Abstract
Security breaches such as confidentiality, authenticity and integrity are considered for transmission of vital information in the network. This paper proposes a fast and secure transmission of primary images in the network. The proposed schemes use Discrete Wavelet Transformation (DWT) with a traditional symmetric encryption algorithm. From the results, it is inferred that the proposed algorithms are fast and secured for transmission of significant images in a group.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on adaptive wave transmission. Sig. Process. 90(9), 2714–2722 (2010). Elsevier
Kumar, H.S.S., Panduranga, H.T., Kumar, S.K.N.: A two stage combinational approach for image encryption. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. AISC, vol. 177, pp. 843–849. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-31552-7_86
Wong, P.W.: A public key watermark for image verification and authentication. In: International Conference on Image Processing, Chicago, vol. 1, pp. 455–459 (1998)
Pareek, N.K., Patider, V., Sud, K.K.: Diffusion substitution based gray image encryption scheme. Digit. Signal Proc. 23(4), 894–901 (2013). Elsevier
Hakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013). Elsevier
Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos based fast encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011). Elsevier
Shah, J., Saxena, V.: Performance study on image encryption schemes. Int. J. Comput. Sci. 8(1), 349–356 (2011)
Charles, S., Govardhan, A., Sultana, F.: A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. Int. J. Comput. Sci. Netw. Secur. 13(5), 41–49 (2013)
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Sig. Process. 48(8), 2439–2451 (2000)
Kulkarni, N.S., Gupta, I., Kulkarni, S.N.: A robust image encryption technique based on random vector. In: International Conference on Emerging Trend in Engineering and Technology (ICETET), 16–18 July 2008, pp. 15–19 (2008)
Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS), Ghent, Belgium, 9–11 September 2002, pp. 90–97 (2002)
Shuihua, H., Shuangyan, Y.: An asymmetric image encryption based on matrix transformation. ECTI Trans. Comput. Inf. Technol. 1(2), 126–133 (2005)
Odibat, O.M., Abdallah, M.H., Al-Zoubi, M.B.R.: New techniques in the implementation of partial image encryption. In: International Multi-conference on Computer Science and Information Technology, Amman (2006)
Khamrui, A., Mandal, J.K.: A wavelet transform based image authentication approach using genetic algorithm (AWTIAGA). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds.) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. AISC, vol. 248, pp. 251–258. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-03107-1_28
Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Stolfo, S.J., Bellovin, S.M., Keromytis, A.D., Hershkop, S., Smith, S.W., Sinclair, S. (eds.) Insider Attack and Cyber Security. Advances in Information Security, vol. 39, pp. 69–90. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-77322-3_5
Li, M.: Analysis of the insider attack issue in the movie, banking, and computer industries. Compsci 725 SC 05 team paper, pp. 1–13 (2005)
Songa, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik 124, 3329–3334 (2013). Elsevier
Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F.C.M., Tse, C.K., Ma, H.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43, 1000–1010 (2013). Elsevier
Tedmodi, S., Al-Najdawi, N.: Loseless image cryptograph algorithm based on Discrete Cosine Transform. Int. Arab J. Inf. Technol. 9(5), 471–478 (2012)
Kumar, P.P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless VITAE, IEEE Conference Proceedings, pp. 1–5 (2011)
Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing, 3rd edn. Pearson, Upper Saddle River (2008)
Stallings, W.: Cryptography and Network Security, 4th edn. Pearson, Noida (2006)
Chen, C., Anada, H., Kawamoto, J., Sakurai, K.: A hybrid encryption scheme with key-cloning protection: user/terminal double authentication via attributes and fingerprints. J. Internet Serv. Inf. Secur. (JISIS) 6(2), 23–36 (2016)
Gritti, C., Susilo, W., Plantard, T.: Certificate-based encryption with keyword search enabling secure authorization in electronic health record. J. Internet Serv. Inf. Secur. (JISIS) 6(4), 1–34 (2016)
Carniani, E., Costantino, G., Marino, F., Martinelli, F., Mori, P.: Enhancing video surveillance with usage control and privacy-preserving solutions. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(4), 20–40 (2016)
Casey, W., Morales, J.A., Mishra, B.: Threats from inside: dynamic utility (mis)alignments in an agent based model. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(1), 97–117 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sridevi, M., Mala, C., Prabha, S.L. (2018). A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_8
Download citation
DOI: https://doi.org/10.1007/978-981-10-7850-7_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7849-1
Online ISBN: 978-981-10-7850-7
eBook Packages: Computer ScienceComputer Science (R0)