Title :
A fast and secure image hiding scheme based on partial encryption technique
Author :
Parameshachari, B.D. ; Soyjaudah, K. M. Sunjiv ; Sumithra Devi, K.A.
Author_Institution :
Dept. of ECE, Nehru Coll. of Eng. & Res. Centre, Thiruvilawamala, India
Abstract :
Encryption is the primary solution to provide security to the data, which is travelling on a communication link between any pair of nodes, but Partial encryption is a technique to save computational power, overhead, speed, time and to provide quick security by only encrypting a selected portion of a bit stream. Securing the visual and multimedia data like images requires specific design consideration for use in different applications. The focus of this paper is on selecting the important part of the image that can efficiently achieve by conceptually selecting the part of the image which is further used in its normal mode of operation for encryption. Once encryption is done, the encrypted data is sent along with remaining original part of the message, ensuring its secured transmission and distribution over public networks. This paper proposes a partial image encryption using Single Bit Manipulation technique, convert each byte/character of the message to be encrypted, to its binary equivalent. Now, length of password is considered for bit left shift. i.e., Number of bits to be shifted to left will be decided by the length of password. The issue in traditional cryptosystem in many different areas such as wireless networking, mobile phone services and applications in homeland security is energy consumption for encryption of the large volume visual data. So we are dealing with a partial encryption algorithm of images.
Keywords :
cryptography; image coding; binary equivalent; bit left shift; communication link; data security; energy consumption; homeland security; image hiding scheme; large volume visual data; mobile phone services; multimedia data; partial encryption algorithm; partial encryption technique; partial image encryption; password length; public networks; single bit manipulation technique; traditional cryptosystem; wireless networking; Data confidentiality and protection; bit manipulation; partial encryption; symmetric key;
Conference_Titel :
Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in
Conference_Location :
Ujire
Electronic_ISBN :
978-1-84919-868-4
DOI :
10.1049/cp.2013.2500