Abstract
Recent advancements in communication technologies have resulted in sharing of most multimedia information through internet. Securing such information from eavesdroppers during communication is still challenging task. In this paper, a hybrid approach is proposed for securing the contents of an image. This hybrid approach is a combination of edge detection and encryption process. The proposed approach comprises three stages. In first stage, the input image is divided into two sub images, image with edges and image without edge information. Canny edge detection algorithm is used for detecting edges in the input image. In second stage, sub images obtained from previous stage are encrypted separately using crossover and mutation operations. The encrypted images are fused in the final stage. The performance of the proposed method is measured in terms of correlation coefficient and histogram. The results obtained are compared with method [1]. The comparative study reveals that the image processing technique can be combined with encryption process to provide different levels of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kumar J, Nirmala S: Encryption of images based on genetic algorithm. In: Third international conference on communications security and information assurance (CSIA), Delhi, India, Advances in Intelligent and Soft Computing, 2012, vol 167/2012, pp 783–791. doi:10.1007/978-3-642-30111-7_75)
Husainy M (2006) Image encryption using genetic algorithm. Inf Technol J 5(3):516–519
Abuhaiba ISI, Hassan MAS (2011) Image encryption using differential evolution approach in frequency domain. Singal image process Int J (SIPIJ) 2(1):51–69
Alghamdi AS, Ullah H, Khan MU, Ahmad I, Alnafajan K: Satellite image encryption for C4I System. Int J Phys Sci 6(17):4255–4263
Zhou Y, Panetta K, Agaian S (2009) Image encryption based on edge information. In: Multimedia on mobile devices 2009, Proceedings Of SPIE-IS&T Electronic Imaging, SPIE, San Jose, CA, USA, vol. 7256
El-Wahed MA, Mesbah S, Shoukry A: Efficiency and security of some image encryption algorithms. In: Proceedings of the world congress on engineering 2008, vol 1, pp. 822–1706
Mitra A, Subba Rao YV, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. Int J Electr Comput Eng 1(2):127–131
Bani Younes MA, Jantan A (2008) Image encryption using block-based transformation algorithm. IAENG Int J Comput Sci 35(1)
Isasi P, Hernandez JC (2004) Introduction to the applications of evolutionary computation in computer security and cryptography. Comput Intell 20(3):445–449
Picek S, Golub M (2011) On evolutionary computation methods in cryptography. In: Proceedings of the information systems security, MIPRO 2011, 23–27 May, pp. 1496–1501
Kumar A, Ghose MK (2009) Overview of information security using genetic algorithm and chaos. Inf Secur J Glob Perspect 18(6):306–315
Enayatifar R, Abdullah AH (2011) Image security via genetic algorithm. In: 2011 international conference on computer and software modeling, Singapore, IPCSIT, vol. 14, pp. 198–202
YC Hou (2003) Visual cryptography for color images. Pattern Recogn 36:1619–1629
Lisa Gordon Photography,http://www.lgordonphotography.com/2010_11_01_archive.html
Maniyath SR, Supriya M: An uncompressed image encryption algorithm based on DNA sequences. Comput Sci Inf Technol, CCSEA 2011, CS and IT 02, pp 258–270
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Jalesh, K., Nirmala, S. (2013). A Hybrid Approach for Enhancing the Security of Information Content of an Image. In: Swamy, P., Guru, D. (eds) Multimedia Processing, Communication and Computing Applications. Lecture Notes in Electrical Engineering, vol 213. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1143-3_14
Download citation
DOI: https://doi.org/10.1007/978-81-322-1143-3_14
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1142-6
Online ISBN: 978-81-322-1143-3
eBook Packages: EngineeringEngineering (R0)