Enhancement of the Security of a Digital Image using the Moduli Set
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed to deal with this security issues. In this paper, we propose a new security enhancement scheme for digital images. The scheme employs two methods: Residue Number System (RNS) to Decimal (R/D) encoding and decoding using the moduli set and a modified Arnold transform algorithm. The encryption process uses RNS to Decimal (D/R) converter (encoder) to decompose a plain image into three residual images. The residual images are fused together and encrypted using the modified Arnold transform. In the decryption process, the modified Arnold transform is used to decrypt the cipher image which is then decomposed into three residual images. An R/D converter (decoder) is then used to recover the plain image. The proposed scheme is simulated on digital images of different sizes using MATLAB. The obtained results show that the scheme can effectively encrypt and decrypt images without lost of any inherent information. The scheme also offers firm resistance to statistical attacks such as histogram, brute-force, correlation coefficient and key sensitivity. It can be applied to any shape of image and allow unlimited number of iterations to be performed as opposed to best known state of the art.
Authors and Affiliations
S. Alhassan, , K. A. Gbolagade
Anomaly Exposure in Network Traffic and its collision: a Survey
Antagonistic network traffic is frequently "diverse” from kind traffic in ways that can be classified without knowing the way of the attack. Anomaly exposure is a significant problem that has been investigates wi...
Review of authentication and digital signature methods in Mobile ad hoc network
Mobile ad-hoc network is wireless network composed of different nodes communicate with each other without having to establish infrastructure. In this paper technique proposed here to provide the data security of su...
Surface and Embedded Micro Strip Lines Characteristic Impedance and its Signal Propagation Delay Time in Optical Spectrum Transmission Regions
This paper has presented the characteristic impedance and signal propagation delay time for both surface and embedded microstrip lines that comprise a conducting strip line with width w, thickness t of conductivity...
A Performance Analysis of Energy Aware and Link Stability based Routing Protocols for MANET
Energy efficient routing is be one of the most important design criterion for MANET since mobile nodes are battery powered with limited capacity and which cannot be recharged when ever needed. So, MANET routing is...
Optimized Surveillance Solution for Unattended Baggage Recognition
Abstract—The system automatically recognize activities around protected area to improve safety and security by multiplexing hundreds of video streams in real time. Object tracking method has important role in real tim...