Abstract
Data hiding from external malicious access is an important and timely issue. Cryptography is the backbone of information or processed data security. The existing cryptography techniques provide good security; however, its computational complexity is also very high. Hence, there is a need of an efficient as well simple cryptography approach. In this context, the paper proposes a novel technique for cryptography in the form of binary textures. The binary textures provide a form of security corresponding to the original message. The binary textures are generated, reshuffled, and arranged in an image form to make it robust from malicious access. The reliability of the proposed approach has been illustrated with some empirical case studies. The overall cryptography process in a digital image makes it a simple, low-cost, and effective methodology for the secure communication.
This is a preview of subscription content, log in via an institution.
References
S. Islam, M.R. Modi, P. Gupta, Edge-based image steganography. EURASIP J. Inf. Secur. 2014(8), 1–14 (2014)
S. Sukalyan, S. Sayani, A non-adaptive partial encryption of grayscale images based on Chaos. In: International conference on computational intelligence: modeling techniques and applications, Procedia Technology, Vol. 10 (2013), pp. 663–671
Yicong Zhou, Weijia Cao, C.L. Philip Chen, Image encryption using binary bitplane. Sig. Process. 100, 197–207 (2014)
Chin-Chen Chang, Yu. Tai-Xing, Cryptanalysis of an encryption scheme for binary images. Pattern Recogn. Lett. 23(14), 1847–1852 (2002)
Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, W.-J. Sun, Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology. Opt. Lasers Eng. 45(7), 761–765 (2007)
K.T. Lin, Digital information encrypted in an image using binary encoding. Opt. Commun. 281(13), 3447–3453 (2008)
K.-L. Chung, L.-C. Chang, Large encrypting binary images with higher security. Pattern Recogn. Lett. 19(5–6), 461–468 (1998)
Q. Zhang, L. Guo, X. Wei, Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. Elsevier 52(11–12), 2028–2035 (2010)
C. Li, K.-T. Lo, Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Sig. Process. 91(4), 949–954 (2011)
L. Kocarev, Chaos-Based Cryptography: A Brief Overview. Circuits Syst. Mag. IEEE 1(3), 1531–1636 (2002)
H. Yang, A.C. Kot, Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimed. 9(3), 475–486 (2007)
Y.-A. Hoa, Y.-K. Chanb, H.-C. Wuc, Y.-P. Wuc, High-capacity reversible data hiding in binary images using pattern substitution. Comput. Stand. Interfaces 31(4), 787–794 (2009)
C.-C. Wang, Y.-F. Chang, C.-C. Chang, J.-K. Jan, C.-C. Lin, A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93, 152–162 (2014)
K.-H. Jung, K.-Y. Yoo, Data hiding method in binary images based on block masking for key authentication. Inf. Sci. 277, 188–196 (2014)
C.-L. Tsai, H.-F. Chiangb, K.-C. Fanb, C.-D. Chungc, Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn. 38(11), 1993–2006 (2005)
P.T. Huy, C. Kim, Binary Image Data Hiding Using Matrix Encoding Technique in Sensors. Int. J. Distrib. Sensor Netw. 2013, Article ID 340963, (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Barik, R.C., Sahu, S.S., Bhoi, S.P., Changder, S. (2018). A Novel Data Encryption Approach in the Grid-Structured Binary Image. In: Nath, V. (eds) Proceedings of the International Conference on Microelectronics, Computing & Communication Systems. Lecture Notes in Electrical Engineering, vol 453. Springer, Singapore. https://doi.org/10.1007/978-981-10-5565-2_9
Download citation
DOI: https://doi.org/10.1007/978-981-10-5565-2_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5564-5
Online ISBN: 978-981-10-5565-2
eBook Packages: EngineeringEngineering (R0)