A Novel Aspect of Security Trade-Offs in Image Files
Abstract
This paper is a contribution to the ongoing research in the design of security aspects of an image file and important field used to protect the confidentiality of data in the disk. In this paper, we focus on Cipher block chaining as this technique appear to offer the best combination of security and performance. In this paper, we highlight the research to date in the area of security of an image file and propose a novel narrow- block disk encryption mode of operation with compression of data first. This is the Cipher Block Chaining (CBC) mode using Xor-Encrypt-Xor (XEX) to inherit from its security and high performance and use CBC like operations to gain the error propagation property. Here we use “LZW 15-bit Variable Rate Encoder” for the compression of image. We also apply multiplication and exponential in the finite field GF (2128). Here we use Cipher image Stealing when data size is not multiple of 16 bytes. Our hope is to generate an image file scheme that will provide high throughput, faster, memory saving and better resistant to the attacks.
How to cite this article:
Rout R, Gountia D, Samal N et al. A Novel Aspect of Security Trade-Offs in Image Files. J Engr Desg Anal 2020; 3(2): 92-97.
References
Schneier B. Applied Cryptography, Wiley Press, Second Edition.
Stinson DR. Cryptography Theory and Practice, CRC Press, Second Edition.
Nelson M, Gailly JL. The Data Compression Book, M&T Press, Second Edition.
Daemen J, Sand B, Rijmen V. The Design of Rijndael: AES The Advanced Encryption Standard, Springer-Verlag, Berlin, 2002.
Welch LZ. Available: http://en.wikipedia.org/wiki/Lempel Ziv Welch.
Bourbakis N, Dollas A. Scan-based compression encryption hiding for video on demand. IEEE Multimedia Mag 2003; 10: 79-87.
Jolfaei A, Mirghadri A. Federal Information Processing Standards Publications (FIPS 197). A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1. In Proceedings of the 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI 2010), Sanya, China. 2010a.
Jolfaei A. Mirghadri A. An Image Encryption Approach Using Chaos and Stream Cipher. Journal of Theoretical and Applied Information Technology 2010b; 19(2), 117-125.
Jolfaei A, Mirghadri A. Survey: Image Encryption Using Salsa 20. International Journal of Computer Science 2010c; 7(5).
Jolfaei A, Mirghadri A. A New Approach to Measure Quality of Image Encryption. International Journal of Computer and Network Security 2010d; 2(8): 38-44.
Kocarev L, Stczepanski J, Amigo JM. Discrete Chaos I: Theory. IEEE Encryption Standard (AES), 26 Nov. 2001 transaction on circuit system. 2006.
Bruice Schneier, Applied Cryptography, Wiley Press, Second Edition.
Stinson DR. Cryptography Theory and Practice, CRC Press, Second Edition.
Nelson M, Gailly JL. The Data Compression Book, M&T Press, Second Edition.
Stallings W. Cryptography and Network Security, Pearson Education, Fourth Edition.
http://en.wikipedia.org/wiki/Image_processing
Gonzalez RC, Woods RE. Digital Image processing.
Guwalani P, Chandrashekar R, Kala M et al. Image File Security using Base-64 Algorithm, International Journal of Computer Technology and Applications, 2010.
Kumar D, Nishad et al. Review Paper on Image Steganography and Security Using Cryptography.International Journal for Research in Applied Science & Engineering Technology 2016.
Gounita D, Chowdhury DR. A new narrow-block made of operation for disk compression with tweaked block chaining. International Journal of Computer Science & Engineering Technologies 2011; 2(1): 71-76.
Published
Issue
Section
Copyright (c) 2021 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.