are magnificent in comparison to others implemented in literatures under most of extensive menaces and also, they are able to resist brute force attacks as a large key size is provided by these approaches.KeywordsAttacksQuantum-chaosChaosConventionalKey sizePerformance constraintsBrute Force attack
October 2022
·
90 Reads
·
11 Citations
Protection of information (data/images) is crucial in the colossal and ever-expanding domain of digital transfer. Cryptography is one of the well-known admired solutions to preserve images’ confidentiality over highly unreliable and unrestricted public media. Researchers propose numerous techniques to accomplish the ever-growing need for security. In continuation, this paper aims to develop a robust image encryption scheme that accomplishes the task of protection by employing a series of specially designed substitution box, permutation box and diffusion box by taking encryption keys as input which is consequently generated from a Generative Adversarial Network (GAN), an unsupervised deep learning algorithm trained on the Logistic Maps. The substitution box performs byte-level substitution using two different schemes, and the other two perform encryption at both bit-level and byte-level, which helps it withstand a wide range of attacks. A dataset with 789 standard images is taken for experimentation, partitioned into three sets according to size (128, 256, and 512). The projected scheme outperforms state-of-the-art methods with better performance since the trained generator passed the comprehensive tests; it also withstands most of the probable attacks available in the literature. GAN was subjected to the chi-square test, runs test, and NIST test suite to check the randomness of the Pseudo-Random Number Generator. The projected algorithm offers promising visual, statistical, robustness, and quantitative analysis results.
May 2022
·
40 Reads
·
1 Citation
Intact communication of covert information is the key requirement of all the applications like medical, military, business transactions. For that matter need for a proficient security mechanism is apparent. This paper proposes a hybrid design containing Quantum based confusion and diffusion processes followed by Lifting Wavelet Transform (LWT) steganography mechanism. Moreover, a provisional compression mechanism is also employed. Secret data is initially checked for the frequency of characters, which is the decisive factor for the inclusion of compression operation. This data undergoes a bit-level confusion stage, with the help of a random key generated by Quantum based key scheduling algorithm. The subsequent process is diffusion, in which each perplexed bit undergoes XOR operation with random keys generated by a centralized key generation mechanism. Finally, this data is embedded into the Lifting Wavelet Transformed cover image. The mingled data bits are stored at random locations of carrier Image, ready to commune in an insecure site. The usage of simple and effective stages provides time efficiency, robustness, and power of confidentiality predominantly in a highly effective way compared to the available mechanism. Implementation using MATLAB shows that secret information is highly secure.
May 2021
·
101 Reads
·
7 Citations
Telemedicine is a technology-based substitute for conventional health care facilities. It symbolizes the practice of medication via indirect means. The foremost requirement for such remote healthcare practices is the communication of highly sensitive data over insecure networks, which demands very high protection of different types of health-related information such as Electronic Patient Record (EPR) and Related Medical images. Consequently, there is a stern need to develop algorithms to secure all confidential information for overall well being. This paper is an effort to propose one multilayer protection mechanism, which not only secures the patient’s transcript but also protects associated medical Images. EPR is embedded in the original medical image resulting in a watermarked medical image, which is further hidden in the reference image. But these two relevant records are given multiple strata of security before concealing and exposed to the insecure channel. Compression and Quantum Encryption of EPR are done, which is then embed into LWT transformed Medical Image, followed by scrambling and compression of all the planes of a watermarked medical image before embedding in different bands of LWT (Lifting Wavelet Transform), transformed reference image. This stride of hiding image is mandatory because original and watermarked medical images are very similar, thus prone to attacks. In order to avoid this, an image steganography technique is used to change the watermarked medical image’s visual structure, which is also referred to as visually meaningful encryption, as popular encryption algorithms give noise-like textures that can attract attackers. For authentication on the accession of records, biometric-based detection along with hash algorithm is also incorporated. Overall results (implemented using MATLAB) show that the proposed mechanism provides a highly secure and authentic medical healthcare system.
