Secured image storage and transmission technique suitable for IoT using Tangle and a novel image encryption technique

被引:2
|
作者
Rajitha, B. [1 ]
Makhija, Nishkarsh [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Allahabad, India
关键词
Image encryption; Blockchain; Tangle; NPCR; Correlation; UACI; RC4; algorithm; S-Box; CHAOTIC SYSTEM; ALGORITHM; BLOCKCHAIN; TRANSFORM; INTERNET; THINGS; MODEL; MAP;
D O I
10.1007/s11042-023-14794-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, there has been tremendous growth in the use of IoT based applications. It is making its footprint strong with day to day life uses as well as industrial uses. IoT has vast applications ranging from medical, automobile industry, daily task automation, security surveillance and a lot more. Surveillance based IoT system shares images over internet for information exchange between filed experts and technical members for faster analysis about the locations and if it has any unauthorized activity. So these image information exchange should be secured. Thus this paper proposes a new technique for achieving this task in two phases. In first phase the secret/informative image is encrypted using a novel encryption technique. In second phase this encrypted image is shared to receiver team using a highly secured Tangle(latest secured transmission model advanced from Blockchain).Tangle eliminates the drawback of the traditional blockchain while providing its security features like decentralization, high reliability, and low cost to transfer and store users image information data. Tangle can be combined with IoT to make it more stronger. The proposed method has been tested on various images and its performance has been compared using standard metrics such as Correlation, number of pixels change rate (NPCR), the unified average changed intensity(UACI), information entropy analysis, key space analysis, etc. The proposed technique was found to be better than literature methods like the entropy value is near to an ideal value 8, which is considered safe from brute force attack.
引用
收藏
页码:36793 / 36814
页数:22
相关论文
共 50 条
  • [41] Novel Scheme for Storage and Transmission of Medical Images with Patient Information Using Elliptic Curve Based Image Encryption Schemes with LSB Based Steganographic Technique
    Sathyanarayana, S. V.
    Bhat, K. N. Hari
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2012, 2 (01) : 15 - 24
  • [42] Hardware implementation of invisible image watermarking algorithm using secured binary image authentication technique
    Karthigaikumar, P.
    Baskaran, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (04) : 333 - 354
  • [43] Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption
    Dash, Shreela
    Das, M. N.
    Das, Mamatarani
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 535 - 544
  • [44] A modified novel Image Encryption Technique using three dimensional cat map and Transformation
    Kumar, Subodh
    Kumar, Rajendra
    Kumar, Sushil
    2018 INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY, ELECTRONICS, AND COMPUTING SYSTEMS (SEEMS), 2018,
  • [45] Secured Compound Image Compression Using Encryption Techniques
    Radha, V.
    Maheswari, D.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL I, 2011, : 540 - 542
  • [46] A robust image encryption technique using dual chaotic map
    Naskar, Prabir Kr
    Chaudhuri, Atal
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (04) : 358 - 380
  • [47] Hybrid Approach for Image Encryption Using Hill Cipher Technique
    Kumar, Sharath H. S.
    Panduranga, H. T.
    Kumar, Naveen S. K.
    WIRELESS NETWORKS AND COMPUTATIONAL INTELLIGENCE, ICIP 2012, 2012, 292 : 200 - 205
  • [48] Image Encryption Technique using Clustering and Stochastic Standard Map
    Mohammed, Rana Saad
    Abbood, Fadhil Hanoon
    Yousif, Intisar Abid
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [49] Text to Image Encryption Technique using RGB Substitution and AES
    Joshy, Amal
    Baby, Amitha K. X.
    Padma, S.
    Fasila, K. A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1133 - 1136
  • [50] MIWET: Medical image watermarking using encryption and fusion technique
    Anand, Ashima
    Bedi, Jatin
    Rida, Imad
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 115