Advertisement

A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage

  • D. BoopathyEmail author
  • M. Sundaresan
S.I. : CSI2017
  • 9 Downloads

Abstract

Image encryption is one of the techniques which is used to maintain the image confidentiality. Trust is needed to be created and retained in the cloud between the service provider and the end user. The existing image encryption methods are using a map structure, Rubik cube method, DCT-based approach and s-box designs. The existing algorithms are mostly designed with the concept of offline image encryption. While coming to the online encryption, the image encryption algorithms needed to be redefined with a lightweight approach with an improved security level or same security level of existing algorithms. These things are taken into consideration in the proposed multi-dimensional encryption technique design. The proposed technique is using two phases to perform the encryption. The proposed technique’s two phases are image pixel shuffling phase and image pixel rearrange phase. The proposed technique is already tested successfully on the standard grayscale images, and the results were obtained and it satisfied the objectives. In this paper, the proposed technique was tested on the standard color images and the gained results. Those results have been used to analyze the performance and efficiency of proposed technique with the existing technique, by using different parameters which include PSNR, MSE, information entropy, coefficient correlation, NPCR and UPCI.

Keywords

Image encryption technique Decryption technique Image security Standard grayscale images Standard color images Cloud security 

References

  1. 1.
  2. 2.
    Desai D, Prasad A, Crasto J (2012) Chaos-based system for image encryption. Int J Comput Sci Inf Technol 3(4):4809–4811Google Scholar
  3. 3.
    Sakthidasan K, Santhosh Krishna BV (2011) A new chaotic algorithm for image encryption and decryption of digital color images. Int J Inf Educ Technol 1(2):137–141Google Scholar
  4. 4.
    Agarwal N, Sharma H (2013) An efficient pixel-shuffling based approach to simultaneously perform image compression, encryption and steganography. IJCSMC 2(5):376–385Google Scholar
  5. 5.
    Kester Quist-Aphetsi (2013) Image encryption based on the RGB PIXEL transposition and shuffling. Int J Comput Netw Inf Secur 7:43–50Google Scholar
  6. 6.
    Zhao J, Guo W, Ye R (2014) A chaos-based image encryption scheme using permutation-substitution architecture. Int J Comput Trends Technol 15(4):174–185CrossRefGoogle Scholar
  7. 7.
    Lohit Kumar D, Reddy AR, Jilani SAK (2016) Implementation of 128-bit AES algorithm in MATLAB. Int J Eng Trends Technol 33(3):126–129CrossRefGoogle Scholar
  8. 8.
    Boopathy D, Sundaresan M (2013) Multidimensional approach for securing images on cloud. ICGST J Graph Vis Image Process 17(02):31–38Google Scholar
  9. 9.
    Boopathy D, Sundaresan M (2013) Securing public data storage in cloud environment. In: ICT and critical infrastructure: 48th annual convention of Computer Society of India, Visakhapatnam, India, pp 555-562Google Scholar
  10. 10.
    Boopathy D, Sundaresan M (2015) Secured cloud data storage—prototype trust model for public cloud storage. In: International conference on information and communication technology for sustainable development, Ahmadabad, India, pp 329–337Google Scholar
  11. 11.
    Boopathy D, Sundaresan M (2016) Framework model and algorithm of request based one time passkey (ROTP) mechanism to authenticate cloud users in secured way. In: 3rd international conference on computing for sustainable global development, New Delhi, India, pp 5317–5322Google Scholar
  12. 12.
    Boopathy D, Sundaresan M (2017) A framework for user authentication and authorization using request based one time passkey and user active session identification. Int J Comput Appl 172(10):18–23Google Scholar
  13. 13.
    Boopathy D, Sundaresan M (2014) Data type identification and extension validator framework model for public cloud storage. In: Big data analytics—proceedings of the 50th annual convention of Computer Society of India, New Delhi, India, pp 533–541Google Scholar
  14. 14.
    Boopathy D, Sundaresan M (2014) Data encryption framework model with watermark security for data storage in public cloud model. In: IEEE eighth international conference on computing for sustainable global development, New Delhi, India, pp 1040–1044Google Scholar
  15. 15.
    Boopathy D, Sundaresan M (2014) Enhanced encryption and decryption gateway model for cloud data security in cloud storage. In: Emerging ICT for bridging the future—49th annual convention of Computer Society of India, Hyderabad, India, pp 415–421Google Scholar
  16. 16.
    Boopathy D, Sundaresan M (20163) Policy based data encryption mechanism framework model for data storage in public cloud service deployment model. In: Elsevier fourth international joint conference on advances in computer science, Haryana, India, pp 423–429Google Scholar
  17. 17.
    Boopathy D, Sundaresan M (2017) IDOCA and ODOCA—enhanced technique for secured cloud data storage. Int J Intell Eng Syst 10(06):49–59Google Scholar
  18. 18.
  19. 19.
  20. 20.
    https://en.wikipedia.org/wiki/TIFF. Accessed 11 Nov 2017
  21. 21.
  22. 22.
  23. 23.
  24. 24.
  25. 25.

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information TechnologyBharathiar UniversityCoimbatoreIndia

Personalised recommendations