Skip to main content

Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert Operations

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 905))

Included in the following conference series:

Abstract

We all are aware from the fact that 21st century is the era of space technology, IoT (Internet of Thing), advanced robotics and extreme weaponry, each and every country of the world wishes to progress at a rapid rate. This intention gives rise to a new situation where own national interest becomes the top priority, so less developed countries are destabilised by adopting policies like cyber-attacks & state sponsored terrorism. Many countries are nowadays involved in such activities, so the challenges become more tenacious for the intelligence agencies to tackle such sought of the problem. Problem-related to data theft while transmission, pre-planned hacking, cyber attacks etc., are some common modes of data robbery. The data that is transmitted can be in form of images, documents, codes, etc. Here we are proposing an image encipher scheme based on strong encryption and random permutation of image pixels for intelligence agencies by which even if any particular information gets leaked out, the probability of extracting useful information from the hacked data is not possible for an unknown hacker, organization or any country.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Geers, K., Kindlund, D., Moran, N., Rachwald, R.: World War C: understanding Nation-State motives behind today’s advanced cyber attacks, pp. 1–20 (2013)

    Google Scholar 

  2. Guo, Z., Shi, D., Johansson, K., Shi, L.: Optimal linear cyber-attack on remote state estimation. Trans. Control Netw. Syst. 4(1), 1–10 (2016)

    MathSciNet  MATH  Google Scholar 

  3. Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS 2006, 21–24 March 2006, Taipei, Taiwan. ACM

    Google Scholar 

  4. Elder, Robert J., Levis, Alexander H., Yousefi, Bahram: Alternatives to cyber warfare: deterrence and assurance. In: Jajodia, Sushil, Shakarian, Paulo, Subrahmanian, V.S., Swarup, Vipin, Wang, Cliff (eds.) Cyber Warfare. AIS, vol. 56, pp. 15–35. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14039-1_2

    Chapter  Google Scholar 

  5. Lakhno, V., Tkach, Y., Petrenko, T., Zaitsev, S.: Developement of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyberattacks. East. Eur. J. Enterp. Technol. 94(6), 32–44 (2016)

    Google Scholar 

  6. Gandhi, R., Sharma, A., Mahoney, W., Sauson, W.: Dimensions of cyber attacks: Social, political, economical and cultural. Technol. Soc. Spring (11), 28–38, 8 March 2011

    Google Scholar 

  7. Shamsi, J., Zeadally, S., Nasir, Z.: Interventions in cyberspace: status and trends. IT Pro Comput. Soc. 18(1), 1–9 (2016)

    Google Scholar 

  8. Mirante, D., Cappos, J.: Understanding password database compromise. Polytechnic Institute of NYU, Department of Computer Science and Engineering 2013. Report no.: TR-CSE-2013-02

    Google Scholar 

  9. Choo, K.K.R.: Cyber threat landscape faced by financial and insurance industry. Canberra: Australian Institute of Crimonology, Australian Government; Feburary 2011. Report No.: ISSN 0817-8542

    Google Scholar 

  10. Perakslis, E.D.: Cybersecurity in health care. Perspective 31, 395–397 (2014)

    Google Scholar 

  11. Wikipedia: The Free Encylopedia (2017). https://en.wikipedia.org/wiki/Encryption. Accessed 8 Aug 2017

  12. Houas, A., Mokhtari, Z., Melkemi, K.E., Boussaad, A.: A novel binary image encryption algorithm based on diffuse representataion. Eng. Sci. Technol. Int. J. 12(19), 1887–1894 (2016)

    Article  Google Scholar 

  13. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)

    Article  Google Scholar 

  14. Askar, S.S., Karawia, A.A., Alshamrani, A.: Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. (Article ID 341729), p. 1–10, 24 December 2014 (2015)

    MATH  Google Scholar 

  15. Wu, X., Li, Y., Kurths, J.: A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE 10(3), e0119660 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

Authors will like to pay sincere tribute and salute brave Indian Defence Forces who are continuously protecting our borders from all kinds of global threats. Their constant endeavour is the only inspiration behind this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Shakya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shakya, A.K., Ramola, A., Kandwal, A., Chamoli, V. (2018). Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert Operations. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 905. Springer, Singapore. https://doi.org/10.1007/978-981-13-1810-8_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1810-8_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1809-2

  • Online ISBN: 978-981-13-1810-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics