Multi-level Security System for Image Transmission with Confidence Guarantee | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 10, Volume 27, Issue 2, July 2018, Page 212-236 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2018.63189 | ||||
View on SCiNiTO | ||||
Authors | ||||
Hayam A. Abd El-Hameed1; Sami A. El-Dolil2; Moawad I. Dessouky3; Emad S. Hassan4; Ibrahim M. EL-Dokany1; Fathi E. Abd El-Samie1 | ||||
1Dept. of Electronics and Electrical Communications Eng. Faculty of Electronic Eng., Menoufia University, Menouf, 32952, EGYPT. | ||||
2Dept. of Electronics and Electrical Communications Eng., Faculty of Electronic Engineering, Menoufia University, Egypt | ||||
3Dept. of Electronics and Electrical Communications Eng., Faculty of Electronic Engineering, Menoufia University, Egyp | ||||
4Dept. of Electrical Engineering, Jazan University, Jazan, SAUDI ARABIA hayamabdalmordy@yahoo.com, emad.hassan@el-eng.menofia.edu.eg, | ||||
Abstract | ||||
This paper presents multi-level security scheme for images transmission, by applying signature with encryption schemes. Signature is based on Discrete Cosine Transform (DCT) and Encodingusing Double Random Phase Encoding (DRPE). The proposed multi-level scheme exploits the benefit of signature and encryption, which give strong images against image processing attacks. Several experiments are executed to test the performance of the scheme. The proposed scheme increases the level of security for transmitting images and it has better immunity to noise. | ||||
References | ||||
[1] J.Sravanthi, M. H. M. Krishna Prasad, "Robust and Secure Digital Signature for Image Authentication, over Wireless Channels", International Journal of Computer Trends and Technology, pp.245-250, 2011. [2] Seitz J., ''Digital Watermarking for Digital Media'', (Idea Group Publishing, 2005), Ch. 2. [3] Schneider M., Chang S. F., „A content based Digital Signature for Image Authentication‟, Proc. IEEE Int. Conf. Image Processing (ICIP‟96), 1996, pp. 227–230. [4] HayamAbdel Hameed, Emad S. Hassan, Sami El-Dolil, and F.E. Abd ElSamie" A Discrete Cosine Transform Based-Watermarking Scheme, for Confidence Guarantee Image Transmission,” Digital Image Processing, Vol. 6, No. 3, pp. 131-138, 2014. [5] G. H. Situ and J. Zhang, “Double Random-Phase Encoding in the Fresnel Domain,” Opt. Lett., Vol. 29, pp. 1584-1586, July 2004. [6] G. Unnikrishnan and K. Singh, “Double Random Fractional Fourier Domain Encoding for Optical Security,” Opt. Eng., Vol. 39, pp. 2853- 2859, November 2000. [7] J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical Image Encryption based on -XOR Operations,” Opt. Eng., Vol. 38, pp. 47-54, January 1999. [8] P. K. Wang, L. A. Watson, and C. Chatwin, “Random Phase Encooding forOptical Security,” Opt. Eng., Vol. 35, pp. 2464-2469, September 1996. [9] Y. Li, K. Kreske, and J. Rosen, “Security and Encryption Optical System Based on- a Correlator with Significant Output Images,” Appl. Opt., Vol. 39, pp. 5295-5301, October 2000. [10] N. Towhgi, B. Javidi, and Z. Luo, “Fully Phase Encrypted Image Processor,” J. Opt. Soc. Am. A, Vol. 16, pp. 1915-1927, August 1999. [11] T. Nomura and B. Javidi, “Optical Encryption using a Joint Transform Correlator Architecture,” Opt. Eng., Vol. 39, pp. 2031-2034, August 2000. [12] X. F. Meng, L. Z. Cai, and X. L. Yang, “Information Security Systems