Secured Transmission of a compressed image by using ECC

Ponmani, E and Nandhini, E and Karthika, K and Saravanan, Palani Secured Transmission of a compressed image by using ECC. International Journal of Pure and Applied Mathematics, 2018, vol. 119, n. 12, pp. 13387-13396. [Journal article (Paginated)]

[img]
Preview
Text
1220.pdf

Download (274kB) | Preview

English abstract

Security is the main issue concerned with protecting the digital images that are transmitted over the network. By providing the high security, the digital images on the network can be protected from various types of attacks. A Cryptographic technique plays a major role in providing the security goals such as confidentiality and integrity for digital images. Elliptical curve cryptography (ECC) is the asymmetric encryption which is used to apply to the images that result from DWT Compression. Discrete Wavelet Transform (DWT) is an important compression technique which is used to compress the image effectively. It represents the input data in the form of the low pass (approximate) and high pass (detailed) coefficients. These coefficients are entered into the filters. The outputs from these filters are down-sampled for compression. In this paper, the transmitted images via wireless network were secured by encryption using the public key. The sender will generate the private key from the compressed image based on elliptical curve cryptography. The Sender will send the compressed image and private key separately to the receiver. DWT provides high compression ratio and robustness for protecting the digital image integrity. This experiment result provides some performance measures such as Peak Signal to Noise Ratio (PSNR), Bit Error Rate (BER) and Mean Squared Error (MSE). It also provides high integrity for transmitted digital images.

Item type: Journal article (Paginated)
Keywords: Discrete Wavelet Transform (DWT), Elliptical curve cryptography (ECC), Encryption, Security, Integrity
Subjects: B. Information use and sociology of information
B. Information use and sociology of information > BC. Information in society.
Depositing user: Raster Daster
Date deposited: 02 Aug 2018 07:32
Last modified: 02 Aug 2018 07:32
URI: http://hdl.handle.net/10760/33260

References

[1]. Barbhuiya, A. J. I., Laskar, T. A., & Hemachandran, K. (2014, November). An approach for color image compression of JPEG and PNG images using DCT and DWT. In Computational Intelligence and Communication Networks (CICN), 2014 International Conference on (pp. 129-133). IEEE.

[2]. Mostafa, M., & Fakhr, M. W. (2017, March). Joint image compression and encryption based on compressed sensing and entropy coding. In Signal Processing & its Applications (CSPA), 2017 IEEE 13th International Colloquium on (pp. 129-134). IEEE.

[3]. Amara, M., & Siad, A. (2011, May). Elliptic Curve Cryptography and its applications. In Systems, Signal Processing and their Applications (WOSSPA), 2011 7th International Workshop on (pp. 247-250). IEEE.

[4]. Singh, S. R., Khan, A. K., & Singh, T. S. (2016, September). A critical review on Elliptic Curve Cryptography. In Automatic Control and Dynamic Optimization Techniques (ICACDOT), International Conference on (pp. 13-18). IEEE.

[5]. Nashat, A. A., & Hassan, N. H. (2016, June). Image compression based upon Wavelet Transform and a statistical threshold. In Optoelectronics and Image Processing (ICOIP), 2016 International Conference on (pp. 20-24). IEEE.

[6]. Tabassum, F., Islam, M. I., & Amin, M. R. (2015, May). A simplified image compression technique based on Haar Wavelet Transform. In Electrical Engineering and Information Communication Technology (ICEEICT), 2015 International Conference on (pp. 1-9). IEEE.

[7]. Arunkumar, S., Subramaniyaswamy, V., Karthikeyan, B., Saravanan, P., & Logesh, R. (2018). Meta-data based secret image sharing application for different sized biomedical images. Biomedical Research, 29.

[8]. Setiadi, I., Kistijantoro, A. I., & Miyaji, A. (2015, August). Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems. In Advanced Informatics: Concepts, Theory, and Applications (ICAICTA), 2015 2nd International Conference on (pp. 1-6). IEEE.

[9]. Qiu, Q., & Xiong, Q. (2004, May). Research on elliptic curve cryptography. In Computer Supported Cooperative Work in Design, 2004. Proceedings. The 8th International Conference on (Vol. 2, pp. 698-701). IEEE. [1].

[10]. Singh, L.D., & Debbarma, T. (2014, May). A new approach to Elliptic Curve Cryptography. In Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on (pp. 78-82). IEEE.

[11]. Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi, V. (2017). A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. Future Generation Computer Systems, 83, 653-673.

