Image Encryption for Secure Data Transfer and Image based Cryptography

With rapid progress in internet and digital imaging technology there are more and more ways to easily create, publish and distributed images. A major issue for computer networks is to prevent important information from being disclosed to illegal users. Valuable multimedia content such as digital images, however, is vulnerable to unauthorized access while in storage and during transmission over a network. Resent advances in visual cryptography, including probabilistic schemes and colored image sharing techniques were introduced. Visual cryptography is a method for protecting image based secrets that has a computation-free decoding process. This paper focuses on image feature protection techniques which enable similarity comparison among protected features. Experimental results shows that secure image retrieval can achieve comparable retrieval performance to conventional image retrieval techniques without revealing information about image content. Thus the image retrieval process becomes simple. MATLAB based coding manage the query phase of the system. Based on the simulation results, the proposed system not only shows the efficiency in hiding the attributes but also provides other advantages such as: (1) fast transmission of the retrieval image to the receiver, (2) searching made easy. This work enriches the area of secure information retrieval and can find applications in secure online services for images and videos. Keywords—Cryptography, secure image retrieval, visual cryptography, content based image retrieval, feature protection.

[1]  Robert M. Gray,et al.  Image retrieval using color histograms generated by Gauss mixture vector quantization , 2004, Comput. Vis. Image Underst..

[2]  Ahmet M. Eskicioglu,et al.  An SVD-based grayscale image quality measure for local and global assessment , 2006, IEEE Transactions on Image Processing.

[3]  Chun-Ling Yang,et al.  Gradient-Based Structural Similarity for Image Quality Assessment , 2006, 2006 International Conference on Image Processing.

[4]  Zhou Wang,et al.  Multiscale structural similarity for image quality assessment , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.

[5]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Somdip Dey SD-EI: A cryptographic technique to encrypt images , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[7]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[8]  K. M. S. Soyjaudah,et al.  A New Approach to Partial Image Encryption , 2013 .

[9]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[10]  James Ze Wang,et al.  Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.

[11]  K. M. S. Soyjaudah,et al.  Analysis and Comparison of Fully Layered Image Encryption Techniques and Partial Image Encryption Techniques , 2012 .

[12]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[13]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[14]  Xiaodong Gu,et al.  Image quality assessment using edge and contrast similarity , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[15]  Wenjun Zhang,et al.  Image quality assessment metrics based on multi-scale edge presentation , 2005, IEEE Workshop on Signal Processing Systems Design and Implementation, 2005..