Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Review on Various Methods for Secure Transmission of Images for Maintaining Image Integrity  
  Authors : Prashant Dahake; Sonali Nimbhorkar
  Cite as:

 

The System Security is important for secure communication. Biometric fingerprint authentication requires physical presence of human being; it can’t be traceable as well as forgeable. By using data compression method size of data can be reduced and requires less memory space. When data is transmitted through network secretly, there may be chance that secret data may lost or damaged. In order to provide secrecy and integrity to data, there are various security mechanism are available. Biometric key can be generated from fingerprint which is further used for encryption purpose. This paper shows different mechanism which is necessary for secure transmission of image data and the pros and cons of the algorithms to provide an overview of the latest approaches in the field are discussed.

 

Published In : IJCSN Journal Volume 3, Issue 6

Date of Publication : December 2014

Pages : 450 - 454

Figures : --

Tables : 01

Publication Link : Review on Various Methods for Secure Transmission of Images for Maintaining Image Integrity

 

 

 

Prashant Dahake : Pursuing M.Tech from G.H. Raisoni college of engineering, Nagpur, Maharashtra, India.

Sonali Nimbhorkar : working as assistant professor in G.H. Raisoni College of Engineering Nagpur, Maharashtra, India and she has published many no. of research papers in international journals and her area of interest is network security.

 

 

 

 

 

 

 

mosaic image

encryption

data hiding

biometric and compression

PSNR

In this paper, different methods for mosaic image creation, biometric key generation and image compression algorithm are studied. Also various image parameters were discussed.

 

 

 

 

 

 

 

 

 

[1] Gaurav Bhatnagar and Q. M. Jonathan Wu, “Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE Transaction on Systems, Man, and Cybernetics: Systems 2014. [2] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding", Information Forensics and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011. [3] H. Narasimhan and S. Satheesh, “A randomized iterative improvement algorithm for photo-mosaic generation”, in Proc. NaBIC, Coimbatore, India, Dec. 2009, pp. 777– 781. [4] S. Battiato, G. Di Blasi, G. Gallo, G. C. Guarnera, and G. Puglisi, “Artificial mosaic by gradient vector flow”, in Proc. Eurographics, Creete, Greece, Apr. 2008, pp. 53– 56. [5] Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching and Color Adjustment”, International Journal of Computer, Information, Systems and Control Engineering Vol:8 No:3, 2014. [6] Suk-Ling Li, Kai-Chi Leung, Cheng, L. M. Chi-Kwong Chan, "Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing", First International Conference on Innovative Computing, Information and Control, vol.3, no., pp.58,61, Aug. 30 Sep-2006. [7] Smitha, M., Jayanthi, V.E., Merlin A, "Image encryption using separable reversible data hiding scheme", Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), vol., no., pp.1, 6, 4-6 July 2013. [8] Naik, K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices" , Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on , vol., no., pp.1,4, 26- 28 Dec. 2013. [9] Ullah, I; Iqbal, W.; Masood, A, "Selective region based images encryption", 2nd National Conference on Information Assurance (NCIA), vol., no., pp.125,128, 11-12 IEEE 2013. [10] B. Raja Rao, Dr.E.V.V.Krishna Rao, “Finger Print Parameter Based Cryptographic Key Generation”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012. [11] Gudkov, V.Y.; Ushmaev, O., "A Topologic Approach to User-Dependent Key Extraction from Recognition (ICPR), 2010 20th, vol., no., pp.1281, 1284, 23-26 IEEE Aug. 2010. [12] Haiyong Chen, Hongwei Sun, Kwok-Yan Lam, "Key Management Using Biometrics," The First International Symposium on Data, Privacy, and E-Commerce, 2007., vol., no., pp.321, 326, 1-3 IEEE 2007. [13] R. Sashank Singhvi, S.P. Venkatachalam, P.M. Kannan and V. Palanisamy, “Cryptography key generation using biometrics”, International Conference on Control, Automation, Communication and Energy Conservation (INCACEC), Pp. 1 – 6, 2009. [14] Gupta, K. Sharma, M. Sharma, P., "Lossless compression based Kmp technique", Optimization, Reliability, and Information Technology (ICROIT), 2014 International Conference on , vol., no., pp.401,404, 6-8 Feb. 2014. [15] Chaudhari, R.E.; Dhok, S.B., "Wavelet transformed based fast fractal image compression", International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), 2014, vol., no., pp.65,69, 4-5 April 2014. [16] Ponomarenko, N.N.; Egiazarian, K.O.; Lukin, Vladimir V.; Astola, J.T., "High-Quality DCT-Based Image Compression Using Partition Schemes", Signal Processing Letters, IEEE , vol.14, no.2, pp.105,108, Feb. 2007. [17] Jiantao Zhou, Xianming Liu, Oscar C. Au, Fellow, and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, IEEE Transactions on information forensic and security,vol.9,No.1,january 2014. [18] R. Tao, X. Meng, and Y. Wang, “Image encryption with multiorders of fractional Fourier transforms,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 734–738, Dec. 2010.