International Journal of Advanced and Applied Sciences

Int. j. adv. appl. sci.

EISSN: 2313-3724

Print ISSN: 2313-626X

Volume 4, Issue 2  (February 2017), Pages:  52-60


Title: The clandestine image transmission scheme to prevent from the intruders

Author(s):  Saad Al-Mutairi 1, *, S. Manimurugan 2

Affiliation(s):

1Computer Science and Information Technology Faculty, Tabuk University, Tabuk, Saudi Arabia
2College of Computing and Informatics, Saudi Electronics University, Riyadh, Saudi Arabia

https://doi.org/10.21833/ijaas.2017.02.010

Full Text - PDF          XML

Abstract:

The main aim of this technique is to prevent the capture of secret data during the exchange/transfer between the source and destination, without the knowledge of intruder. A secret message is represented as an image, and the same image is encrypted by the Triple Encryption (TE) technique. This can be divided into three types of processes. These processes are Reverse Matrix (RM) encode, Alpha-Encryption (AE) and Hill Cipher (HC) encryption. In the RM process, the original secret image is hidden within a cover image. The encoded cover image pixels are converted as characters using a lookup table in the AE process. The encrypted cipher characters are once again encrypted in the HC encryption process. The main advantage of this proposed technique is that, to strengthen the proposed technique the pixels positions are interchanged in every stage. After the encryption, the cipher’s data are sent to the destination for the reconstruction process. The Triple Decryption (TD) technique is divided into three processes of: Inverse Matrix (IM) decode, Alpha-Decryption (AD) and HC decryption. The received cipher data are decrypted by the HC decryption and AD processes. Finally, the decrypted data is decoded by the IM decode process. In this process, the original secret and cover images are obtained. In addition, to measure the performance of the proposed algorithm, the standard parameters are considered. The results show that the proposed algorithm provided a high Peak Signal to Noise Ratio (PSNR), good Correlation Coefficient (CC), minimum execution time and high CIA (Confidentiality, Integrity and Authentication) compared to existing encryption methods. Therefore, using this proposed method, we can obtain 100% of the original image and the secret data can be prevented from interception by intruders/third parties. 

© 2017 The Authors. Published by IASE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Keywords: Reverse matrix encode Alphaencryption, Hill cipher, Secret image, Shuffle process

Article History: Received 10 October 2016, Received in revised form 3 February 2017, Accepted 3 February 2017

Digital Object Identifier: 

https://doi.org/10.21833/ijaas.2017.02.010

Citation:

Al-Mutairi S, and Manimurugan S (2017). The clandestine image transmission scheme to prevent from the intruders. International Journal of Advanced and Applied Sciences, 4(2): 52-60

http://www.science-gate.com/IJAAS/V4I2/Mutairi.html


References:

Almutairi S and Manimurugan S (2016). An efficient secret image transmission scheme using Dho-encryption technique. International Journal of Computer Science and Information Security (IJCSIS), 14(10): 446-460.
Anton H (2010). Elementary linear algebra application version. 10th Edition, John Wiley and Sons, New Jersey, USA.
Cao H and Kot AC (2013). On establishing edge adaptive grid for bilevel image data hiding. IEEE Transactions on Information Forensics and Security, 8(9): 1508-1518.
https://doi.org/10.1109/TIFS.2013.2274041
Haiping H, Shichao H, Jiutian C, and Ruchuan W (2013). Image hiding algorithm in discrete cosine transform domain based on grey prediction and grey relational analysis. China Communications, 10(7): 57-70.
https://doi.org/10.1109/CC.2013.6571289
Hu YC (2003). Grey-level image hiding scheme based on vector quantisation. Electronics Letters, 39(2): 202-203.
https://doi.org/10.1049/el:20030167
Ishimaru A, Zhang C, and Kuga Y (2014). Hard wall imaging of objects hidden by non-penetrating obstacles using modified time reversal technique. IEEE Transactions on Antennas and Propagation, 62(7): 3645-3651.
https://doi.org/10.1109/TAP.2014.2317479
Kwon O (2014). Single image dehazing based on hidden Markov random field and expectation–maximisation. Electronics Letters, 50(20): 1442-1444.
https://doi.org/10.1049/el.2014.2093
Lee JD, Chiou YH, and Guo JM (2014). Information hiding based on block match coding for vector quantization-compressed images. IEEE Systems Journal, 8(3): 737-748.
https://doi.org/10.1109/JSYST.2012.2232551
Li M, Xiao D, Kulsoom A, and Zhang Y (2015). Improved reversible data hiding for encrypted images using full embedding strategy. Electronics Letters, 51(9): 690-691.
https://doi.org/10.1049/el.2014.4476
Ma K, Zhang W, Zhao X, Yu N, and Li F (2013). Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security, 8(3): 553-562.
https://doi.org/10.1109/TIFS.2013.2248725
Manimurugan S, Narmatha C, and Porkumaran K (2014a). The new approach of visual cryptography scheme for protecting the grayscale medical images. Journal of Theoretical and Applied Information Technology, 69(3): 552-561.
Manimurugan S, Porkumaran K, and Narmatha C (2014b). The new block pixel sort algorithm for TVC-encrypted medical image. The Imaging Science Journal, 62(8): 403-414.
https://doi.org/10.1179/1743131X14Y.0000000078
Nikolaidis A (2015). Reversible data hiding in JPEG images utilising zero quantised coefficients. IET Image Processing, 9(7): 560-568.
https://doi.org/10.1049/iet-ipr.2014.0689
Qian Z and Zhang X (2016). Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology, 26(4): 636-646.
https://doi.org/10.1109/TCSVT.2015.2418611
Qin C, Chang CC, and Chiu YP (2014). A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Transactions on Image Processing, 23(3): 969-978.
https://doi.org/10.1109/TIP.2013.2260760
PMid:23649221
Renza D, Ballesteros DM, and Ortiz HD (2016). Text Hiding in Images Based on QIM and OVSF. IEEE Latin America Transactions, 14(3): 1206-1212.
https://doi.org/10.1109/TLA.2016.7459600
Wu DC and Tsai WH (2000). Spatial-domain image hiding using image differencing. IEE Proceedings-Vision, Image and Signal Processing, 147(1): 29-37.
https://doi.org/10.1049/ip-vis:20000104
Wu HT, Dugelay JL, and Shi YQ (2015). Reversible image data hiding with contrast enhancement. IEEE Signal Processing Letters, 22(1): 81-85.
https://doi.org/10.1109/LSP.2014.2346989
Xiao D and Chen S (2014). Separable data hiding in encrypted image based on compressive sensing. Electronics Letters, 50(8): 598-600.
https://doi.org/10.1049/el.2013.3806
Zhang X and Zhang W (2014). Semantic image compression based on data hiding. IET Image Processing, 9(1): 54-61.
https://doi.org/10.1049/iet-ipr.2014.0321
Zhang X, Long J, Wang Z, and Cheng H (2016). Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 26(9): 1622-1631.
https://doi.org/10.1109/TCSVT.2015.2433194
Zhou J, Sun W, Dong L, Liu X, Au OC and Tang YY (2016). Secure reversible image data hiding over encrypted domain via key modulation. IEEE Transactions on Circuits and Systems for Video Technology, 26(3): 441-452.
https://doi.org/10.1109/TCSVT.2015.2416591