An Overview of Image Security Techniques

Today, the world is going to be digitalized in all the ways. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. These images over the internet which will not be secure. Therefore there is a need of image security. Currently, there exists various image security techniques like encryption, watermarking, steganography, etc. This paper discusses the basic image security techniques, the survey of the recent research in the field of image securities like ANN Based Approach, Genetic Algorithm Based Approach, DCT based approach, chaos-based approach, SVD based approach, Steganographic based approach, DWT based approach, visual cryptography based approach, watermarking based approach. The paper provides the future scope of image security.

[2]  John A. Courtright,et al.  Normative Images of Communication Media Mass and Interpersonal Channels in the New Media Environment , 1993 .

[3]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[4]  Vinod Patidar,et al.  Medical image protection using genetic algorithm operations , 2014, Soft Computing.

[5]  Howard M. Heys,et al.  An extended visual cryptography scheme without pixel expansion for halftone images , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[6]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[7]  S. Shefali,et al.  Self embedding technique for digital color image authentication and security , 2007, 2007 International Conference on Industrial and Information Systems.

[8]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[9]  K. Anusudha,et al.  An algorithm for enhanced image security with reversible data hiding , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[10]  Tingting Wang,et al.  Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.

[11]  Bo Zhang,et al.  XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan , 2004 .

[12]  Chiragkumar B. Patel,et al.  Simulation and Implementation Novel Hybrid Blind Method of Image Security , 2012 .

[13]  Wei Lu,et al.  Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Kuan-Ta Chen,et al.  Involuntary Information Leakage in Social Network Services , 2008, IWSEC.

[15]  Afshan Mulla,et al.  Probabilistic triangular shuffling approach in DWT based image compression scheme , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).

[16]  Xu Zhengquan,et al.  An Active-Passive Security Protection Method for Remote Sensing Image , 2011, 2011 International Conference on Network Computing and Information Security.

[17]  A. S. Gandhi,et al.  Image security using chaos and EZW compression , 2014, 2014 Students Conference on Engineering and Systems.

[18]  Michael Frankfurter Information Security Intelligence Cryptographic Principles And Applications , 2016 .

[19]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[20]  Lixin Shen,et al.  Adaptive Inpainting Algorithm Based on DCT Induced Wavelet Regularization , 2013, IEEE Transactions on Image Processing.

[21]  Christophe Charrier,et al.  Blind Image Quality Assessment: A Natural Scene Statistics Approach in the DCT Domain , 2012, IEEE Transactions on Image Processing.

[22]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[23]  G. Singh,et al.  Cuckoo search algorithm based satellite image contrast and brightness enhancement using DWT-SVD. , 2014, ISA transactions.

[25]  Richard J. Duro,et al.  An ANN based hyperspectral waterway control and security system , 2011, 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings.

[27]  Ahmad Abusukhon,et al.  A novel network security algorithm based on private key encryption , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[28]  Ebrahim Zarei Zefreh,et al.  Image security system using recursive Cellular automata substitution and its parallelization , 2011, 2011 CSI International Symposium on Computer Science and Software Engineering (CSSE).

[29]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[30]  M. Omair Ahmad,et al.  A Study of Multiplicative Watermark Detection in the Contourlet Domain Using Alpha-Stable Distributions , 2014, IEEE Transactions on Image Processing.

[31]  Arnab Mitra Investigating scopes for automata based designs targeting image security in health system , 2015, 2015 E-Health and Bioengineering Conference (EHB).

[32]  Afshan Mulla,et al.  Sub-band exchange DWT based image fusion algorithm for enhanced security , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[33]  Asoke K. Nandi,et al.  Watermarking method with exact self-propagating restoration capabilities , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[34]  Vasif V. Nabiyev,et al.  Secret Sharing Scheme to implement medical image security , 2010, 2010 IEEE 18th Signal Processing and Communications Applications Conference.

[35]  G. R. Suresh,et al.  Security in medical image communication with arnold's cat map method and reversible watermarking , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).

[36]  P. V. V. Kishore,et al.  Medical image watermarking with ANN in wavelet domain , 2015, 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).

[37]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[38]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[39]  Xing-yuan Wang,et al.  A novel image encryption algorithm based on dynamic S-boxes constructed by chaos , 2013, Nonlinear Dynamics.

[40]  A. S. Gandhi,et al.  A simple and efficient approach for medical image security using chaos on EZW , 2015, 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR).

[41]  Shashank Srivastava,et al.  An approach for virtual machine image security , 2014, 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).