Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Unified Approach With Neural Network for Authentication, Security and Compression of Image: UNICAP
Dattatherya, S. Venkata Chalam, Manoj Kumar Singh
Pages - 13 - 25 | Revised - 15-01-2012 | Published - 21-02-2012
Published in International Journal of Image Processing (IJIP)
MORE INFORMATION
KEYWORDS
Image Compression, Protection, Authentication, Neural Network.
ABSTRACT
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
1 | Singh, P. K., Alam, M. M., & Tyagi, S. (2015). Image Encryption Technique Based on Permutation and Combination. |
2 | Kekre, H. B., Sarode, T., & Natu, P. (2014, September). Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 619-624). IEEE. |
3 | Kumar, M., Aggarwal, A., & Garg, A. (2014). A Review on Various Digital Image Encryption Techniques and Security Criteria. International Journal of Computer Applications, 96(13), 19-26. |
4 | Dattatherya, K. S., MadhaviLatha, M., & Singh, M. K. Image Authentication with Tampering Localization using Chaotic and Neural Mapping. |
5 | Dattatherya, S., & Singh, M. K. (2013). A Generalized Image Authentication Based On Statistical Moments of Color Histogram. Int. J. on Recent Trends in Engineering and Technology, 8(1). |
Amir Akhavan, Hadi Mahmodi and Afshin Akhshani,”A New Image Encryption Algorithm based on One-Dimensional Polynomial Chaotic Maps”,springer,LNCS, 2006, Volume 4263, pp.963-971. | |
Eric Kee, Micah K. Johnson, and Hany Farid, ”Digital Image Authentication From JPEG Headers”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 6, n. 3, Septmber 2011, pp. 1066 – 1075. | |
Feng Huang and Yong Feng, ”Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm “,Springer, Frontiers of Electrical and Electronic Engineering in China Volume 4, Number 1, 2009, pp.5-9. | |
Jun Peng and Du Zhang,”Image Encryption and Chaotic Cellular Neural Network”, Springer 2009.pp. 183-213, | |
Li Lizong; Gao Tiegang, Gu Qiaolun. Bi Lei. ”An image authentication and verification based on public Key “,International Conference on Artificial Intelligence and Computational Intelligence Nov. 2009 , pp. 389 – 392. | |
Mahmood Al-khassaweneh and Selin Aviyente, ”Image Encryption Scheme Based on Using Least square Approximation Techniques “, IEEE International Conference , May 2008 ,pp. 108 – 111. | |
Mona F.M. Mursi, Ghazy M.R. Assassa, Hatim A. Aboalsamh, Khaled Alghathbar. “A Secure Semi-Fragile JPEG Image Authentication Scheme Based on Discrete Cosine Transform”. International Conference on Computing, Engineering and Information 2009, pp. 285 – 291. | |
Nidhi S Kulkarni, Indra Gupta and Shailendra N Kulkarni,”A Robust Image Encryption Technique Based on Random Vector “ First International Conference on Emerging Trends in Engineering and Technology”, ICETET, July 2008, pp. 15 – 19. | |
Poonkuntran.S.Rajesh,R.S.,”A messy watermarking for medical image Authentication”, International Conference on Communications and Signal Processing (ICCSP), Feb. 2011, pp. 418 - 422. | |
Rong-Jian Chen, Wen-Kai Lu and Jui-Lin Lai ”Image Encryption Using Progressive Cellular Automata Substitution and SCAN’’. IEEE International Symposium on Circuits and Systems, ISCAS , Vol. 2, 2005. pp. 1690 - 1693 | |
Shaojiang Deng, Linhua Zhang and Di Xiao,”Image Encryption Scheme Based on Chaotic Neural System “Springer,LNCS, Volume 3497/2005, pp. 810. | |
Srividya.G, Nandakumar.P ”A Triple-Key Chaotic Image Encryption Method”. International Conference on Communications and Signal Processing (ICCSP), Feb.2011, pp. 266 – 270. | |
Syed Ali Naqi Gilani , M. Ajmal Bangash ,” Enhanced Block Based Color Image Encryption Technique with Confusion”. IEEE ,INMIC 2008. pp. 200 – 206. | |
un-Chou Chuang , Yu-Chen Hu, “An adaptive image authentication scheme for vector quantization compressed image”, Elsevier Journal of Visual Communication and Image Representation, Volume 22, Issue 5, July 2011, pp. 440-449. | |
Xingyuan Wang, Xiaojuan Wang, Jianfeng Zhao and Zhenfeng Zhang,”Chaotic encryption algorithm based on alternant of stream cipher and block cipher”, Nonlinear Dynamics, Volume 63, Number 4, Springer 2011, pp.587-597. | |
Zhenni Peng, Wenbo Liu,”Color image authentication based on spatiotemporal chaos and SVD”Chaos, Solitons & Fractals,Volume 36, Issue 4, May 2008, pp. 946-952. | |
Mr. Dattatherya
- India
Mr. S. Venkata Chalam
- India
Mr. Manoj Kumar Singh
Manuro Tech Research - India
mksingh@manuroresearch.com
|
|
|
|
View all special issues >> | |
|
|