February 2021
·
538 Reads
·
12 Citations
To compete with the rising apprehension of data/image security, corporations are endorsing cryptography for protection. A high-quality image encryption scheme must ensure high Entropy, high key sensitivity, ability to resist known and chosen-plaintext attack, large keyspace, high randomness, and resistance towards differential attack. To accomplish this need, an improved bit plane image encryption scheme using RC4 and Quantum Chaotic behavior is proposed. In the projected mechanism, to ensure less bandwidth usage and efficient transmission of data over the network, YCbCr format is used. The keys are generated using the s- logistic map due to its high randomness, non-periodic behavior, and large keyspace to resist brute-force attacks. This contemporary encryption process includes confusion and diffusion stages. For the confusion stage, the Channel transformation process is employed, which helps in attaining randomness. A multilevel diffusion stage is implemented using CBC (Cipher Block chaining block), Zigzag permutation, and Inter bit plane permutation process. Additionally, the technique’s randomness and complexity are strengthened by utilizing RC4 to generate S-box for byte substitution. The projected framework is implemented in MATLAB and assessed using various performance metrics like mean square error (MSE), Peak Signal to noise ratio (PSNR), Entropy, and others referenced in writing. Result analysis illustrates that the proposed model reveals its capacity to conceal the confidentiality of information of the transmitted image and is more efficient than its classical counterpart. Its security is verified by the statistical, key-space, and key analysis.
October 2020
·
140 Reads
·
14 Citations
The emerging demand for sharing medical digital images amid specialists and hospitals for enhanced and precise analysis necessitates protecting patients’ privacy. The communication of such information over available channels is very much susceptible to numerous security threats. The contemporary defence level is not strong enough for maintaining the protection and integrity of information in a required field like the human healthcare sector. There is a stern need for a robust safety mechanism. In this paper, a model is created by harmonizing various cryptography and steganography techniques to secure secret diagnostic information. This proposal provides multi-level security by utilizing a blend of Rivest, Shamir, and Adleman (RSA) and Quantum Chaos (QC) for Encryption mechanism as the first level and the Improved BPCS (IBPCS) steganography as the next step to conceal the resultant cipher in a cover image. Both image formats, Grayscale, and colored are employed as the cover images to hide various volumes of the confidential data. The proposed framework is implemented in MATLAB and assessed using different performance metrics like mean square error (MSE), Peak Signal to noise ratio (PSNR), bit error rate (BER), structural component (SC), structural similarity (SSIM), and so forth that are referenced in writing. Appraisal and comparison with state-of-art methods are also made after applying the different attacks (geometric, Gaussian, salt and pepper, flipping, etc.) on the stego image. Result analysis illustrates that the proposed model reveals its capacity to conceal the confidential patient’s information into a transmitted cover image with high imperceptibility and robustness in the presence and absence of attacks.
October 2020
·
726 Reads
·
12 Citations
Cryptography (encryption/decryption) is one of the prevailing mechanisms for protection of information (data or image) in the growing era of computerized exchange. It is the art of securing data/image by changing it into an unreadable format, called cipher text/image. Encryption mechanism is said to be efficient if it offers high security and robustness against attacks, and endow with very low correlation value between cipher and the original information. Enormous techniques and corresponding survey papers are available in literature considering only a few methods or parameters into account, but there is a stern need of investigation, which thoroughly considers vast variety of techniques and compares them in the light of numerous performance metrics under the influence of wide variety of probable threats. In view of the fact, this paper has taken account of almost all traditional, modern, chaotic, and quantum-chaotic based methods under the influence of prevalent intimidation and does a comprehensive investigation based on various performance metrics. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014. Chaos and Quantum based algorithms are the superlative in comparison to others presented in literature under most of the extensive threats (attacks, noises etc.) and can resist brute force attacks due to large key space. In addition, suggestions for future scope have been given.
