Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sultana, Sayyada Fahmeeda
- Authentication, Tamper Localization and Rectification algorithm with Privacy Preservation of Image for the Cloud Using HMAC
Abstract Views :186 |
PDF Views:5
Authors
Affiliations
1 Department of Computer Science and Engineering, PDA Engineering College, IN
2 Department of Computer Science, Visvesvaraya Technological University, IN
1 Department of Computer Science and Engineering, PDA Engineering College, IN
2 Department of Computer Science, Visvesvaraya Technological University, IN
Source
ICTACT Journal on Image and Video Processing, Vol 8, No 2 (2017), Pagination: 1660-1664Abstract
Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many approaches have been proposed to protect the privacy of multimedia images over cloud through cryptography, these cryptographic approaches prevent the visibility of image contents but it does not identify if any changes are made on encrypted data by insider attack and cipher-text only attack. In this paper, we proposed to provide authentication, tamper localization, rectification along with privacy preservation of the image using padding extra bit plane for tamper localization, Hash message authentication code (HMAC) algorithm to authentication image, tamper rectification. The proposed algorithm will provide privacy to the image through hiding bit planes.Keywords
Image Authentication, Privacy Preservation, Tamper Localization, Cloud, Insider Attack, Sabotage Attack, Hash Message Authentication Code.References
- Matt Bishop, et al., “Insider Threat Identification by Process Analysis”, IEEE Security and Privacy Workshops, pp. 251-264, 2014.
- Seyed Mohammad Mousavi, “Image Authentication Scheme using Digital Signature and Digital Watermarking”, International Journal of Computational Engineering and Management, Vol. 16, No. 3, pp. 59-63, 2013.
- M.S. Wang and W.C. Chen, “A Majority-Voting Based Watermarking Scheme for Colour Image Tamper Detection and Recovery”, Computer Standards and Interfaces, Vol. 29, No. 5, pp. 561-570, 2007.
- J.J. Eggers and B. Girod, “Blind Watermarking Applied to Image Authentication”, Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1977-1980, 2001.
- E.T. Lin, C.I. Podilchuk and E.J. Delp, “Detection of Image Alterations using Semi-Fragile Watermarks”, Proceedings of International Society for Optics and Photonics in Electronic Imaging, pp. 152-163, 2000.
- D. Kundur and D. Hatzinakos, “Digital Watermarking for Telltale Tamper Proofing and Authentication”, Proceedings of the IEEE, Vol. 87, No. 7, pp. 1167-1180, 1999.
- S. J. Jereesha Mary, C. Seldev Christopher and S. Sebastin Antony Joe, “Novel Scheme for Compressed Image Authentication using LSB Watermarking and EMRC6 Encryption”, Circuits and Systems, Vol. 7, pp. 1722-1733, 2016.
- P. Meenakshi Devi, “Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform”, International Journal of Computer Science and Information Security, Vol. 6, No. 2, pp. 67-74, 2009.
- D.E. Popescu and A.M. Lonea, “An Hybrid Text-Image Based Authentication for Cloud Services”, International Journal of Computer Communication, Vol. 8, No. 2, pp. 263-274, 2013.
- Suraj Kumar Singh, Varun P. Gopi and P. Palanisamy, “Image Security using DES and RNS with Reversible Watermarking”, Proceedings of IEEE International Conference on Electronics and Communication, pp. 354-368, 2014.
- Sajjad Dadkhah , Azizah Abd Manaf and Somayeh Sadeghi, “Efficient Digital Image Authentication and Tamper Localization Technique using 3LSB Watermarking”, International Journal of Computer Science Issues, Vol. 9, No. 2, pp. 1-8, 2012.
- Eric Kee, Micah K. Johnson and Hany Farid, “Digital Image Authentication from JPEG Headers”, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 1066-1075, 2011.
- Ching-Yung Lin and Shih-Fu Chang, “A Robust Image Authentication method Distinguishing JPEG Compression from Malicious Manipulation”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, No. 2, pp. 153-168, 2001
- William R. Claycomb, Carly L. Huth, Lori Flynn, David M. McIntire and Todd B. Lewellen, “Chronological Examination of Insider Threat Sabotage: Preliminary Observations”, Software Engineering Institute, pp. 1-15, 2012.
- Miltiadis Kandias, Nikos Virvilis and Dimitris Gritzalis, “The Insider Threat in Cloud Computing”, Proceeding of 6th International Workshop, pp. 93-103, 2011
- William R. Claycomb and Alex Nicoll, “Insider Threats to Cloud Computing: Directions for New Research Challenges”, Proceedings of IEEE 36th Annual Computer Software and Applications Conference, pp. 154-159, 2012
- Adrian Duncan, Sadie Creese and Michael Goldsmith, “An Overview of Insider Attacks in Cloud Computing”, Concurrency and Computational Practice and Experience, Vol. 27, No. 12, pp. 2964-2981, 2014.
