Secret Image Transmission Using Carrier Image and Scan Patterns  
  Authors : Vijay Karra; Varun Bajaj; Amrit Pratap Singh; Vikash Singh

 

In the world today, data encryption is essential to maintain privacy. We propose a technique in which the color table is used to generate a picture carrier, the carrier image is added to the original image. The encrypted image obtained is unclear and can’t be seen. To make it even more secure model SCAN pattern is used to blend the pixels of the image. The resulting image is decrypted using the inverse of the scan pattern. Thus the carrier image and original image is obtained at the output.

 

Published In : IJCAT Journal Volume 3, Issue 5

Date of Publication : May 2016

Pages : 307-310

Figures :07

Tables : 01

Publication Link :Secret Image Transmission Using Carrier Image and Scan Patterns

 

 

 

Vijay Karra : Department of E & TC, Army Institute of Technology Pune, Maharashtra - 411015, India.

Varun Bajaj : Department of E & TC, Army Institute of Technology Pune, Maharashtra - 411015, India.

Amrit Pratap Singh : Department of E & TC, Army Institute of Technology Pune, Maharashtra - 411015, India.

Vikash Singh : Department of E & TC, Army Institute of Technology Pune, Maharashtra - 411015, India.

 

 

 

 

 

 

 

Picture Carrier, SCAN Pattern

A combined and effective method has been proposed in this paper for image encryption using carrier image and SCAN-mapping method. This paper has presented a concept of combination of nibble value of a characters is used as a mapping function to generate carrier image ,merging of carrier image and original image generate level 1 encryption . Applying scan patterns on level 1 encryption gives double layer protection to secretly send original image.

 

 

 

 

 

 

 

 

 

[1] IsmetOzturk and Ibrahim Sogukpinaar, “Analysis and Comparison of Image Encryption Algorithms,” Transaction on engineering, Computer and Technology, 2004, vol.3, pp.38-4 [2] 2.S.S. Maniccam and N.G. Bourbakis, “Image and video encryption using SCAN patterns,” Pattern Recognition, 2004, vol. 37, pp. 725-737. [3] Bibhudendra Acharya et. el., “Image encryption using advanced hill cipher algorithm”, International journal of recent trends in engineering, ACEEE, Vol. 1, No. 1, May 2009. [4] Said E. El-Khamy, “A partial image encryption scheme based on the DWT and ELKNZ chaotic stream ciper”, MASAUM journal of basic and applied science, Vol. 1, No. 3, October 2009.Bibhudendra Acharya et. el., “Image encryption using advanced hill cipher algorithm”, International journal of recent trends in engineering, ACEEE, Vol. 1, No. 1, May 2009.