2,279 research outputs found

    Classification of novel selected region of interest for color image encryption

    Get PDF
    Securing digital image in exchanging huge multimedia data over internet with limited bandwidth is a significant and sensitive issue. Selective image encryption being an effective method for reducing the amount of encrypted data can achieve adequate security enhancement. Determining and selecting the region of interest in digital color images is challenging for selective image encryption due to their complex structure and distinct regions of varying importance. We propose a new feature in acquiring and selecting Region of Interest (ROI) for the color images to develop a selective encryption scheme. The hybrid domain is used to encrypt regions based on chaotic map approach which automatically generates secret key. This new attribute is a vitality facet representing the noteworthy part of the color image. The security performance of selective image encryption is found to enhance considerably based on the rates of encrypted area selection. Computation is performed using MATLAB R2008a codes on eight images (Lena, Pepper, Splash, Airplane, House, Tiffany, Baboon and Sailboat) each of size 512*512 pixels obtained from standard USC-SIPI Image Database. A block size of 128*128 pixels with threshold levels 0.0017 and 0.48 are employed. Results are analyzed and compared with edge detection method using the same algorithm. Encrypted area, entropy and correlation coefficients performances reveal that the proposed scheme achieves good alternative in the confined region of interest, fulfills the desired confidentiality and protects image privacy

    A new partial image encryption method for document images using variance based quad tree decomposition

    Get PDF
    The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes

    Image hiding in audio file using chaotic method

    Get PDF
    In this paper, we propose an efficient image hiding method that combines image encryption and chaotic mapping to introduce adaptive data hiding for improving the security and robustness of image data hiding in cover audio. The feasibility of using chaotic maps to hide encrypted image in the high frequency band of the audio is investigated. The proposed method was based on hiding the image data in the noisiest part of the audio, which is the high frequency band that was extracted by the zero crossing filter. Six types of digital images were used, each of size fit the length of used audio, this to facilitate the process of hiding them among the audio samples. The input image was encrypted by a one-time pad method, then its bits were hidden in the audio by the chaotic map. The process of retrieving the image from the audio was in the opposite way, where the image data was extracted from the high frequency band of the audio file, and then the extracted image was decrypted to produce the retrieved image. Four qualitative metrics were used to evaluate the hiding method in two paths: the first depends on comparing the retrieved image with the original image, while the second depends on comparing the audio containing the image data with the original audio once, and another time by comparing the cover audio with the original audio. The results of the quality metrics proved the efficiency of the proposed method, and it showed a slight and unnoticed effect between the research materials, which indicates the success of the hiding process and the validity of the research path
    corecore