Abstract
We all are aware from the fact that 21st century is the era of space technology, IoT (Internet of Thing), advanced robotics and extreme weaponry, each and every country of the world wishes to progress at a rapid rate. This intention gives rise to a new situation where own national interest becomes the top priority, so less developed countries are destabilised by adopting policies like cyber-attacks & state sponsored terrorism. Many countries are nowadays involved in such activities, so the challenges become more tenacious for the intelligence agencies to tackle such sought of the problem. Problem-related to data theft while transmission, pre-planned hacking, cyber attacks etc., are some common modes of data robbery. The data that is transmitted can be in form of images, documents, codes, etc. Here we are proposing an image encipher scheme based on strong encryption and random permutation of image pixels for intelligence agencies by which even if any particular information gets leaked out, the probability of extracting useful information from the hacked data is not possible for an unknown hacker, organization or any country.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Geers, K., Kindlund, D., Moran, N., Rachwald, R.: World War C: understanding Nation-State motives behind today’s advanced cyber attacks, pp. 1–20 (2013)
Guo, Z., Shi, D., Johansson, K., Shi, L.: Optimal linear cyber-attack on remote state estimation. Trans. Control Netw. Syst. 4(1), 1–10 (2016)
Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS 2006, 21–24 March 2006, Taipei, Taiwan. ACM
Elder, Robert J., Levis, Alexander H., Yousefi, Bahram: Alternatives to cyber warfare: deterrence and assurance. In: Jajodia, Sushil, Shakarian, Paulo, Subrahmanian, V.S., Swarup, Vipin, Wang, Cliff (eds.) Cyber Warfare. AIS, vol. 56, pp. 15–35. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14039-1_2
Lakhno, V., Tkach, Y., Petrenko, T., Zaitsev, S.: Developement of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyberattacks. East. Eur. J. Enterp. Technol. 94(6), 32–44 (2016)
Gandhi, R., Sharma, A., Mahoney, W., Sauson, W.: Dimensions of cyber attacks: Social, political, economical and cultural. Technol. Soc. Spring (11), 28–38, 8 March 2011
Shamsi, J., Zeadally, S., Nasir, Z.: Interventions in cyberspace: status and trends. IT Pro Comput. Soc. 18(1), 1–9 (2016)
Mirante, D., Cappos, J.: Understanding password database compromise. Polytechnic Institute of NYU, Department of Computer Science and Engineering 2013. Report no.: TR-CSE-2013-02
Choo, K.K.R.: Cyber threat landscape faced by financial and insurance industry. Canberra: Australian Institute of Crimonology, Australian Government; Feburary 2011. Report No.: ISSN 0817-8542
Perakslis, E.D.: Cybersecurity in health care. Perspective 31, 395–397 (2014)
Wikipedia: The Free Encylopedia (2017). https://en.wikipedia.org/wiki/Encryption. Accessed 8 Aug 2017
Houas, A., Mokhtari, Z., Melkemi, K.E., Boussaad, A.: A novel binary image encryption algorithm based on diffuse representataion. Eng. Sci. Technol. Int. J. 12(19), 1887–1894 (2016)
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)
Askar, S.S., Karawia, A.A., Alshamrani, A.: Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. (Article ID 341729), p. 1–10, 24 December 2014 (2015)
Wu, X., Li, Y., Kurths, J.: A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE 10(3), e0119660 (2015)
Acknowledgment
Authors will like to pay sincere tribute and salute brave Indian Defence Forces who are continuously protecting our borders from all kinds of global threats. Their constant endeavour is the only inspiration behind this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shakya, A.K., Ramola, A., Kandwal, A., Chamoli, V. (2018). Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert Operations. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 905. Springer, Singapore. https://doi.org/10.1007/978-981-13-1810-8_40
Download citation
DOI: https://doi.org/10.1007/978-981-13-1810-8_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1809-2
Online ISBN: 978-981-13-1810-8
eBook Packages: Computer ScienceComputer Science (R0)