(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Image Processing and Computer Vision (TIPCV)

ISSN (Print):    ISSN (Online):2455-4707
Volume-7 Issue-22 February-2021
Full-Text PDF
Paper Title : A study and analysis of image security algorithms and the current challenges
Author Name : Shubham Shashikant Patil, Kailash Patidar, Gourav Saxena and Narendra Sharma
Abstract :

In any era, communication is very important. In today’s era effective data communication is important in all the fields. Here effectiveness was used in terms of secure communication. So, communication in the way that it is secure from any unauthorized access is important. In this paper a study and analysis were performed in the direction of image data security. This paper explores the current trends in the direction of image data security. It covers methods for image data security, tools and techniques, current challenges along with suggestive measures. It also explores the mitigating ways and directions to achieve high level image data security in the means of data communication. Cryptography and steganography methods were also being discussed, so that better methods can be selected for achieving high level data security.

Keywords : Image data security, Unauthorized access, Cryptography, Steganography.
Cite this article : Patil SS, Patidar K, Saxena G, Sharma N. A study and analysis of image security algorithms and the current challenges. ACCENTS Transactions on Image Processing and Computer Vision. 2021; 7(22):1-6. DOI:10.19101/TIPCV.2021.722002.
References :
[1]Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine. 2001; 1(3):6-21.
[Crossref] [Google Scholar]
[2]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In International Conference on Advances in Computing and Communication Engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[3]Qiu J, Wang P. An image encryption and authentication scheme. In International Conference on Computational Intelligence and Security 2011 (pp. 784-787). IEEE.
[Crossref] [Google Scholar]
[4]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In International Conference on Advances in Computing and Communication Engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[5]Hu G, Feng Z, Wang L. Analysis of a type of digital chaotic cryptosystem. In International Symposium on Circuits and Systems. Proceedings 2002 (pp. III-III). IEEE.
[Crossref] [Google Scholar]
[6]Boiko J, Kovtun I, Petrashchuk S. Productivity of telecommunication systems with modified signal-code constructions. In International Scientific-Practical Conference Problems of Infocommunications. Science and Technology 2017 (pp. 173-8). IEEE.
[Crossref] [Google Scholar]
[7]Millérioux G, Amigó JM, Daafouz J. A connection between chaotic and conventional cryptography. IEEE Transactions on Circuits and Systems I: Regular Papers. 2008; 55(6):1695-703.
[Crossref] [Google Scholar]
[8]Zahan A, Hossain MS, Rahman Z, Shezan SK. Smart home IoT use case with elliptic curve based digital signature: an evaluation on security and performance analysis. International Journal of Advanced Technology and Engineering Exploration. 2020;7(62):11-9.
[Google Scholar]
[9]Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology. 2006;16(3):354-62.
[Crossref] [Google Scholar]
[10]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014;4(2):645-52.
[Google Scholar]
[11]Seethalakshmi AV, Hemachitra HS. Complex type seed variety identification and recognition using optimized image processing techniques. ACCENTS Transactions on Image Processing and Computer Vision. 2020; 6 (19): 23-31.
[Crossref] [Google Scholar]
[12]Gladwin SJ, Gowthami PL. Combined cryptography and steganography for enhanced security in suboptimal images. In International Conference on Artificial Intelligence and Signal Processing 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[13]Al-Kadei FH, Mardan HA, Minas NA. Speed up image encryption by using RSA algorithm. In International Conference on Advanced Computing and Communication Systems 2020 (pp. 1302-1307). IEEE.
[Crossref] [Google Scholar]
[14]Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020; 8:25777-88.
[Crossref] [Google Scholar]
[15]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI international conference on software engineering 2012 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[16]Sharma V, Shukla M, Srivastava S, Mandal R. Generative network based image encryption. In International Conference on Intelligent Computing and Control Systems 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[17]Abhinav A, Manikandan VM, Bini AA. An improved reversible data hiding on encrypted images by selective pixel flipping technique. In international conference on devices, circuits and systems 2020 (pp. 294-8). IEEE.
[Crossref] [Google Scholar]
[18]Santos TA, Magalhães EP, Basílio NP, Nepomuceno EG, Karimov TI, Butusov DN. Improving chaotic image encryption using maps with small Lyapunov exponents. In Moscow workshop on electronic and networking technologies 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[19]Hu D, Zheng Y, Zhang H, Sun S, Xie F, Shi J, Jiang Z. Informative retrieval framework for histopathology whole slides images based on deep hashing network. In international symposium on biomedical imaging 2020 (pp. 244-8). IEEE.
