Skip to main content

A Hybrid Approach for Enhancing the Security of Information Content of an Image

  • Conference paper
  • First Online:
Multimedia Processing, Communication and Computing Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 213))

  • 956 Accesses

Abstract

Recent advancements in communication technologies have resulted in sharing of most multimedia information through internet. Securing such information from eavesdroppers during communication is still challenging task. In this paper, a hybrid approach is proposed for securing the contents of an image. This hybrid approach is a combination of edge detection and encryption process. The proposed approach comprises three stages. In first stage, the input image is divided into two sub images, image with edges and image without edge information. Canny edge detection algorithm is used for detecting edges in the input image. In second stage, sub images obtained from previous stage are encrypted separately using crossover and mutation operations. The encrypted images are fused in the final stage. The performance of the proposed method is measured in terms of correlation coefficient and histogram. The results obtained are compared with method [1]. The comparative study reveals that the image processing technique can be combined with encryption process to provide different levels of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar J, Nirmala S: Encryption of images based on genetic algorithm. In: Third international conference on communications security and information assurance (CSIA), Delhi, India, Advances in Intelligent and Soft Computing, 2012, vol 167/2012, pp 783–791. doi:10.1007/978-3-642-30111-7_75)

  2. Husainy M (2006) Image encryption using genetic algorithm. Inf Technol J 5(3):516–519

    Article  Google Scholar 

  3. Abuhaiba ISI, Hassan MAS (2011) Image encryption using differential evolution approach in frequency domain. Singal image process Int J (SIPIJ) 2(1):51–69

    Google Scholar 

  4. Alghamdi AS, Ullah H, Khan MU, Ahmad I, Alnafajan K: Satellite image encryption for C4I System. Int J Phys Sci 6(17):4255–4263

    Google Scholar 

  5. Zhou Y, Panetta K, Agaian S (2009) Image encryption based on edge information. In: Multimedia on mobile devices 2009, Proceedings Of SPIE-IS&T Electronic Imaging, SPIE, San Jose, CA, USA, vol. 7256

    Google Scholar 

  6. El-Wahed MA, Mesbah S, Shoukry A: Efficiency and security of some image encryption algorithms. In: Proceedings of the world congress on engineering 2008, vol 1, pp. 822–1706

    Google Scholar 

  7. Mitra A, Subba Rao YV, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. Int J Electr Comput Eng 1(2):127–131

    Google Scholar 

  8. Bani Younes MA, Jantan A (2008) Image encryption using block-based transformation algorithm. IAENG Int J Comput Sci 35(1)

    Google Scholar 

  9. Isasi P, Hernandez JC (2004) Introduction to the applications of evolutionary computation in computer security and cryptography. Comput Intell 20(3):445–449

    Article  MathSciNet  Google Scholar 

  10. Picek S, Golub M (2011) On evolutionary computation methods in cryptography. In: Proceedings of the information systems security, MIPRO 2011, 23–27 May, pp. 1496–1501

    Google Scholar 

  11. Kumar A, Ghose MK (2009) Overview of information security using genetic algorithm and chaos. Inf Secur J Glob Perspect 18(6):306–315

    Article  Google Scholar 

  12. Enayatifar R, Abdullah AH (2011) Image security via genetic algorithm. In: 2011 international conference on computer and software modeling, Singapore, IPCSIT, vol. 14, pp. 198–202

    Google Scholar 

  13. YC Hou (2003) Visual cryptography for color images. Pattern Recogn 36:1619–1629

    Google Scholar 

  14. Lisa Gordon Photography,http://www.lgordonphotography.com/2010_11_01_archive.html

  15. Maniyath SR, Supriya M: An uncompressed image encryption algorithm based on DNA sequences. Comput Sci Inf Technol, CCSEA 2011, CS and IT 02, pp 258–270

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kumar Jalesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Jalesh, K., Nirmala, S. (2013). A Hybrid Approach for Enhancing the Security of Information Content of an Image. In: Swamy, P., Guru, D. (eds) Multimedia Processing, Communication and Computing Applications. Lecture Notes in Electrical Engineering, vol 213. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1143-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1143-3_14

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1142-6

  • Online ISBN: 978-81-322-1143-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics