Date of Publication :16th August 2017
Abstract: Image security is a major concern as the digital communication and digital data is growing rapidly. Image data is generated in loads every day. We need faster and robust mechanisms to secure the image data. Various fields such as military scopes, security firms, social network etc. need systems that can protect the images while communicating and data transfers. In this paper the proposed idea involves use of image encryption using chaotic approach with a combination of image stitching mechanism. This unique combination provides double layered protection to the images. In order to transfer an image, the image is first partitioned, encrypted and then transferred making it difficult for attackers to access the whole image. On the other end, the encrypted image is decrypted using a symmetric key generated using chaotic approach that uses logistic map function and linear feedback shift register which is followed by image stitching procedure..
Reference :
-
- Rohith S, K N Hari Bhat , A Nandini Sharma, ” Image Encryption and Decryption using Chaotic Key Sequence Generated by Sequence of Logistic Map and Sequence of States of Linear Feedback Shift ”, in 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC)
- Chong Fu, Jiaqi Tang1, Wei Zhou, Wenqi Liu, Dongliang Wang, ” A Symmetric Color Image Encryption Scheme Based on Chaotic Maps”, in 2013 15th IEEE International Conference on Communication Technology, Guilin, China
- K. Sakthidasan , B. V. Santhosh Krishna,” A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images ”, in International Journal of Information and Education Technology, Vol. 1, No. 2, June 2011
- Shikha Arya,” A Review on Image Stitching and its Different Methods”, in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 5, May 2015
- Pranoti Kale, K.R.Singh,” A Technical Analysis of Image Stitching Algorithm”, in International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 284-288
- Chen Kaili, Wang Meiling,” Image Stitching Algorithm Research Based on OpenCV ” , Proceedings of the 33rd Chinese Control Conference July 28-30, 2014, Nanjing, China
- Derek Hoiem,” Image Stitching”, in Computational Photography, University of Illinois [ppt]
- Jyotika Kapur, Akshay. J. Baregar,” Security using image processing”, in International Journal of Managing Information Technology (IJMIT) Vol.5, No.2, May 2013
- Rahul Kumar, Ajit Pratap Singh, Arun Kumar Shukla, Rishabh Shukla,” Enhancing Security Using Image Processing”, in International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 4, April 2015
- Rinki Pakshwar, Vijay Kumar Trivedi, Vineet Richhariya,” A Survey On Different Image Encryption and Decryption Techniques” in International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013