International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013DOI : 10.5121/ijnsa.2013.5510115
Departmentof Computer Science and Engineering ,Alagappa University, Karaikudi,Tamilnadu, India-630003.
Authenticationisoneof the image security issuessolved byhash functionandanother one issue is providingsecurityforillegalmanipulationof digital imageis solved byanencryption.Anoptimized hybrid image security mechanism for authentication andsecrecyof imagesby means ofParticle SwarmOptimization(PSO) in daubechies4 transform isillustrated in this paper. This mechanismprovidesolutions to the issues such as authentication, robustness, security and statistical attacks.The PSOtechnique is employedtoselectfeature vectorsto formthe image hash andselect high energycoefficients for partial encryption.The shuffling ofbits,coefficients and blocks of an imageis performed byinterweavingtechnique.TheCompleteness of Signature (CoS) is used torecognize the imageas authenticor unauthentic.The image quality distortionis computed with help ofimage quality index metric(IQIM)with respect to three factors namelyloss of correlation, luminance distortion, and contrast distortion. Theexperimental results arecomputedwith respect toCoS,IQIM,PSNRand correlationcoefficientand presented to demonstrate the efficacy of the proposed scheme.
Authentication,Confidentiality,dabechies4, encryption,hash function, Interweaving, IQIM, andPSO.
The accelerate growth of multimedia applications and the development of internet technology thedigital media contents can be transmitted opportunely over networks and it is essential to securethem from leakages.Therobust securityscheme is essential tostore and convey digital imagessuch as importantmedical images,confidentialdatabasesofmilitary image,privatevideoconferencing,secret personal photograph.The requirements to accomplish the security needs of digital images have led to the development of good hashing and encryption techniques.An imagehashing techniques are extract a set of features from the image to form a compact representationthat can be used for authentication.Hashing techniques are necessary to verify authentication,content integrity and prevent forgery.An authenticity of image is appraised by means ofdigitalsignaturewhilethe image isaffected byincidentaldistortions.Cryptographyis very important toprovide secrecy and security againststatistical attacks and other types of attacks when swap overimages between two parties on the network.In the literaturereview, different methods of digital image authentication techniques, imageencryption techniques and hybrid image securitytechniques have been reported.Image hashingtechniques use data from different domains such as DCT coefficients, Wavelet transform