A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling

In today's cyberspace, there exists several security challenges associated with the processing and transmission of digital images over an open and unsecured network. There exists a high concern of insecurity due to malicious activities over these open networks. It is therefore necessary to assure the confidentiality, the integrity and the authenticity of the digital image transmission over these open and unsecured networks which modern day cryptography can provide. This paper proposed a new method for digital image encryption based on a hybrid encryption technique. The Diffie-HellMan key exchange algorithm was used to exchange keys between two parties. A secret shared key was generated from the private key of first party and the public key of the second party and then hashed using MD5 algorithm. The hashed message was used to encrypt mxn size of plain images by using the images' array pixel values. This was achieved through pixel shuffling and displacement algorithm. Analysis was performed on the ciphered images to determine the efficiency of the algorithm. The algorithm was implemented using MATLAB. This new method can provide a high security solution to surveillance cameras, and other security devices that send video images over communication channels.

[1]  Bernd Freisleben,et al.  Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants , 2007, OTM Conferences.

[2]  R. Smid,et al.  New interpolation methods for image-based sub-pixel displacement measurement based on correlation , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.

[3]  Wageeh Boles,et al.  A suspicious behaviour detection using a context space model for smart surveillance systems , 2012, Comput. Vis. Image Underst..

[4]  Jill Slay,et al.  Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[5]  R.E. Hiromoto,et al.  Assessing the Communication Issues Involved in Implemening High-Level Behaviors in Unmanned Aerial Vehicles , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[6]  N. S. Alex,et al.  Enhanced image secret sharing via error diffusion in halftone visual cryptography , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[7]  N. S. Alex,et al.  Visual cryptography using hybrid halftoning and inter-pixel exchanging , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[8]  Anita Sahoo,et al.  Variable Bits Secure System for Color Images , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[9]  S. C. Hui,et al.  Remote Video Monitoring Over the WWW , 2003, Multimedia Tools and Applications.

[10]  S. K. Changchien,et al.  A new Pixel-Chaotic-Shuffle method for image encryption , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Punam Bedi,et al.  Securing fingerprint images using a hybrid technique , 2012, ICACCI '12.

[13]  Panagiotis Kalagiakos,et al.  Cloud Computing learning , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[14]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[15]  Norshuhani Zamin Information Extraction for Counter-Terrorism: A Survey , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.

[16]  Carlos E. Palau,et al.  A video streaming application for urban traffic management , 2007, J. Netw. Comput. Appl..

[17]  Li Li,et al.  Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Martin Watmough,et al.  Future Supply Chain Processes and Data for Collective Intelligence , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[19]  Ruhua Cai,et al.  Image encryption algorithm based on bit-plane scrambling and multiple chaotic systems combination , 2010, 2010 International Conference on Intelligent Computing and Integrated Systems.

[20]  Zheng Wei,et al.  Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes Decomposition , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[21]  Jörg Hähner,et al.  MIDSCA: Towards a Smart Camera architecture of mobile internet devices , 2008, 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras.

[22]  Kannabiran Ganesan,et al.  Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps , 2008, 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation.

[23]  Feng Zhao Wireless sensor networks: seamless computing across the physical and digital worlds , 2004, VSSN '04.

[24]  Wen Gao,et al.  Vlogging: A survey of videoblogging technology on the web , 2010, CSUR.

[25]  Ebroul Izquierdo Knowledge-Based Image Processing for Classification and Recognition in Surveillance Applications , 2006, 2006 International Conference on Image Processing.

[26]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[27]  A. Aisha Al-Abdallah,et al.  Real-time traffic surveillance using ZigBee , 2010, 2010 International Conference On Computer Design and Applications.

[28]  Alireza Jolfaei,et al.  A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1 , 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence.

[29]  Sung Bum Pan,et al.  The Multi-Modal Human Identification Based on Smartcard in Video Surveillance System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[30]  Marianne Winslett,et al.  Preventing history forgery with secure provenance , 2009, TOS.

[31]  K. M. Koumadi,et al.  Cryptographie technique for image encryption based on the RGB pixel displacement , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).

[32]  Jochen Schlick Cyber-physical systems in factory automation - Towards the 4th industrial revolution , 2012, 2012 9th IEEE International Workshop on Factory Communication Systems.

[33]  Amitesh Singh Rajput,et al.  Towards the growth of image encryption and authentication schemes , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[34]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[35]  Hitoshi Kiya,et al.  A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000 , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[36]  Mengmeng Wang,et al.  Digital image encryption algorithm based on pixels , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[37]  Sehchan Oh,et al.  A platform surveillance monitoring system using image processing for passenger safety in railway station , 2007, 2007 International Conference on Control, Automation and Systems.

[38]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[39]  Hyeon Park,et al.  Large Data Transport for Real-Time Services in Sensor Networks , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.

[40]  T. W. Lawrence,et al.  The future of surface surveillance-revolutionizing the view of the battlefield , 2000, Record of the IEEE 2000 International Radar Conference [Cat. No. 00CH37037].