A NOVEL APPROACH TO IMPROVE IMAGE STORAGE AND SECURITY BY USING CHAOTIC IMAGE ENCRYPTION METHOD AND LOSSLESS COMPRESSION METHOD
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff2f962b0000003d25060001000600
In present day life, even common men share confidential information among themselves through social media. This research work could be developed as a plug-in module which performs encryption and decryption and added to those presently available apps. This ensures a high-level end to end encryption. Besides the encryption performed in Adhoc networks where local nodes are interconnected to establish a communication, this research proposal could be added into the existing encryption layer. Such embedded encryption would increase the security levels in industries whose processes are controlled and operated via WIFI networks. Even RFID reader and tags could enjoy this encryption scheme. In chaotic based systems, usually logistic maps are used and the lattice values are modified through several iterations and finally forms a spatio-temporal system. Since linear coupling of lattices results in easy guessing of pixels, non-linear coupling is getting popular among chaotic based encryption systems. Such non-linear spatio-temporal chaotic systems are able to provide sufficient amount of security to the host image. However, intruders have their own way to decrypt either using ‘Trial and Error’ methods or through mathematical analysis of the encrypted images. So, the task of the researcher is to improve the chaotic metrics ideally by realizing the key space (to be of infinite size) and zero amount of information to be stolen except the encrypted pixels in the hands of intruders. Further decryption by the intended users is still a challenge even though the keys are known because; the quality of the host image should be preserved. Another challenge to the researcher is, to perform compression in order to save the storage area in concerned servers. Naturally compression and decompression are considered to be a valid attack on encryption methods. But in our Case, compression is done intentionally for saving storage area and bandwidth.

Authors
Pradheep Manisekarana, Prachi Dhankhar, Parveen Kumar
Department of Computer Science and Engineering, NIMS University Rajasthan, India

Keywords
Chaotic Systems, ACGLML, Bifurcation Diagram, Arnold’s Cat Map, Lattice Variation
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Image and Video Processing
( Volume: 11 , Issue: 2 , Pages: 2316-2324 )
Date of Publication :
November 2020
Page Views :
99
Full Text Views :

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.