Showing posts with label Confidentiality. Show all posts
Showing posts with label Confidentiality. Show all posts

Tuesday, September 7, 2021

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO

K.Kuppusamy and K.Thamodaran, Alagappa University, India

ABSTRACT

Authentication is one of the image security issues solved by hash function and another one issue is providing security for illegal manipulation of digital image is solved by an encryption. An optimized hybrid image security mechanism for authentication and secrecy of images by means of Particle Swarm Optimization (PSO) in daubechies4 transform is illustrated in this paper. This mechanism provide solutions to the issues such as authentication, robustness, security and statistical attacks. The PSO technique is employed to select feature vectors to form the image hash and select high energy coefficients for partial encryption. The shuffling of bits , coefficients and blocks of an image is performed by interweaving technique. The Completeness of Signature (CoS) is used to recognize the image as authentic or unauthentic. The image quality distortion is computed with help of image quality index metric(IQIM) with respect to three factors namely loss of correlation, luminance distortion, and contrast distortion. The experimental results are computed with respect to CoS, IQIM, PSNR and correlation coefficient and presented to demonstrate the efficacy of the proposed scheme.

KEYWORDS

Authentication, Confidentiality, dabechies4, encryption, hash function, Interweaving, IQIM, and PSO.

Original Source URL: https://airccse.org/journal/nsa/5513nsa10.pdf

Volume Link: https://airccse.org/journal/jnsa13_current.html

Sunday, September 1, 2019

LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TRANSFORMATION

LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TRANSFORMATION 

P. Devaki1 , Dr. G. Raghavendra Rao2

1Department of Information Science & Engineering, NIE, Mysore
 2Department of Computer Science & Engineering, NIE, Mysore
ABSTRACT

This paper is proposed to provide confidentiality of the secret image which can be used by multiple users or to store on multiple servers. A secret sharing is a technique to protect the secret information which will be used by multiple users. The threshold secret sharing is more efficient as it is possible to reconstruct the secret with the threshold number of shares. Along with Shamir’s secret sharing method we propose to use the radon transformation before dividing the image in to shares. This transformation is used so that the shares will not have the original pixel intensity. The run length code is used to compress the image after the transformation. Then apply secret sharing technique. The reconstruction of the image results in original image by applying the operations in the reverse order.

KEYWORDS

Threshold secret sharing, Confidentiality, Transformation, Compression.


International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...