- Mihir Bellare, Ran Canetti and Hugo Krawczyk, “Keying Hash Functions for Message Authentication”, Proceedings of Annual International Cryptology Conference, pp. 1-15, 1996.
- T. Venkata Sainath Gupta, C. Naveen, V.R. Satpute and A.S. Gandhi, “Image Security using Chaos and EZW Compression”, Proceedings of IEEE Students Conference on Engineering and Systems, pp. 115-119, 2014.
- Atef Masmoudi and William Puech, “Lossless Chaos-based Crypto-Compression Scheme for Image Protection”, IET Image Processing, Vol. 8, No. 12, pp. 671-686, 2014.
- Wan-Li Lyu, Chin-Chen Chang and Feng Wang, “Image Authentication and Self-Recovery Scheme based on the Rehashing Model”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 3, pp. 460-474, 2016.
- Hong Zhong, Haiquan Liu, Chin-Chen Chang, “A Novel Fragile Watermark-based Image Authentication Scheme for AMBTC-compressed Images”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 2, pp. 362-375, 2016.
- Mihir Bellare, Ran Canetti and Hugo Krawczyk, “Keying Hash Functions for Message Authentication”, Proceedings of Advances in Cryptology, pp. 1-19, 1996.
- Bo Zhao, Guihe Qin and Pingping Liu, “A Robust Image Tampering Detection Method based on Maximum Entropy Criteria”, Entropy, Vol. 17, No. 12, pp. 7948-7966, 2015.
- Privacy Preservation of Videos using Neutrosophic Logic based Selective Encryption
Abstract Views :195 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Poojya Doddappa Appa College of Engineering, IN
2 Department of Computer Science and Engineering, Visvesvaraya Technological University, IN
1 Department of Computer Science and Engineering, Poojya Doddappa Appa College of Engineering, IN
2 Department of Computer Science and Engineering, Visvesvaraya Technological University, IN
Source
ICTACT Journal on Image and Video Processing, Vol 9, No 3 (2019), Pagination: 1960-1965Abstract
Having great photos and video phone, but what happens when you decide to buy a new phone or your storage becomes too full to take any more, back it all on the cloud. It’s no secret that videos are a valuable way of communicating information. With attention spans dropping and the need to get larger amounts of information across in a shorter period of time, a well-placed video can take your presentation to the next level these presentations need to be up to date and available wherever you are, back it all on the cloud. Better collaboration and communication through the use of cloud as cloud allows users to access the latest versions of any multimedia data (text, video, images, audio, etc), so they can stay on top changes, which can help businesses to better manage their work flow, regardless of geographical location or spread. Multimedia data like videos stored on cloud are vulnerable to various types of threats like known plain text attach, threat to data, denial of service, etc. To overcome these problems videos need to be encrypted before it gets stored on cloud. Encrypting whole video is a time consuming task, to get rid of time complexity videos can be encrypted using selective encryption many researchers in the state of art have proposed techniques for selective image encryption. In this paper, a frame work is proposed for selective encryption of videos in two stages. The first stage is, Region of interest (ROI) identification performed based on Neutrosophic Logic, watershed image segmentation method. Second Stage is ROI encryption which is performed using the proposed Decision Based Encryption (DBE) Algorithm. The proposed frame work is fast, robust, highly scalable and accurate to meet the need of current internet bandwidth and speed.Keywords
Selective Video Encryption, Privacy Preservation, Neutrosophic Logic, Cloud, Decision Based Encryption Algorithm, DBE.References
- Florentin Smarandache, “Neutrosophic Logic-A Generalization of the Intuitionistic Fuzzy Logic”, International Journal of Pure and Applied Mathematics, Vol. 24, No. 3, pp. 287-297, 2005.
- Ming Zhang, Ling Zhang, H.D. Cheng, “A Neutrosophic Approach to Image Segmentation based on Watershed Method”, Signal Processing, Vol. 90, No. 5, pp. 1510-1517, 2010.
- W. Hamidouche, M. Farajallah, N.O.-Sidaty, S.E. Assad and O. Deforges, “Real-Time Selective Video Encryption based on the Chaos System in Scalable HEVC Extension”, Signal Processing: Image Communication, Vol. 58, No. 1, pp. 73-86, 2017.
