Skip to main content

Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography

  • Conference paper
  • First Online:
Computational Science and Its Applications -- ICCSA 2015 (ICCSA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9158))

Included in the following conference series:

  • 1953 Accesses

Abstract

Lossless pixel value encrypted images still maintains the some properties of their respective original plain images. Most of these cryptographic approaches consist of visual cryptographic techniques and pixel displacement approaches. These methods of cryptography are useful in cases as medical image security where pixel expansion is avoided in both the encryption and decryption processes. In this paper we propose a hybrid cryptographic encryption approach by using features generated from digital images based on Galois lattice theory and a visual cryptographic technique based on RGB pixel displacement. The features extracted from a plain image and a lattice was generated which was then used to generate a key used to encrypt the plain image. At the end of the process, there was no pixel expansion and the arithmetic mean, the entropy as well as the Galois lattice of both ciphered and plain image remained the same. The features extracted from the plain image were the same as that of the ciphered image irrespective of pixel displacement that occurred, this makes our approach a suit-able basis for image encryption and storage as well as encrypted image indexing and searching based on pixel values. The implementation was done using Galicia, Lattice Miner and MATLAB..

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cameron, J.J., Leung, C.K.-S., Tanbeer, S.K.: Finding strong groups of friends among friends in social networks. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 824–831, December 12–14, 2011

    Google Scholar 

  2. Löhr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Veinot, T. (ed.) Proceedings of the 1st ACM International Health Informatics Symposium (IHI 2010), pp. 220–229. ACM, New York (2010)

    Google Scholar 

  3. Kester, Q.-A., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N.: Feature based encryption technique for securing forensic biometric image data using AES and visual cryptography (AIMS). In: 2014 IEEE International Conference on Artificial Intelligence, Modelling and Simulation, pp. 191–205. IEEE, November 2014

    Google Scholar 

  4. Zhang, C., Li, H., Guo, Q., Jia, J., Shen, I.F.: Fast Active Tabu Search and its Application to Image Retrieval. IJCAI 9, 1333–1338 (2009)

    Google Scholar 

  5. Tonella, P.: Formal concept analysis in software engineering. In: Proceedings of 26th International Conference on Software Engineering, ICSE 2004, pp. 743–744, May 23–28, 2004

    Google Scholar 

  6. Tilley, T., Cole, R., Becker, P., Eklund, P.: A survey of formal concept analysis support for software engineering activities. In: Ganter, B., Stumme, G., Wille, R. (eds.) Formal Concept Analysis. LNCS, vol. 3626, pp. 250–271. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Faria, A.M., Cintra, M.E., de Castro, A.F., Lopes, D.C.: Criminal Hot Spot Detection using Formal Concept Analysis and Clustering Algorithms

    Google Scholar 

  8. Kester, Q.A.: Computer Aided Investigation: Visualization and Analysis of Data from Mobile Communication Devices Using Formal Concept Analysis. arXiv preprint arXiv:1307.7788 (2013)

    Google Scholar 

  9. Kester, Q.A., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynnor, N.N.: A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement. In: Pérez, G.M., Thampi, S.M., Ko, R., Shu, L. (eds.) Recent Trends in Computer Networks and Distributed Systems Security. CCIS, vol. 420, pp. 530–539. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  10. Ganter, B., Wille, R.: Formal Concept Analysis: Mathematical Foundations, p. 1. Springer, Berlin. ISBN 3-540-62771-5

    Google Scholar 

  11. Pascu, A., Desclés, J.P.: Attribute-value formalization in the framework of the logic of determination of objects (LDO) and categorization. In: FLAIRS Conference, pp. 506–511 (2008)

    Google Scholar 

  12. Chaudron, L., Maille, N.: Generalized formal concept analysis. In: Ganter, B., Mineau, G.W. (eds.) Conceptual Structures: Logical, Linguistic, and Computational Issues. LNCS, vol. 1867, pp. 357–370. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Priss, U.: A graphical interface for document retrieval based on formal concept analysis. In: Proceedings of the 8th Midwest Artificial Intelligence and Cognitive Science Conference, pp. 66–70, March 1997

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quist-Aphetsi Kester .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kester, QA., Pascu, A.C., Nana, L., Gire, S., Eghan, J.M., Quaynor, N.N. (2015). Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9158. Springer, Cham. https://doi.org/10.1007/978-3-319-21410-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21410-8_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21409-2

  • Online ISBN: 978-3-319-21410-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics