Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(1.73MB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms
H. B. Kekre, Tanuja Sarode, Pallavi N Halarnkar, Debkanya Mazumder
Pages - 49 - 65     |    Revised - 24-02-2014     |    Published - 19-03-2014
Published in International Journal of Image Processing (IJIP)
Volume - 8   Issue - 2    |    Publication Date - March 2014  Table of Contents
MORE INFORMATION
References   |   Cited By (4)   |   Abstracting & Indexing
KEYWORDS
Scrambling, Key Based Scrambling, Sinusoidal Transforms, DCT, DST, DFT, Real Fourier, Discrete Hartley.
ABSTRACT
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
CITED BY (4)  
1 Sarode, T., Pillai, D., Pokale, S., & Prabhu, T. (2016). Image Encryption in Transform Domain using Circular Shift. International Journal of Computer Applications, 140(11).
2 Sarode, T., Pillai, D., Pokale, S., & Prabhu, T. (2016). Image Encryption in Transform Domain using Circular Shift. International Journal of Computer Applications, 140(11).
3 Kekre, H. B., Sarode, T., Halarnkar, P. N., & Mazumder, D. (2014). Image Encryption using Hybrid Transform Domain Scrambling of Coefficients. International Journal of Advance Research in Computer Science and Management Studies, 2(6).
4 Kekre, H. B., Sarode, T., Halarnkar, P. N., & Mazumder, D. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS).
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
C. Li, G. Xu?, C.Song and J. Jing, “Evaluation of Image Scrambling Degree with Intersecting Cortical Model Neural Network”, International Journal of Hybrid Information Technology, Vol.5, No. 2, pp. 31-40, 2012.
Chen, C.L.P, Tong Zhang , Yicong Zhou, “Image encryption algorithm based on a new combined chaotic system”, IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012, pp. 2500 – 2504
Feng, Yong, and Xinghuo Yu. "A novel symmetric image encryption approach based on an invertible two-dimensional map." In Industrial Electronics, 2009. IECON'09. 35th Annual Conference of IEEE, pp. 1973-1978. IEEE, 2009.
H.B.Kekre and J.K.Solanki, “Comparative performance of various trigonometric unitary transforms for transform image coding” , International Journal of Electronics, Vol. 44, No. 3.pp. 305-315, 1978.
H.B.Kekre, Tanuja Sarode, Pallavi Halarnkar, Debankya Mazumder, “Image Scrambling using Non Sinusoidal transforms and Key based Scrambling Technique”, International Journal of Computer Technology (IJCT), Volume 12 issue no 8, pp. 3809- 3822. February 2014.
J.-L. Fan and X.-F. Zhang, “Image encryption algorithm based on chaotic system,” in International Conference on Computer-Aided Industrial Design and Conceptual Design.CAIDCD, 2006, pp. 1–6.
K. Wong and K Tanaka, “Scalable Image Scrambling Method Using Unified Constructive Permutation Function on Diagonal Blocks,” IEEE Proc. 28th Picture Coding Symposium PCS,pp. 138-141, 2010.
Lei Li-hong; Bai Feng-ming; Han Xue-hui, "New Image Encryption Algorithm Based on Logistic Map and Hyper-Chaos," Fifth International Conference on Computational and Information Sciences (ICCIS), 2013, vol., no., pp.713,716, 21-23 June 2013
Liu, S., Sheridan, J.T.: Optical Information Hiding by Combining Image Scrambling Techniques in Fractional Fourier Domains. In: Irish Signal and Systems Conference, pp.249–254, 2001.
Long Bao , Yicong Zhou , C. L. Philip Chen, “Image encryption in the wavelet domain”, in Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013
M François, T Grosges, D Barchiesi, R Erra,“ Image Encryption Algorithm Based on a Chaotic Iterative Process”, Applied Mathematics, Vol. 3, No. 12, 2012, pp. 1910-1920.
M. Jian-liang, P. Hui-jing, and G. Wan-qing, “New color image encryption algorithm based on chaotic sequences ranking,” in Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP ’08, August 2008, pp.1348–1351.
Mishra, Minati, Priyadarsini Mishra, M. C. Adhikary, and Sunit Kumar. "Image Encryption Using Fibonacci-Lucas Transformation." International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012 pp 131-141.
Naeem, E.A.; Elnaby, M.M.A.; Hadhoud, M.M., "Chaotic image encryption in transform domains," International Conference on Computer Engineering & Systems, 2009. ICCES 2009., vol., no., pp.71-76, 14-16 Dec. 2009.
P. Premaratne & M. Premaratne, "Key-based scrambling for secure image communication,"in Emerging Intelligent Computing Technology and Applications, P. Gupta, D. Huang, P.Premaratne & X. Zhang, Ed. Berlin: Springer, 2012, pp.259-263.
Sapna Anoop, Anoop Alakkaran, “A Full Image Encryption Scheme Based on Transform Domains and Stream Ciphers”, International Journal of Advanced Information Science and Technology (IJAIST), Vol. 17, pp. 5-10, September 2013
Taranjit Kaur, Reecha Sharma, “Image Cryptography by TJ-SCA: Supplementary Cryptographic Algorithm for Color Images”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, pp 1355-1360, July-2013.
Y. Zhou, K. Panetta, S. Agaian, and C. L. P. Chen, "Image encryption using P- Fibonacci transform and decomposition," Optics Communications, vol. 285, pp. 594-608, 2012.
Zhu, Guiliang, Weiping Wang, Xiaoqiang Zhang, and Mengmeng Wang. "Digital image encryption algorithm based on pixels." In Intelligent Computing and Intelligent Systems(ICIS), 2010 IEEE International Conference on, vol. 1, pp. 769-772. IEEE, 2010.
MANUSCRIPT AUTHORS
Dr. H. B. Kekre
NMIMS UNIVERSITY - India
hbkekre@yahoo.com
Dr. Tanuja Sarode
TSEC - India
Miss Pallavi N Halarnkar
MPSTME - India
Miss Debkanya Mazumder
Student, Computer Engg. MPSTME, NMIMS University Mumbai, 400056, India - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions