Image Encryption using Quadtree Compression Technique without any Key Management

Pachigolla Srinivas, Podili Srikanth, Ayinavalli Venkata Ramana

Abstract


Now-a-days maintaining the confidential data is a very tough task. When it comes to images, maintaining confidentiality and secrecy is equally difficult. In general there are two approaches being followed for image encryption. One is encrypting the image using encryption algorithms with keys and other is dividing the image into random shares. But
these approaches are having limitations like in first model, high computation cost and in second model poor quality. To overcome these problems we need to brainstorm another
approach, which is called Keyless Approach to Image Encryption. In this approach it involves Compression, Sieving, Division and Shuffling, reducing the computations and
also the image will be recovered without any loss of image quality.

Keywords: Visual cryptography, sieving, division, shuffling, image quality,
compression.


Full Text:

PDF

References


Zhang Xin, Chen Weibin. A new chaotic algorithm for image encryption. International Conference on Audio, Language and Image Processing (ICALIP), 2008: 889–892p.

Sinha Aloka, Singh Kehar. A technique for image encryption using digital signature. Optics Communications. 2003; 218(4-6): 229–234p. http://eprint.iitd.ac.in/dspace/handle/2074/

Maniccam S.S., Bourbakis N.G. Lossless image compression and encryption using SCAN. Pattern Recognition.2001; 34(2001): 1229–1245p.

Chang Chin-Chen, Hwang Min-Shian, Chen Tung-Shou. A new encryption algorithm for image cryptosystems. The

Journal of Systems and Software. 2001; 58(2001): 83–91p.

Behnia S. et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A. 2007;

(2007):391–396p.

Shamir A. How to share a secret. Commun ACM. 1979; 22(11): 612–613p.

Naor M., Shamir A. Visual cryptography. in Proc. EUROCRYPT 94, Berlin, Germany Springer-Verlag, LNCS. 1995; 950: 1–12p.

Incze Arpad. Pixel sieve method for secret sharing & visual cryptography. RoEduNet IEEE International Conference Proceeding Sibiu. 2010; 24(26): 89–96p.

Wu H.-C., Chang C.-C. Sharing Visual Multi-Secrets Using Circle Shares. Comput. Stand. Interfaces.2005; 134 (28): 123–135p.

Tzung-Her Chen, Kai-Hsiang Tsao, Kuo- Chen Wei. Multiple-Image Encryption By Rotating Random Grids.

Liu F., C.K. Wu X.J. Lin. Colour Visual Cryptography Schemes. IET Information Security.2008; 2(4): 151–165p

Chang Chin-Chen, Chuang Jun-Chou, Lin Pei-Yu. Sharing A Secret Two-Tone Image In Two Gray-Level Images. Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05). 2005.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/