[12]. Subramaniyaswamy, V., & Logesh, R. (2017). Adaptive KNN based Recommender System through Mining of User Preferences. Wireless Personal Communications, 97(2), 2229-2247.

[13]. Logesh, R., & Subramaniyaswamy, V. (2017). A Reliable Point of Interest Recommendation based on Trust Relevancy between Users. Wireless Personal Communications, 97(2), 2751-2780.

[14]. Logesh, R., & Subramaniyaswamy, V. (2017). Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. Journal of Information Science & Engineering, 33(6), 1629–1647.

[15]. Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment Analysis of Tweets for Estimating Criticality and Security of Events. Journal of Organizational and End User Computing (JOEUC), 29(4), 51-71.

[16]. Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P., & Uden, L. (2018). Multi-objective optimization and energy management in renewable based AC/DC microgrid. Computers & Electrical Engineering.

[17]. Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V., Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2018). An ontology-driven personalized food recommendation in IoT-based healthcare system. The Journal of Supercomputing, 1-33.

[18]. Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2018). Hybrid Transform based Adaptive Steganography Scheme using Support Vector Machine for Cloud Storage. Cluster Computing.

[19]. Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Resources, configurations, and soft computing techniques for power management and control of PV/wind hybrid system. Renewable and Sustainable Energy Reviews, 69, 129-143.

[20]. Ravi, L., & Vairavasundaram, S. (2016). A collaborative location based travel recommendation system through enhanced rating prediction for the group of users. Computational intelligence and neuroscience, 2016, Article ID: 1291358.

[21]. Logesh, R., Subramaniyaswamy, V., Malathi, D., Senthilselvan, N., Sasikumar, A., & Saravanan, P. (2017). Dynamic particle swarm optimization for personalized recommender system based on electroencephalography feedback. Biomedical Research, 28(13), 5646-5650.

[22]. Arunkumar, S., Subramaniyaswamy, V., Karthikeyan, B., Saravanan, P., & Logesh, R. (2018). Meta-data based secret image sharing application for different sized biomedical images. Biomedical Research,29.

[23]. Vairavasundaram, S., Varadharajan, V., Vairavasundaram, I., & Ravi, L. (2015). Data mining‐based tag recommendation system: an overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 5(3), 87-112.

[24]. Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A personalised travel recommender system utilising social network profile and accurate GPS data. Electronic Government, an International Journal, 14(1), 90-113.

[25]. Vijayakumar, V., Subramaniyaswamy, V., Logesh, R., & Sivapathi, A. (2018). Effective Knowledge Based Recommeder System for Tailored Multiple Point of Interest Recommendation. International Journal of Web Portals.

[26]. Subramaniyaswamy, V., Logesh, R., & Indragandhi, V. (2018). Intelligent sports commentary recommendation system for individual cricket players. International Journal of Advanced Intelligence Paradigms, 10(1-2), 103-117.

[27]. Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Topological review and analysis of DC-DC boost converters. Journal of Engineering Science and Technology, 12 (6), 1541–1567.

[28]. Saravanan, P., Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2017). Enhanced web caching using bloom filter for local area networks. International Journal of Mechanical Engineering and Technology, 8(8), 211-217.

[29]. Arunkumar, S., Subramaniyaswamy, V., Devika, R., & Logesh, R. (2017). Generating visually meaningful encrypted image using image splitting technique. International Journal of Mechanical Engineering and Technology, 8(8), 361–368.

[30]. Subramaniyaswamy, V., Logesh, R., Chandrashekhar, M., Challa, A., & Vijayakumar, V. (2017). A personalised movie recommendation system based on collaborative filtering. International Journal of High Performance Computing and Networking, 10(1-2), 54-63.

[31]. Senthilselvan, N., Udaya Sree, N., Medini, T., Subhakari Mounika, G., Subramaniyaswamy, V., Sivaramakrishnan, N., & Logesh, R. (2017). Keyword-aware recommender system based on user demographic attributes. International Journal of Mechanical Engineering and Technology, 8(8), 1466-1476.

[32]. Subramaniyaswamy, V., Logesh, R., Vijayakumar, V., & Indragandhi, V. (2015). Automated Message Filtering System in Online Social Network. Procedia Computer Science, 50, 466-475.

[33]. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.

[34]. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.

[35]. Vairavasundaram, S., & Logesh, R. (2017). Applying Semantic Relations for Automatic Topic Ontology Construction. Developments and Trends in Intelligent Technologies and Smart Systems, 48.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item