Open Access   Article Go Back

Keyless Image Encryption using Hash Maps

Anchal Monga1 , Anubhooti Papola2

  1. Dept. of CSE, Uttarakhand Technical University, Dehradun , India.
  2. Dept of CSE, Uttarakhand Technical University, Dehradun , India.

Correspondence should be addressed to: anchal.anshu@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 480-484, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.480484

Online published on Mar 30, 2018

Copyright © Anchal Monga, Anubhooti Papola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anchal Monga, Anubhooti Papola, “Keyless Image Encryption using Hash Maps,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.480-484, 2018.

MLA Style Citation: Anchal Monga, Anubhooti Papola "Keyless Image Encryption using Hash Maps." International Journal of Computer Sciences and Engineering 6.3 (2018): 480-484.

APA Style Citation: Anchal Monga, Anubhooti Papola, (2018). Keyless Image Encryption using Hash Maps. International Journal of Computer Sciences and Engineering, 6(3), 480-484.

BibTex Style Citation:
@article{Monga_2018,
author = {Anchal Monga, Anubhooti Papola},
title = {Keyless Image Encryption using Hash Maps},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {480-484},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1833},
doi = {https://doi.org/10.26438/ijcse/v6i3.480484}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.480484}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1833
TI - Keyless Image Encryption using Hash Maps
T2 - International Journal of Computer Sciences and Engineering
AU - Anchal Monga, Anubhooti Papola
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 480-484
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
479 290 downloads 256 downloads
  
  
           

Abstract

To develop the security, a new image encryption method that uses a keyless approach for image encryption is proposed. Keyless approach increases the ability of the system from various types of attacks as compared to the asymmetric keys that are vulnerable to various types of attacks. For security check of the system hash algorithms (MD5 and SHA128) are applied which checks whether the image transmission over the web is manipulated in between the transfer from sender to the receiver. The image is encrypted in such a way that it is not an easy task for the third party to recognize or create the original image by just seeing the encrypted image. Before the transfer of an image SHA128 and MD5 of the image is calculated. After the decryption of the image if SHA128 and MD5 of the system matches the image is not manipulated otherwise it is manipulated. So the Keyless approach, SHA128 and MD5 together increases the overall security of the system and make the system more secure by protecting it from different types of attacks. The outcome shows that the value of error matrix, PSNR is increased by approximately 8% and the values of MSE is about 31% of the encryption using divergent illumination and asymmetric keys which shows that the result are good in comparison of the encryption using divergent illumination and asymmetric keys.

Key-Words / Index Term

Optical Image Encryption, Secure Hash Algorithms, Keyless Encryption

References

[1] Xiaogang Wang, Guoquan Zhou, Chaoqing Dai, Junlang Chen “Optical Image Encryption Using Divergent illumination and asymmetric keys”, IEEE Photonics Journal Volume 9, Number 2, April 2017.
[2] Seyed Mohammad Seyedzade, Reza Ebrahimi Atani, Sattar Mirzakuchaki “A Novel Image Encryption Algorithm Based on Hash Function” IEEE 2010.
[3] M.Dileep, B.Prudhviraj, G.Prasannakumar” A New Image Encryption and Data Hiding Technique Using Wavelet Transform”,IJRET, Volume: 05 ,05- May-2016.
[4] R.Sivamalar, Dr.Swati Sharma “Survey on Various Optical Image Encryption Techniques” ETEBMS - November 2016.
[5] M.A. Mohamed, A.S. Samarah, M.I. Fath Allah ” Optical Encryption Techniques: An Overview” IJCS, Vol. 11, Issue 4, 2 July 2014.
[6] ShiLiu, Changliang Guo, JohnT.Sheridan” A review of optical image encryption technique”Elsevier 2013.
[7] WenChen,, XudongChen, ColinJ.R.Sheppar “Optical image encryption based on diffractive imaging” Optics Lett. Vol.35,No.22 November15,2010.
[8] Philippe Refregier, BahramJavidi” Optical image encryption based on input plane and Fourier plane random encoding” Optics Lett.,Vol.20,No.7, April1,1995.
[9] Jun Li, Jiao Sheng Li, Yang Yang Pan, Rong Li “Compressive Optical Image Encryption” Scientific Reports 5, Article number: 10374 (2015).
[10] Palwinder Singh” Wavelet Transform in Image Processing: Denoising, Segmentation and Compression of Digital Images” IJSRSET ,Volume 2, Issue 2, 2016
[11] Jun-Xin Chen, Zhi-Liang Zhu, Chong Fu, Li-Bo Zhang, Yushu Zhang “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding” journal of optics, Volume 16, October 15,2014.
[12] Xiang Peng, Peng Zhang, Hengzheng Wei, and Bin Yu “Known-plaintext attack on optical encryption based on double random phase keys”, optics Lett, volume 31,2006.
[13] Elisabet Pérez-Cabré, Myungjin Cho, and Bahram Javidi “ Information authentication using photon-counting double-random-phase encrypted images”, optics Lett, volume 36,2011.
[14] Guohai Situ and Jingjuan Zhang “Double random-phase encoding in the Fresnel domain”, optics Lett, volume 29,2004.
[15] Wen Chen, Bahram Javidi, and Xudong Chen “ Advances in optical security systems”, Advances in Optics and Photonics,Volume 6,2014.
[16] Shi Liu, John T. Sheridan,” Optical encryption by combining image scrambling techniques in fractional Fourier domains” Elsevier, volume 287, 15 January 2013
[17] Shi Liu, Bryan M. Hennelly, John T. Sheridan” Numerical simulation of double random phase encoding”,2012.
[18] Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal “A review of Comparative Study of MD5 and SHA Security Algorithm”, IJCA,Volume 104,October14, 2014.
[19] Arturo Carnicer, Mario Montes-Usategui, Sergio Arcos, and Ignacio Juvells “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys” , Optics Lett,Volume 30, 2005.
[20] Yann Frauel, Albertina Castro, Thomas J. Naughton, and Bahram Javidi “Resistance of the double random phase encryption against various attacks”, Optics Express, Volume 15, 2007.
[21] P.M. Bentley, J.T.E. McDonnell “Wavelet transforms: an introduction” Volume: 6, Aug 1994.
[22] Sandhya Verma,G.S. Prajapati “Robustness and Security Enhancement of SHA with Modified Message Digest and Larger Bit Difference”, IEEE,September 19,2016.
[23] K. Saravanan 1,A. Senthilkumar “Theoretical Survey on Secure Hash Functions and issues” IJERT, Vol. 2 Issue 10, October – 2013.
[24] Bahram Javidi and Jun Wang “Design of filters to detect a noisy target in non overlapping background noise”, Volume 11, 1994.
[25] Bahram Javidi, Farokh Parchekani, and Guanshen Zhang “Minimum-mean-square-error filters for detecting a noisy target in background noise”, volume 35,1996.
[26] Wan Qin and Xiang Peng “Asymmetric cryptosystem based on phase-truncated Fourier transforms”,Optics Letters , Vol. 35,2010.
[27] Jianjun Cai, Xueju Shen, Ming Lei, Chao Lin, and Shuaifeng Dou, “Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition”, Optics Letters ,Vol. 40,2015.
Yan Zhang and Bo Wang “Optical image encryption based on interference”,Optics Letters ,Vol. 33,2008.