The System Security is important for secure
communication. Biometric fingerprint authentication requires
physical presence of human being; it can’t be traceable as well
as forgeable. By using data compression method size of data can
be reduced and requires less memory space. When data is
transmitted through network secretly, there may be chance that
secret data may lost or damaged. In order to provide secrecy and
integrity to data, there are various security mechanism are
available. Biometric key can be generated from fingerprint
which is further used for encryption purpose. This paper shows
different mechanism which is necessary for secure transmission
of image data and the pros and cons of the algorithms to provide
an overview of the latest approaches in the field are discussed.
Prashant Dahake : Pursuing M.Tech from G.H. Raisoni college of
engineering, Nagpur, Maharashtra, India.
Sonali Nimbhorkar : working as assistant professor in G.H. Raisoni
College of Engineering Nagpur, Maharashtra, India and she has
published many no. of research papers in international journals and
her area of interest is network security.
mosaic image
encryption
data hiding
biometric and compression
PSNR
In this paper, different methods for mosaic image
creation, biometric key generation and image compression
algorithm are studied. Also various image parameters
were discussed.
[1] Gaurav Bhatnagar and Q. M. Jonathan Wu, “Biometric
Inspired Multimedia Encryption Based on Dual
Parameter Fractional Fourier Transform”, IEEE
Transaction on Systems, Man, and Cybernetics: Systems
2014.
[2] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible
Mosaic Image–A New Computer Art and Its Application
to Information Hiding", Information Forensics and
Security, IEEE Transactions on , vol.6, no.3, pp.936,945,
Sept. 2011.
[3] H. Narasimhan and S. Satheesh, “A randomized iterative
improvement algorithm for photo-mosaic generation”, in
Proc. NaBIC, Coimbatore, India, Dec. 2009, pp. 777–
781.
[4] S. Battiato, G. Di Blasi, G. Gallo, G. C. Guarnera, and
G. Puglisi, “Artificial mosaic by gradient vector flow”, in
Proc. Eurographics, Creete, Greece, Apr. 2008, pp. 53–
56.
[5] Hae-Yeoun Lee, “Generation of Photo-Mosaic Images
through Block Matching and Color Adjustment”,
International Journal of Computer, Information, Systems
and Control Engineering Vol:8 No:3, 2014.
[6] Suk-Ling Li, Kai-Chi Leung, Cheng, L. M. Chi-Kwong
Chan, "Data Hiding in Images by Adaptive LSB
Substitution Based on the Pixel-Value Differencing",
First International Conference on Innovative Computing,
Information and Control, vol.3, no., pp.58,61, Aug. 30
Sep-2006.
[7] Smitha, M., Jayanthi, V.E., Merlin A, "Image encryption
using separable reversible data hiding scheme", Fourth
International Conference on Computing,
Communications and Networking Technologies
(ICCCNT), vol., no., pp.1, 6, 4-6 July 2013.
[8] Naik, K. Pal, A.K., "An image cryptosystem based on
diffusion of significant bit-planes of a scrambled image
with generated binary key matrices" , Computational
Intelligence and Computing Research (ICCIC), 2013
IEEE International Conference on , vol., no., pp.1,4, 26-
28 Dec. 2013.
[9] Ullah, I; Iqbal, W.; Masood, A, "Selective region based
images encryption", 2nd National Conference
on Information Assurance (NCIA), vol., no., pp.125,128,
11-12 IEEE 2013.
[10] B. Raja Rao, Dr.E.V.V.Krishna Rao, “Finger Print
Parameter Based Cryptographic Key Generation”,
International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 6, November- December 2012.
[11] Gudkov, V.Y.; Ushmaev, O., "A Topologic Approach to
User-Dependent Key Extraction from Recognition (ICPR), 2010 20th, vol., no., pp.1281, 1284,
23-26 IEEE Aug. 2010.
[12] Haiyong Chen, Hongwei Sun, Kwok-Yan Lam, "Key
Management Using Biometrics," The First International
Symposium on Data, Privacy, and E-Commerce, 2007.,
vol., no., pp.321, 326, 1-3 IEEE 2007.
[13] R. Sashank Singhvi, S.P. Venkatachalam, P.M. Kannan
and V. Palanisamy, “Cryptography key generation using
biometrics”, International Conference on Control,
Automation, Communication and Energy Conservation
(INCACEC), Pp. 1 – 6, 2009.
[14] Gupta, K. Sharma, M. Sharma, P., "Lossless
compression based Kmp technique", Optimization,
Reliability, and Information Technology (ICROIT), 2014
International Conference on , vol., no., pp.401,404, 6-8
Feb. 2014.
[15] Chaudhari, R.E.; Dhok, S.B., "Wavelet transformed
based fast fractal image compression", International
Conference on Circuits, Systems, Communication and
Information Technology Applications (CSCITA), 2014,
vol., no., pp.65,69, 4-5 April 2014.
[16] Ponomarenko, N.N.; Egiazarian, K.O.; Lukin, Vladimir
V.; Astola, J.T., "High-Quality DCT-Based Image
Compression Using Partition Schemes", Signal
Processing Letters, IEEE , vol.14, no.2, pp.105,108, Feb.
2007.
[17] Jiantao Zhou, Xianming Liu, Oscar C. Au, Fellow, and
Yuan Yan Tang, “Designing an Efficient Image
Encryption-Then-Compression System via Prediction
Error Clustering and Random Permutation”, IEEE
Transactions on information forensic and
security,vol.9,No.1,january 2014.
[18] R. Tao, X. Meng, and Y. Wang, “Image encryption with
multiorders of fractional Fourier transforms,” IEEE
Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 734–738,
Dec. 2010.