August 2020
·
78 Reads
·
6 Citations
International Journal of Mathematical Sciences and Computing
January 2020
·
113 Reads
·
12 Citations
Protection of manuscript accessible online is always an apprehension for researchers. Many ideas had come up for copyright protection and authentication of such documents. One of the admired keys to provide safety to the owner’s data is digital watermarking. It is the process of hiding the secret message (text, audio, image, logo, signature) into the document for providing authentication. A watermarking mechanism is said to be effectual if it offers high imperceptibility, robustness against attacks, security and last but not the least has the high correlation value of extracted watermark with the original one. Numerous survey papers are available in literature taking only a few techniques or parameters into account, but this paper takes almost all frequency domain (standalone and hybrid) methods in absence and presence of geometric and simple attacks and does an exhaustive analysis on the same. MATLAB software is used for implementation. Results illustrate the superlative technique under the influence of simple attacks is DWT-FFT, and under geometric attacks DWT-SVD is preeminent.
... Later, Ding et al. [6] introduced DeepKeyGen method, a streaming cipher generator, which combines stream ciphers with GAN-based key generation to safeguard medical images. Similarly, Singh et al. [7] proposed an encryption model that employs GAN-generated encryption keys alongside substitution, permutation, and diffusion algorithms. These approaches demonstrate resilience against decryption attempts without both the key and model. ...
October 2022
... One common application of quantum algorithms in medical image watermarking is the encryption of watermark information to enhance its security. For example, to protect electronic patient records (EPRs) and medical images, Dhall et al. introduced a multilayered secure authentic watermarking strategy designed for medical applications (Dhall and Gupta 2021). A quantum logistic map (QLM) was utilized to encrypt the compressed EPR before embedding the EPR into the medical image to generate a watermarked medical image. ...
May 2021
... With the fast growth in telemedicine applications, the communication of a patient's diagnostic medical data has become more common in the healthcare sector [8], [9]. Technically, healthcare data should be secured using potential techniques of security, which provide more protection for sensitive data from various attacks [10]- [12]. ...
October 2020
... Gaffar et al. 16 utilized a Gingerbread man map to shuffle picture pixels during the transposition stage, and the RC4A (Rivest Cipher 4A) cipher technique was utilized to bit-wise XOR the key stream and the image pixels during the replacement step. Malik, et al. 17 proposed an approach employing an image bit plane cryptographic algorithm that combines logistic map and RC4 using CBC (Cipher Block Chaining) mode. In the diffusion phase, CBC mode is employed. ...
February 2021
... One of the concern areas with information hiding is steganalogy which has attracted more attention since last decade [1,2]. It has played an important role in secret communication and information [3,4] such as medical and healthcare security [5], e-military [6], and also forensics [7] matters from medieval times through the 20th century. ...
August 2020
International Journal of Mathematical Sciences and Computing
... Image encryption serves as a fundamental method to safeguard the content of images [1]. Usual encryption method like advanced encryption standard, data encryption standard, international data encryption algorithm, and Rivest-Shamir-Adleman have been used for encrypting image data [2]. However, these algorithms face challenges when applied to digital image encryption due to the inherent strong correlations among neighbouring pixels, high data redundancy, and large data sizes. ...
October 2020
... LSB replacement of DCT transformed pixel values is used. [16] projected a mechanism consisted of Huffman compression and hierarchical visual encryption of records to be protected. This altered information is then embedded into the selected band of DWT transformed cover image. ...
October 2019
... Former converts secret information into the unreadable form for the intruders and later hides the private data in some carrier to not be perceived by an intermediary. However, a single layer of security is not sufficient for the protection of vital records; hence multiple stratums are employed to attain requisite enhanced safety [7]. Though copious hybrid mechanisms are available in the literature, with escalating security threats, the need for further enhanced multilevel protection algorithms for given objectives is always there in the practical scenario. ...
January 2020
... In order to ensure that the embedded watermark has high security, the watermark image is usually properly encrypted before embedding. The main concerns in the design of schemes for image watermarking are the selection of the embedding domain and embedding location, as well as the design of the embedding and extraction algorithms 7 . In recent decades, various researchers have advocated the use of two or more transformations to create new watermarking methods, and multiple transformations can be used to improve system performance 8 . ...
January 2020
... The results demonstrate the algorithm's potential to securely transmit sensitive agricultural data collected by drones, ensuring that critical information remains protected against unauthorized access. To prove the effectiveness of the proposed approach in the criteria for evaluating steganography methods, which are [47][48][49]: ...
September 2018
International Journal of Computer Network and Information Security