Skip to main content

A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 797))

Included in the following conference series:

  • 352 Accesses

Abstract

Security breaches such as confidentiality, authenticity and integrity are considered for transmission of vital information in the network. This paper proposes a fast and secure transmission of primary images in the network. The proposed schemes use Discrete Wavelet Transformation (DWT) with a traditional symmetric encryption algorithm. From the results, it is inferred that the proposed algorithms are fast and secured for transmission of significant images in a group.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on adaptive wave transmission. Sig. Process. 90(9), 2714–2722 (2010). Elsevier

    Article  MATH  Google Scholar 

  2. Kumar, H.S.S., Panduranga, H.T., Kumar, S.K.N.: A two stage combinational approach for image encryption. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. AISC, vol. 177, pp. 843–849. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-31552-7_86

    Chapter  Google Scholar 

  3. Wong, P.W.: A public key watermark for image verification and authentication. In: International Conference on Image Processing, Chicago, vol. 1, pp. 455–459 (1998)

    Google Scholar 

  4. Pareek, N.K., Patider, V., Sud, K.K.: Diffusion substitution based gray image encryption scheme. Digit. Signal Proc. 23(4), 894–901 (2013). Elsevier

    Article  MathSciNet  Google Scholar 

  5. Hakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013). Elsevier

    Article  Google Scholar 

  6. Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos based fast encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011). Elsevier

    Article  Google Scholar 

  7. Shah, J., Saxena, V.: Performance study on image encryption schemes. Int. J. Comput. Sci. 8(1), 349–356 (2011)

    Google Scholar 

  8. Charles, S., Govardhan, A., Sultana, F.: A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. Int. J. Comput. Sci. Netw. Secur. 13(5), 41–49 (2013)

    Google Scholar 

  9. Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Sig. Process. 48(8), 2439–2451 (2000)

    Article  Google Scholar 

  10. Kulkarni, N.S., Gupta, I., Kulkarni, S.N.: A robust image encryption technique based on random vector. In: International Conference on Emerging Trend in Engineering and Technology (ICETET), 16–18 July 2008, pp. 15–19 (2008)

    Google Scholar 

  11. Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS), Ghent, Belgium, 9–11 September 2002, pp. 90–97 (2002)

    Google Scholar 

  12. Shuihua, H., Shuangyan, Y.: An asymmetric image encryption based on matrix transformation. ECTI Trans. Comput. Inf. Technol. 1(2), 126–133 (2005)

    Google Scholar 

  13. Odibat, O.M., Abdallah, M.H., Al-Zoubi, M.B.R.: New techniques in the implementation of partial image encryption. In: International Multi-conference on Computer Science and Information Technology, Amman (2006)

    Google Scholar 

  14. Khamrui, A., Mandal, J.K.: A wavelet transform based image authentication approach using genetic algorithm (AWTIAGA). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds.) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. AISC, vol. 248, pp. 251–258. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-03107-1_28

    Google Scholar 

  15. Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Stolfo, S.J., Bellovin, S.M., Keromytis, A.D., Hershkop, S., Smith, S.W., Sinclair, S. (eds.) Insider Attack and Cyber Security. Advances in Information Security, vol. 39, pp. 69–90. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-77322-3_5

    Chapter  Google Scholar 

  16. Li, M.: Analysis of the insider attack issue in the movie, banking, and computer industries. Compsci 725 SC 05 team paper, pp. 1–13 (2005)

    Google Scholar 

  17. Songa, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik 124, 3329–3334 (2013). Elsevier

    Article  Google Scholar 

  18. Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F.C.M., Tse, C.K., Ma, H.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43, 1000–1010 (2013). Elsevier

    Article  Google Scholar 

  19. Tedmodi, S., Al-Najdawi, N.: Loseless image cryptograph algorithm based on Discrete Cosine Transform. Int. Arab J. Inf. Technol. 9(5), 471–478 (2012)

    Google Scholar 

  20. Kumar, P.P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless VITAE, IEEE Conference Proceedings, pp. 1–5 (2011)

    Google Scholar 

  21. Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing, 3rd edn. Pearson, Upper Saddle River (2008)

    Google Scholar 

  22. Stallings, W.: Cryptography and Network Security, 4th edn. Pearson, Noida (2006)

    Google Scholar 

  23. Chen, C., Anada, H., Kawamoto, J., Sakurai, K.: A hybrid encryption scheme with key-cloning protection: user/terminal double authentication via attributes and fingerprints. J. Internet Serv. Inf. Secur. (JISIS) 6(2), 23–36 (2016)

    Google Scholar 

  24. Gritti, C., Susilo, W., Plantard, T.: Certificate-based encryption with keyword search enabling secure authorization in electronic health record. J. Internet Serv. Inf. Secur. (JISIS) 6(4), 1–34 (2016)

    Google Scholar 

  25. Carniani, E., Costantino, G., Marino, F., Martinelli, F., Mori, P.: Enhancing video surveillance with usage control and privacy-preserving solutions. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(4), 20–40 (2016)

    Google Scholar 

  26. Casey, W., Morales, J.A., Mishra, B.: Threats from inside: dynamic utility (mis)alignments in an agent based model. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(1), 97–117 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Sridevi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sridevi, M., Mala, C., Prabha, S.L. (2018). A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7850-7_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7849-1

  • Online ISBN: 978-981-10-7850-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics