A Novel Aspect of Security Trade-Offs in Image Files

Authors

  • Ranjita Rout Gandhi Institute for Education and Technology, Bhubaneshwar, Odisha, India. https://orcid.org/0000-0003-0499-3436
  • Debasis Gountia Member, IEEE, College of Engineering and Technology, Bhubaneshwar, Odisha, India.
  • Neelamani Samal Aryan Institute of Engineering and Technology, Bhubaneshwar, Odisha, India.
  • Bijay Srinibas Nag College of Engineering and Technology, Bhubaneshwar, Odisha, India.

Abstract

This paper is a contribution to the ongoing research in the design of security aspects of an image file and important field used to protect the confidentiality of data in the disk. In this paper, we focus on Cipher block chaining as this technique appear to offer the best combination of security and performance. In this paper, we highlight the research to date in the area of security of an image file and propose a novel narrow- block disk encryption mode of operation with compression of data first. This is the Cipher Block Chaining (CBC) mode using Xor-Encrypt-Xor (XEX) to inherit from its security and high performance and use CBC like operations to gain the error propagation property. Here we use “LZW 15-bit Variable Rate Encoder” for the compression of image. We also apply multiplication and exponential in the finite field GF (2128). Here we use Cipher image Stealing when data size is not multiple of 16 bytes. Our hope is to generate an image file scheme that will provide high throughput, faster, memory saving and better resistant to the attacks.

How to cite this article:
Rout R, Gountia D, Samal N et al. A Novel Aspect of Security Trade-Offs in Image Files. J Engr Desg Anal 2020; 3(2): 92-97.

References

Schneier B. Applied Cryptography, Wiley Press, Second Edition.

Stinson DR. Cryptography Theory and Practice, CRC Press, Second Edition.

Nelson M, Gailly JL. The Data Compression Book, M&T Press, Second Edition.

Daemen J, Sand B, Rijmen V. The Design of Rijndael: AES The Advanced Encryption Standard, Springer-Verlag, Berlin, 2002.

Welch LZ. Available: http://en.wikipedia.org/wiki/Lempel Ziv Welch.

Bourbakis N, Dollas A. Scan-based compression encryption hiding for video on demand. IEEE Multimedia Mag 2003; 10: 79-87.

Jolfaei A, Mirghadri A. Federal Information Processing Standards Publications (FIPS 197). A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1. In Proceedings of the 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI 2010), Sanya, China. 2010a.

Jolfaei A. Mirghadri A. An Image Encryption Approach Using Chaos and Stream Cipher. Journal of Theoretical and Applied Information Technology 2010b; 19(2), 117-125.

Jolfaei A, Mirghadri A. Survey: Image Encryption Using Salsa 20. International Journal of Computer Science 2010c; 7(5).

Jolfaei A, Mirghadri A. A New Approach to Measure Quality of Image Encryption. International Journal of Computer and Network Security 2010d; 2(8): 38-44.

Kocarev L, Stczepanski J, Amigo JM. Discrete Chaos I: Theory. IEEE Encryption Standard (AES), 26 Nov. 2001 transaction on circuit system. 2006.

Bruice Schneier, Applied Cryptography, Wiley Press, Second Edition.

Stinson DR. Cryptography Theory and Practice, CRC Press, Second Edition.

Nelson M, Gailly JL. The Data Compression Book, M&T Press, Second Edition.

Stallings W. Cryptography and Network Security, Pearson Education, Fourth Edition.

http://en.wikipedia.org/wiki/Image_processing

Gonzalez RC, Woods RE. Digital Image processing.

Guwalani P, Chandrashekar R, Kala M et al. Image File Security using Base-64 Algorithm, International Journal of Computer Technology and Applications, 2010.

Kumar D, Nishad et al. Review Paper on Image Steganography and Security Using Cryptography.International Journal for Research in Applied Science & Engineering Technology 2016.

Gounita D, Chowdhury DR. A new narrow-block made of operation for disk compression with tweaked block chaining. International Journal of Computer Science & Engineering Technologies 2011; 2(1): 71-76.

Published

2021-04-30