[Crossref] [Google Scholar]
[20]Wahid SD, Buja AG, Jono MH, Aziz AA. Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling. International Journal of Advanced Technology and Engineering Exploration. 2021; 8 (74): 73-81.
[Google Scholar]
[21]Kalaichelvi T, Apuroop P. Image steganography method to achieve confidentiality using CAPTCHA for authentication. In international conference on communication and electronics systems 2020 (pp. 495-499). IEEE.
[Crossref] [Google Scholar]
[22]Ye H, Huang S, Liu W. Research on image scrambling method based on combination of Arnold transform and exclusive-or operation. In information technology, networking, electronic and automation control conference 2020 (Vol. 1, pp. 151-154). IEEE.
[Crossref] [Google Scholar]
[23]Srivastava M, Siddiqui J, Ali MA. Local binary pattern based technique for content based image copy detection. In international conference on power electronics & IoT applications in renewable energy and its control 2020 (pp. 374-377). IEEE.
[Crossref] [Google Scholar]
[24]Samvatsar M, Kanungo P. An analytical review and analysis for the data control and security in cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(73):241-6.
[Crossref] [Google Scholar]
[25]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In international conference on innovative mechanisms for industry applications 2020 (pp. 665-9). IEEE.
[Crossref] [Google Scholar]
[26]Kushnir M, Kosovan H, Kroialo P, Komarnytskyy A. Encryption of the images on the basis of two chaotic systems with the use of fuzzy logic. In international conference on advanced trends in radioelectronics, telecommunications and computer engineering 2020 (pp. 610-3). IEEE.
[Crossref] [Google Scholar]
[27]Han B, Jia Y, Huang G, Cai L. A medical image encryption algorithm based on Hermite chaotic neural network. In information technology, networking, electronic and automation control conference 2020 (Vol. 1, pp. 2644-8). IEEE.
[Crossref] [Google Scholar]
[28]Kaur S, Jindal A. Singular value decomposition (SVD) based image tamper detection scheme. In international conference on inventive computation technologies 2020 (pp. 695-9). IEEE.
[Crossref] [Google Scholar]
[29]Abdulrahman A, Varol S. A review of image segmentation using MATLAB environment. In international symposium on digital forensics and security 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[30]Zhang H, Zhu J, Zhao S, He Q, Zhong X, Liu J. A new image encryption algorithm based on 2D-LSIMM chaotic map. In international conference on advanced computational intelligence 2020 (pp. 326-333). IEEE.
[Crossref] [Google Scholar]
[31]Abdallah Y. Segmentation of brain stroke lesions using marker-based algorithms in CT images. In international conference on computer applications & information security 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[32]Yadahalli SS, Rege S, Sonkusare R. Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques. In international conference on communication and electronics systems 2020 (pp. 1325-30). IEEE.
[Crossref] [Google Scholar]
[33]Luo Y, Zhu L. Research on data augmentation for object detection based on x-ray security inspection picture. In international conference on advances in electrical engineering and computer applications 2020 (pp. 219-22). IEEE.
[Crossref] [Google Scholar]
[34]Kukharska N, Lagun A, Polotai O. The steganographic approach to data protection using Arnold algorithm and the pixel-value differencing method. In international conference on data stream mining & processing 2020 (pp. 174-177). IEEE.
[Google Scholar]
[35]Kumar PR, Sarkar A, Mohanty SN, Kumar PP. Segmentation of white blood cells using image segmentation algorithms. In international conference on computing, communication and security 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[36]Arpac B, Kurt E. An innovative tool for the chaotic image encryption, decryption and security tests. In international conference on electrical, communication, and computer engineering 2020 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[37]Abedin ZU, Guan Z, Arif AU, Anwar U. An advance cryptographic solutions in cloud computing security. In international conference on computing, mathematics and engineering technologies 2019 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[38]Chukry S, Sbeyti H. Security enhancement in storage area network. In international symposium on digital forensics and security 2019 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[39]Eddermoug N, Sadik M, Sabir E, Mansour A, Azmi M. PPSA: profiling and preventing security attacks in cloud computing. In international wireless communications & mobile computing conference 2019 (pp. 415-21). IEEE.
[Crossref] [Google Scholar]
[40]Tanash RM, Ala’F K, Darabkh KA. Communication over cloud computing: a security survey. In international convention on information and communication technology, electronics and microelectronics 2019 (pp. 496-501). IEEE.
[Crossref] [Google Scholar]
[41]Tripathi J, Saini A. Enhanced visual cryptography: an augmented model for image security. Procedia Computer Science. 2020; 167:323-33.
[Crossref] [Google Scholar]