Preview

computer

Better Essays
Open Document
Open Document
1223 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
computer
Considering digital image features with high volumes and video data, especially in real-time applications, the use of classic encryption methods like DES, AES, ..., is not efficient in terms of being time cosuming. In this article, a new method is proposed to encrypt digital images, using chos systems and utilizing DNA patterns. A central idea in the method suggested is to produce a pseudo-random DNA strand using chaos functions, which an encrypted strand is created, using the random strand and the strand produced from the main image. Also, in the method, multiple tables are used; in the article how to create and use these tables are addressed. One of benefits of the method is the small volumes of data that are accessed by utilizing DNA patterns. Experimental results and security assessment experiments indicate that the method suggested has an ideal level of security.
With development of computer networks and the increasing use of Internet, the discussion of security in transferring data has been put forward as one of important subjects. The reason for it is the accessibility of data in Internet, and their easy access by authorized and unauthorized people. Data packets in Internet pass several intermediate public networks before they reach the target; this makes it easy that other people access data. In case of lack of protection of these data packets, it is impossible to work with Internet.
One of methods of data protection is to encrypt them. By data encryption, if there is unauthorized access to data by people, the possibility of using data will be impossible.
Also, with development of new applications, especially in commercial, military areas; video conferences, .., the need for quick and secure systems for digital images is increasing more and more. Recently, many algorithms [] have been presented, which have been suggested as methods of digital image encryption.
In general, encryption algorithms and techniques are classified in groups including

You May Also Find These Documents Helpful

  • Satisfactory Essays

    TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works offers powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Encrypting Data at Rest – encrypt all sensitive data when it is at rest on the device and on removable media used by the device. Employ storage encryption…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    ▪ When the data is stored on mobile devices and media, protections and encryption mechanisms must be employed.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    What is Steganography?

    • 3206 Words
    • 13 Pages

    Genetic algorithm based method of message hiding employs the features of both Cryptography and Steganography to provide high level protection of secret information .The developed system generates the CRC of the message to be hidden, compresses it to achieve faster speed of transmission and asks for a JPEG image which acts as a carrier of the message. The compressed message is then embedded into JPEG image by P01 algorithm using a secret key at the sending end, hence generating a crypt-stego JPEG image. At the receiving end, the compressed message is extracted from crypt-stego using the same secret key which was used for embedding. The use of cryptography along with genetic algorithm makes the proposed “Crypt-Stegnography” technique more secure and maintains privacy and secrecy of the message. Genetic algorithm maintains appropriate peak signal to noise ratio of JPEG images which results in lesser probability of detection of secret message. The use of P01 technique ensures high embedding capacity. The experiments carried out through the developed system proves higher embedding capacity and maintains secrecy of data.…

    • 3206 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    real-time DSP implementation of background/foreground segmentation, MPEG-4 encoding and scrambling. The scrambling is using the transform-domain approach where 63 ac coefficients are pseudorandomly scrambled. Results are shown in Fig. 11. It can be observed that both pedestrians and moving cars are successfully scrambled. V. CONCLUSION In this paper, we have described a technique to address the issue of privacy in video surveillance. Regions of interest, assumed to correspond to privacy-sensitive data, are scrambled. In one approach, scrambling is applied in the transform-domain by pseudorandomly flipping the sign of transform ac coefficients or by pseudorandomly modifying dc coefficients. In a second approach, scrambling is performed directly on the compressed codestream by pseudorandomly inversing some bits corresponding to ac coefficients. Simulation results show that the proposed scrambling techniques are successful at concealing privacy-sensitive information while leaving the scene comprehensible. The protection depends on a secret encryption key and the process is fully reversible for authorized users, e.g., law-enforcement authorities, in possession of the latter. After scrambling, the resulting codestream is still standard compliant. Simulations results show that this is obtained with a negligible impact on coding efficiency and a small computational complexity. Moreover, the scrambling process is flexible and the amount of distortion introduced…

    • 4363 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Cryptography and Matrices

    • 1619 Words
    • 6 Pages

    Cryptography has played an important role in information and communication security for thousand years. It was first invented due to the need to maintain the secrecy of information transmitted over public lines. The word cryptography came from the Greek words kryptos and graphein, which respectively mean hidden and writing (Damico). Since the ancient days, many forms of cryptography have been created. And in 1929, Lester S. Hill, an American mathematician and educator, introduced a method of cryptography, named Hill cipher, which was based on linear algebra applications. (Anton Rorres 719) Like other forms’, Hill cipher’s basic idea is that by using matrix multiplication, an original message – plaintext – will be converted into a coded message, called ciphertext. This converting process has three main steps: translating the message into a matrix, then multiplying with a cipher matrix to create the encrypted one, and finally converting it into letters.…