by-Iterative Multiple Phase Retrieval and Pixel Random Permutation,” Appl. Opt., Vol. 45 pp. 3289-3297, May 2005. [13] Hayam A. Abdel Hameed, Emad S. Hassan, Sami A. El-Dolil, and F.E. Abd El-Samie" A New Hybrid Scheme based on Digital Watermarking and Signature for Confidence Guarantee Image Transmission, “Wireless Personal Communications, DOI 10.1007/s11277-017-4381-2,2017. [14] P. Refregier and B. Javidi, “Optical Image Encryption, based onInput Plane and Fourier Plane Random Encoding,” Opt. Lett., Vol. 20, pp. 767-769, April 1995. [15] G. Unnikrishnan, J. Joseph and K. Singh, “Optical Encryption by Double Random Phase Encoding in the Fractional Fourier Domain,” Opt. Lett., Vol.25, pp. 887–889, December 2000. [16] F.M. Liu, H.C. Zhai and X.P. Yang, “Kino form Based Iterative Random Phase Encryption,” Acta. Phys., Sin.52, pp.2462–2465, October 2003 (in Chinese). [17] X.P. Yang and H.C. Zhai, “Optimization of Kino form in DoubleRandom-Phase Encryption,” Acta. Phys., Sin.54, pp. 1578–1582, April 2005 (in Chinese). [18] B.Javidi, A.Sergent, G.Zhang, and L.Guibert,“Fault Tolerance Properties of a Double Phase Encoding Encryption Technique,” Opt. Eng., Vol. 36, pp. 992–998, 1997. [19] Xiaojun Qi and KokSheik Wong, “An Adaptive DCT-Based MOD-4 Steganography Method”, Proceedings of theIEEE,pp.7803-9134, 2005. [20] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, “Steganographic Approach for Image Hiding in DCT Domain”, International Journal of Advances in Engineering & Technology, Issn: 2231-1963, Vol. 1, Issue 3, pp.72-78, July 2011. [21] Frank Hartung and Martin Kutter, “Multimedia Watermarking Techniques”, Proceedings of the IEEE, Vol. 87, IEEE Press, Piscataway, No. 7,pp.1079-1107, July 1999. [22] Lou D.C., Liu J.L. and LI C.-T. „Digital Signature-Based Image Authentication‟, in LU C.S. (EDS.) „Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property‟ (Idea Group Inc., 2003). [23] Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the Double Random Phase Encryption Against Various Attacks,” Opt. Express, Vol.15, pp.10253–10265, (2007). [24] A. Carnicer, M. Montes Usategui, S. Arcos, and I. Juvells, “Vulner Ability to Chosen-Cypher Text Attacks of Optical Encryption Schemes based on Double Random Phase Keys,” Opt. Lett., Vol.30, pp.1644–1646, (2005). [25] X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-Plaintext Attack on Optical Encryption based on-Double Random Phase Encoding,” Opt. Lett., Vol.31, pp.1044–1046, (2006). [26] Karuna Kesavan K.and RatheeshkumarM.,"OpticalColor Image Encryption based on-Hartley Transform and Double Random Phase Encoding System"7-77- 8111- pp.963-978. [27] Ahmed Elshamy, Ahmed Rashed, Abd El-Naser Mohamed, Osama Faragalla, Yi Mu, SalehAlshebeili, and F. E. Abd El-Samie "Optical Image Encryption based on-Chaotic Baker map and Double Random Phase Encoding", Journal of Light Wave Technology IEEE, Vol. 31, No. 15, pp. 2533-2539, August 2013. [28] E. M. El-Bakary, E. S. Hassan, O. Zahran, S. A. El-Dolil, and F. E. Abd El-Samie “Efficient Image Transmission with Multi-Carrier CDMA”, Wireless Personal Communication, DOI 10.1007/s11277-012- 0622-6. 2012. [29] E. S. Hassan, “Performance Enhancement of Continuous-Phase Modulation Based OFDM System Using Chaotic Interleaving”, WSEAS Transactions on Systems, Vol. 12, No. 1, pp. 1-10, Jan. 2013. | ||||
Statistics Article View: 156 |
||||