Cloud storage security scheme for image encryption using modified morse and zigzag pattern
-
2019-06-12 https://doi.org/10.14419/ijet.v7i4.15682 -
Cloud Security, Image Pixels, DNA Sequence, Morse Code, Diagonal Zigzag Pattern. -
Abstract
In the research of cloud storage security, the image encryption is given much attention and a lot of encryption algorithms have been proposed. The image encryption is different from the text encryption methods owing to some of features of images such as capacity and data redundancy. So, the image encryption is comparatively difficult to handle with traditional methods. In the proposed work, the image encryption and decryption are based on modified Morse code and diagonal zigzag pattern. To begin with, the pixels of image are extracted and then converted into binary form. The binary data is replaced by DNA sequence with modified Morse code and diagonal zigzag pattern. The proposed algorithm successfully encrypts/decrypts the image with DNA and modified Morse code with diagonal zigzag pattern. The encrypted image using the proposed algorithm is absolutely different when compared to original image file. So the encrypted image is suitable for the secured transmission over the cloud data storage. Thus, this proposed model provides an additional measure to tighten the image security efficiently.
Â
Â
-
References
[1] Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee and SmJmng Kim, Multilevel Image Encryption by Binary Phase XOR Operations. IEEE Proceeding in the year 2003.
[2] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, A Modified AES Based Algorithm for Image Encryption. Proceeding in World Academy of Science, Engineering and Technology. 27, 2007.
[3] Grasha Jacob and Murugan .A, An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images. The International journal of Computer Science and Communications Security (IJCSCS). 3, 61–5, 2013.
[4] Grasha Jacob and Murugan .A, Towards the Secured of Image on Multi-cloud System. Elsevier Proceedings, 58-62, 2014.
[5] Sureshraj, D and Murali Bhaskaran .V, Automatic DNA Sequence Generation for Secured Effective Multi-Cloud Storage. Journal of Computer Engineering (IOSR-JCE), Vol.15. 86-94, 2013. https://doi.org/10.9790/0661-1528694.
[6] Fethi Belkhouche and Uvais Qidwai, Binary image encoding using 1D chaotic maps. IEEE Proceeding in the year 2003.
[7] Huang-Pei Xiao and Guo-Ji Zhang, An Image Encryption Scheme Based On Chaotic Systems, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16, 2006.
[8] Mohammad Ali Bani Younes and Aman Jan tan, an Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption. International Journal of Computer Science and Network Security, Vol.8, 2008.
[9] Padmaja .N and Priyanka Koduru, Providing data security in cloud computing using public key cryptography. International Journal of Engineering Sciences Research, Vol.4 (1).1059-1063, 2013.
[10] Murugan .A and Thilagavathy .R, Cloud Storage Security Scheme using DNA computing with Morse code and Zigzag Pattern. International Conference on power, Control, Signals & Instrumentation Engineering (ICPCSI), Vol.v.226-231, 2017. https://doi.org/10.1109/ICPCSI.2017.8392120.
[11] Dubey and Ashutosh .K, Cloud user Security based on RSA and MD5 algorithm for resource attestation and sharing in Java environment. Software Engineering (CONSEG). 2012 CSI Sixth International Conference, 2012. https://doi.org/10.1109/CONSEG.2012.6349503.
[12] Che Jianhua, Yamin Duan, Tao Zhang and Jie Fan, Study on the security models and strategies of cloud computing. In Procedia Engineering, Vol. (23).586-593, 2011. https://doi.org/10.1016/j.proeng.2011.11.2551.
[13] Adleman. L, Molecular computation of solutions to combinational problems. American Association for the Advancement of Science, 1021-1024, 1994. https://doi.org/10.1126/science.7973651.
[14] Ephin M, Judy Ann Joy and N. A. Vasanthi, Survey of Chaos based Image Encryption and Decryption Techniques. Amrita International Conference of Women in Computing (AICWIC’13). Proceedings published by International Journal of Computer Applications (IJCA), 2003.
[15] Borda, Monica and Olga. T, DNA secret writing Techniques. In IEEE conferences, 451-456, 2010. https://doi.org/10.1109/ICCOMM.2010.5509086.
[16] Murugan .A and Thilagavathy .R, Securing Cloud Data using DNA and Morse code: A Triple Encryption Scheme. International Journal of Control Theory and Applications (IJCTA), Vol.10. 31-18, 2017.
-
Downloads
-
How to Cite
Thilagavathy, R., & Murugan, A. (2019). Cloud storage security scheme for image encryption using modified morse and zigzag pattern. International Journal of Engineering & Technology, 7(4), 6290-6293. https://doi.org/10.14419/ijet.v7i4.15682Received date: 2018-07-16
Accepted date: 2019-01-28
Published date: 2019-06-12