ACCENTS Transactions on Image Processing and Computer Vision (TIPCV) ISSN (O): 2455-4707 Vol - 7, Issue - 22, February 2021

  1. Google Scholar

  2. Citation

  3. Impact Factor
A study and analysis of image security algorithms and the current challenges

Shubham Shashikant Patil, Kailash Patidar, Gourav Saxena and Narendra Sharma

Abstract

In any era, communication is very important. In today’s era effective data communication is important in all the fields. Here effectiveness was used in terms of secure communication. So, communication in the way that it is secure from any unauthorized access is important. In this paper a study and analysis were performed in the direction of image data security. This paper explores the current trends in the direction of image data security. It covers methods for image data security, tools and techniques, current challenges along with suggestive measures. It also explores the mitigating ways and directions to achieve high level image data security in the means of data communication. Cryptography and steganography methods were also being discussed, so that better methods can be selected for achieving high level data security.

Keyword

Image data security, Unauthorized access, Cryptography, Steganography.

Cite this article

Patil SS, Patidar K, Saxena G, Sharma N

Refference

[1][1]Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine. 2001; 1(3):6-21.

[2][2]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In International Conference on Advances in Computing and Communication Engineering 2020 (pp. 1-5). IEEE.

[3][3]Qiu J, Wang P. An image encryption and authentication scheme. In International Conference on Computational Intelligence and Security 2011 (pp. 784-787). IEEE.

[4][4]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In International Conference on Advances in Computing and Communication Engineering 2020 (pp. 1-5). IEEE.

[5][5]Hu G, Feng Z, Wang L. Analysis of a type of digital chaotic cryptosystem. In International Symposium on Circuits and Systems. Proceedings 2002 (pp. III-III). IEEE.

[6][6]Boiko J, Kovtun I, Petrashchuk S. Productivity of telecommunication systems with modified signal-code constructions. In International Scientific-Practical Conference Problems of Infocommunications. Science and Technology 2017 (pp. 173-8). IEEE.

[7][7]Millérioux G, Amigó JM, Daafouz J. A connection between chaotic and conventional cryptography. IEEE Transactions on Circuits and Systems I: Regular Papers. 2008; 55(6):1695-703.

[8][8]Zahan A, Hossain MS, Rahman Z, Shezan SK. Smart home IoT use case with elliptic curve based digital signature: an evaluation on security and performance analysis. International Journal of Advanced Technology and Engineering Exploration. 2020;7(62):11-9.

[9][9]Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology. 2006;16(3):354-62.

[10][10]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014;4(2):645-52.

[11][11]Seethalakshmi AV, Hemachitra HS. Complex type seed variety identification and recognition using optimized image processing techniques. ACCENTS Transactions on Image Processing and Computer Vision. 2020; 6 (19): 23-31.

[12][12]Gladwin SJ, Gowthami PL. Combined cryptography and steganography for enhanced security in suboptimal images. In International Conference on Artificial Intelligence and Signal Processing 2020 (pp. 1-5). IEEE.

[13][13]Al-Kadei FH, Mardan HA, Minas NA. Speed up image encryption by using RSA algorithm. In International Conference on Advanced Computing and Communication Systems 2020 (pp. 1302-1307). IEEE.

[14][14]Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020; 8:25777-88.

[15][15]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI international conference on software engineering 2012 (pp. 1-8). IEEE.

[16][16]Sharma V, Shukla M, Srivastava S, Mandal R. Generative network based image encryption. In International Conference on Intelligent Computing and Control Systems 2020 (pp. 1-5). IEEE.

[17][17]Abhinav A, Manikandan VM, Bini AA. An improved reversible data hiding on encrypted images by selective pixel flipping technique. In international conference on devices, circuits and systems 2020 (pp. 294-8). IEEE.

[18][18]Santos TA, Magalhães EP, Basílio NP, Nepomuceno EG, Karimov TI, Butusov DN. Improving chaotic image encryption using maps with small Lyapunov exponents. In Moscow workshop on electronic and networking technologies 2020 (pp. 1-4). IEEE.

[19][19]Hu D, Zheng Y, Zhang H, Sun S, Xie F, Shi J, Jiang Z. Informative retrieval framework for histopathology whole slides images based on deep hashing network. In international symposium on biomedical imaging 2020 (pp. 244-8). IEEE.

