Image Encryption Technique based on the Entropy Value of a Random Block
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
The use of digital images in most fields of information technology systems makes these images usually contain confidential information. When these images transmitted via the Internet especially in the Cloud, it becomes necessary to protect these images in a way that ensure putting the confidential information that are contained far away from the attackers. A proposed image encryption technique has been presented in this work. This technique used a secret key that is extracted from the image content itself. Therefore, there is no need to find a secret channel to exchange any key where, sender and receiver authenticate each other with regards to a shared secret key extracted from the image. The technique constructs its secret key that is used to encrypt the image, based on the entropy values of a set of randomly selected blocks from the image itself. Vairous experiments have been conducted to evaluate the strength and performance of the technique. The experimental results shows that the proposed technique can be used effectively in the field of image security to protect and authenticate images.
Authors and Affiliations
Mohammed A. F. Al-Husainy, Diaa Mohammed Uliyan
Hybrid Concatenated LDPC Codes with LTE Modulation Schemes
In a communication system, the LDPC code is considered as a good performance error correcting code which reaches near Shannon limit. In this paper a hybrid LDPC code is proposed, the hybrid term here refers to the serial...
Development of a Mobile GIS Property Mapping Application using Mobile Cloud Computing
This study presents the development of a mobile GIS Property mapping application for use by local authorities in developing countries. Attempts to develop property mapping applications especially in developing countries...
Integration of Qos Aspects in the Cloud Service Research and Selection System
Cloud Computing is a business model revolution more than a technological one. It capitalized on various technologies that have proved themselves and reshaped the use of computers by replacing their local use by a central...
Cobit 5-Based Approach for IT Project Portfolio Management: Application to a Moroccan University
Considering the problem of the management of IT project portfolios in universities, University managers face a lot of uncertainties when prioritizing projects that make up their portfolio. The alignment with their strate...
The Role of Technical Analysis Indicators over Equity Market (NOMU) with R Programing Language
The stock market is a potent, fickle and fast-changing domain. Unanticipated market occurrences and unstructured financial information complicate predicting future market responses. A tool that continues to be advantageo...