    • 1619 Words
    • 6 Pages
    Better Essays
  • Good Essays

    |10 |Celik M, Sharma GM, Tekalp.|“Lossless watermarking for image authentication: a new framework and an |…

    • 13910 Words
    • 56 Pages
    Good Essays
  • Powerful Essays

    Jpeg-Jsteg

    • 5547 Words
    • 23 Pages

    References: Adelson, E. (1990). Digital Signal Encoding and Decoding Apparatus. U.S. Patent, No. 4939515. Chang, C.C., T.S. Chen and L.Z. Chung (2002). A steganographic method based upon JPEG and quantization table modification. Information Sciences, 141, 123–138. Cox, I.J., J. Kilian, F.T. Leighton and T. Shamoon (1997). Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing, 6(12), 1673–1687. Daly, S. (1994). A visual model for optimizing the design of image processing algorithms. In Proceedings of IEEE International Conference on Image Processing, Austin, Texas, U.S.A., Nov., Vol. II. pp. 16–20. DES Encryption Standard (DES), National Bureau of Standards (U.S.) (1977). Federal Information Processing Standards Publication, 46, National Technical Information Service, Springfield, VA. Johnson, N., and S. Jajodia (1998). Steganalysis of images created using current steganography software. In Proceedings of Information Hiding Workshop, Portland, Oregon, USA, April, LNCS 1525. pp. 273–289. Hung, A.C. (1993). PVRG–JPEG CODEC, Technical Report, Portable Video Research Group, Stanford University. Kobayashi, H., Y. Noguchi and H. Kiya (1999). A method of embedding binary data into JPEG bitstreams. IEICE Trans. Information and Systems, J83-D-II, 1469–1476. Noguchi, Y., H. Kobayashi and H. Kiya (2000). A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder. In Proceedings of IEEE International Conference on Image Processing, Vancouver, BC, Canada, 10–13 Sept., Vol. 1. pp. 577–580. Pennebaker, W., and J. Mitchell (1993). JPEG Still Image Data Compression Standard. Van Nostrand Reinhold, New York. Van Schyndel, R.G., A.Z. Tirkel and C.F. Osborne (1994). A digital watermark. In Proceedings of the First IEEE International Conference on Image Processing, Austin, Texas, USA, Vol. 11. pp. 86–90. Wandell, B.A. (1995). Foundations of Vision. Sinuaer, Sunderland, MA. Wang, R.Z., C.F. Lin and J.C. Lin (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34, 671–683. Wolfgang, R.B., C.I. Podilchuk and E.J. Delp (1999). Perceptual watermarks for digital images and video. In Proc. IEEE 87. pp. 1108–1126.…

    • 5547 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Data Encryption Standard

    • 2617 Words
    • 11 Pages

    Bibliography: [1] Data Encryption Standard, Federal Information Processing Standards Publication (FIPS PUB) 46, National Bureau of Standards, Washington, DC (1977). [2] Data Encryption Algorithm (DEA), ANSI X3.92-1981, American National Standards Institute, New York.…

    • 2617 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Rao, S. et al. (2011). Secure Image Steganography Based On Randomized Sequence Of Cipher Bits. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5945256 [Accessed: 17 Feb 2013].…

    • 2772 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Chaos sequences are created by chaotic mapping which are random sequences. These structures are too complex and difficult to analyze and predict [4-8]. Considering these features, many encryption algorithms based on chaos have been investigated and studied extensively [9-14]. In [9] a new image encryption algorithm based on chaotic system and rotation shift is provided. Given that the rotation shift has many features such as simplicity, efficiency and flexibility in different size images which can increase the security of encryption scheme and be resistive against known attacks. Wang and Luan [10] presented a high dimensional permutation bit-level method based on chaos system. Wang et al [11] presented a new color images encryption algorithm based on Logistic mapping and used the combination of confusion and diffusion to reduce relation between color components. In [12], the spatiotemporal chaos is employed to confuse blocks and change pixel values simultaneously. In [13] an image encryption algorithm presented based on bit permutation of three-dimensional matrix. Enayatifar et al designed an image encryption algorithm using the combination of DNA mask and genetic algorithm and used Logistic mapping as a key and initial population generation for genetic algorithm…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Image Watermarking

    • 9985 Words
    • 40 Pages

    Digital Watermarking Technique is becoming popular, especially for adding undetectable identifying marks, such as author or copyright information. Because of this use, watermarking techniques are often evaluated based on their invisibility, recoverability, and robustness. Our goal was to implement watermarking method and evaluate their susceptibility to attack by various image processing techniques.…

    • 9985 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The Data Encryption Standard (DES) algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications.…

    • 2451 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Risk Management Strategies

    • 1210 Words
    • 5 Pages

    To address the problem of unauthorized access of static data, it is recommended to encrypt the data…

    • 1210 Words
    • 5 Pages
    Good Essays