[20][20]Wahid SD, Buja AG, Jono MH, Aziz AA. Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling. International Journal of Advanced Technology and Engineering Exploration. 2021; 8 (74): 73-81.

[21][21]Kalaichelvi T, Apuroop P. Image steganography method to achieve confidentiality using CAPTCHA for authentication. In international conference on communication and electronics systems 2020 (pp. 495-499). IEEE.

[22][22]Ye H, Huang S, Liu W. Research on image scrambling method based on combination of Arnold transform and exclusive-or operation. In information technology, networking, electronic and automation control conference 2020 (Vol. 1, pp. 151-154). IEEE.

[23][23]Srivastava M, Siddiqui J, Ali MA. Local binary pattern based technique for content based image copy detection. In international conference on power electronics & IoT applications in renewable energy and its control 2020 (pp. 374-377). IEEE.

[24][24]Samvatsar M, Kanungo P. An analytical review and analysis for the data control and security in cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(73):241-6.

[25][25]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In international conference on innovative mechanisms for industry applications 2020 (pp. 665-9). IEEE.

[26][26]Kushnir M, Kosovan H, Kroialo P, Komarnytskyy A. Encryption of the images on the basis of two chaotic systems with the use of fuzzy logic. In international conference on advanced trends in radioelectronics, telecommunications and computer engineering 2020 (pp. 610-3). IEEE.

[27][27]Han B, Jia Y, Huang G, Cai L. A medical image encryption algorithm based on Hermite chaotic neural network. In information technology, networking, electronic and automation control conference 2020 (Vol. 1, pp. 2644-8). IEEE.

[28][28]Kaur S, Jindal A. Singular value decomposition (SVD) based image tamper detection scheme. In international conference on inventive computation technologies 2020 (pp. 695-9). IEEE.

[29][29]Abdulrahman A, Varol S. A review of image segmentation using MATLAB environment. In international symposium on digital forensics and security 2020 (pp. 1-5). IEEE.

[30][30]Zhang H, Zhu J, Zhao S, He Q, Zhong X, Liu J. A new image encryption algorithm based on 2D-LSIMM chaotic map. In international conference on advanced computational intelligence 2020 (pp. 326-333). IEEE.

[31][31]Abdallah Y. Segmentation of brain stroke lesions using marker-based algorithms in CT images. In international conference on computer applications & information security 2020 (pp. 1-4). IEEE.

[32][32]Yadahalli SS, Rege S, Sonkusare R. Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques. In international conference on communication and electronics systems 2020 (pp. 1325-30). IEEE.

[33][33]Luo Y, Zhu L. Research on data augmentation for object detection based on x-ray security inspection picture. In international conference on advances in electrical engineering and computer applications 2020 (pp. 219-22). IEEE.

[34][34]Kukharska N, Lagun A, Polotai O. The steganographic approach to data protection using Arnold algorithm and the pixel-value differencing method. In international conference on data stream mining & processing 2020 (pp. 174-177). IEEE.

[35][35]Kumar PR, Sarkar A, Mohanty SN, Kumar PP. Segmentation of white blood cells using image segmentation algorithms. In international conference on computing, communication and security 2020 (pp. 1-4). IEEE.

[36][36]Arpac B, Kurt E. An innovative tool for the chaotic image encryption, decryption and security tests. In international conference on electrical, communication, and computer engineering 2020 (pp. 1-8). IEEE.

[37][37]Abedin ZU, Guan Z, Arif AU, Anwar U. An advance cryptographic solutions in cloud computing security. In international conference on computing, mathematics and engineering technologies 2019 (pp. 1-6). IEEE.

[38][38]Chukry S, Sbeyti H. Security enhancement in storage area network. In international symposium on digital forensics and security 2019 (pp. 1-5). IEEE.

[39][39]Eddermoug N, Sadik M, Sabir E, Mansour A, Azmi M. PPSA: profiling and preventing security attacks in cloud computing. In international wireless communications & mobile computing conference 2019 (pp. 415-21). IEEE.

[40][40]Tanash RM, Ala’F K, Darabkh KA. Communication over cloud computing: a security survey. In international convention on information and communication technology, electronics and microelectronics 2019 (pp. 496-501). IEEE.

[41][41]Tripathi J, Saini A. Enhanced visual cryptography: an augmented model for image security. Procedia Computer Science. 2020; 167:323-33.