- L. Qiao and K. Nahrstedt, “Comparison of MPEG Encryption Algorithms”, Computers and Graphics, Vol. 22, No. 4, pp. 437-448, 1998.
- G.V. Wallendael, A. Boho, J.D. Cock, A. Munteanu and R.V.D. Walle, “Encryption for High Efficiency Video Coding with Video Adaptation Capabilities”, IEEE Transactions on Consumer Electronics, Vol. 59, No. 3, pp. 634-642, 2013.
- Tao Xiang, Jia Hu and Jianglin Sun, “Outsourcing Chaotic Selective Image Encryption to the Cloud with Steganography”, Digital Signal Processing, Vol. 43, pp. 28-37, 2015.
- Ahmed M. Ayoup, Amr H Hussein and Mahmoud Ali, “Efficient Selective Image Encryption”, Multimedia Tools and Applications, Vol. 75, No. 24, pp. 17171-17186, 2016.
- G. Liu, T. Ikenaga, S. Goto and T. Baba, “A Selective Video Encryption Scheme for MPEG Compression Standard”, IEICE Transaction on Fundamentals, Vol. 89, No. 1, pp. 194- 202, 2006.
- Zafar Shahid and William Puech, “Visual Protection of HEVC Video by Selective Encryption of CABAC Bin-Strings”, IEEE Transactions on Multimedia, Vol. 16, No. 4, pp. 24-36, 2014.
- Wassim Hamidouche, Mickael Raulet and Olivier De-Forges, “Real time SHVC Decoder: Implementation and Complexity Analysis”, Proceedings of IEEE International Conference on Image Processing, pp. 233-239, 2014.
- Jiri Fridrich, “Symmetric Ciphers based on Two-dimensional Chaotic Maps”, International World Scientific Journal on Bifurcation and Chaos, Vol. 8, No. 6, pp. 1259-1284, 1998.
- Safwan E1 Assad and Hassan Noura, “Generator of Chaotic Sequences and Corresponding Generating System”, US Patent-US20130170641A1, University of Nantes, 2014.
- Mousa Farajallah, Z Fawaz, Safwan E1 Assad and Olivier Dforges, “Efficient Image Encryption and Authentication Scheme based on Chaotic Sequences”, Proceedings of International Conference on Emerging Security Information Systems and Technologies, pp. 150-155, 2013.
- Rukhin Andrew, Soto Juan, Nechvatal James, Smid Miles and Barker Elaine, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, Technical Report, Department of Commerce, National Institute of Standard and Technology, 2001.
- Vivienne Sze and Madhukar Budagavi, “High Throughput CABAC Entropy Coding in HEVC”, IEEE Transactions on Circuits and System for Video Technology, Vol. 22, No. 2, pp. 1778-1791, 2012.
- Nakkl Masuda, Goce Jakimoski, Kazuyuki Aihara and Ljupco Kocarev, “Chaotic Block Ciphers: from Theory to Practical Algorithms”, IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 53, No. 6, pp. 1341-1352, 2006.
- Xingyuan Wang, Dapeng Luan and Xuemei Bao, “Cryptanalysis of an Image Encryption Algorithm using Chebyshev Generator”, Digital Signal Processing, Vol. 25, No. 2, pp. 244-247, 2014.
- Shiguo Lian, Jinsheng Sun, Jinwei Wang and Zhiquan Wang, “A Chaotic Stream Cipher and the usage in Video Protection”, International Journal of Chaos Solitons and Fractals, Vol. 34, No. 3, pp. 851-859, 2007.
- S.F. Sultana , and D.C. Shubhangi, “Video Encryption Algorithm and Key Management using Perfect Shuffle”, International Journal of Engineering Research and Applications, Vol. 7, No. 2, pp. 1-5, 2017.
- K.T. Atanassov, “Intuitionistic fuzzy sets”, Fuzzy Sets and Systems, Vol. 20, No. 1, pp. 87-96, 1986.
- L.A. Zadeh, “Fuzzy Sets”, Information and Control, Vol. 8, No. 3, pp. 353-383, 1965.
- G. Priest, “Paraconsistent Logic”, Kuluwer Academic Publishers, 2002.
- W. Bruno, “Dialethesim, logical consequence and hierarchy”, Analysis, Vol. 64, No. 4, pp. 318-326, 2004.
- F. Smarandache, “A Unifying Field in Logics Neutrosophic Logic, Neutrosophy, Neutrosophic Set”, American Research Press, 2003.
- Mario Preishuber, Thomas Hütter, Stefan Katzenbeisser and Andreas Uhl, “Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption”, IEEE Transactions on Information Forensics and Security, Vol. 13, No. 9, pp. 2137-2150, 2018.