| Peer-Reviewed

Hybrid method for Ciphering Colored Image

Received: 11 January 2015    Accepted: 16 January 2015    Published: 31 March 2015
Views:       Downloads:
Abstract

Security has more and more importance in current era especially in the organizations where information is more critical and more effective, so there are many methods that will be used in keeping information secure and safety like steganography, cryptography, barcode, password, and biometrics. different techniques will be used to protect image data from unauthorized access, In this paper a hybrid method will be proposed for ciphering secure image by translating information from original RGB image to YCbCr format then using public key algorithm after normalized pixels values to insure that will be within public and prevent keys region after that the Modified Arnold Transform, Generalized Fibonacci Transform, and Fibonacci-Lucas Transform will be applied on each ciphered band from YCbCr image respectively.

Published in Automation, Control and Intelligent Systems (Volume 3, Issue 2-1)

This article belongs to the Special Issue Artificial Nano Sensory System

DOI 10.11648/j.acis.s.2015030201.15
Page(s) 22-34
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cryptography, Ciphering, Deciphering, Color image, Public Key, Private Key, Arnold Transform, Fibonacci Transform, Fibonacci-Lucas Transform

References
[1] Linhua Zhang , Xiaofeng Liao , Xuebing Wang " An Image Encryption Approach Based on Chaotic Maps", .elsevier , China, 2004.
[2] Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law " A Fast Image Encryption Scheme based on Chaotic Standard Map", HONG KONG, 2006.
[3] Abdullah Sharaf Alghamdi, and Hanif Ullah "A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm", IJCNS, 2010.
[4] Minati Mishra, Priyadarsini Mishra, M.C. Adhikary and Sunit Kumar," Image Encryption Using Fibonacci-Lucas Transformation", IJCIS, India, 2012.
[5] Rajinder Kaur, Er.Kanwalprit Singh " Image Encryption Techniques: A Selected Review", IOSR-JCE, India, 2013.
[6] Quist-Aphetsi Kester " Image Encryption Based on the RGB PIXEL Transposition and Shuffling" I. J. Computer Network and Information Security, 2013.
Cite This Article
  • APA Style

    Salman Abd Kadum, Ali Abdul Azeez Mohammad Baker. (2015). Hybrid method for Ciphering Colored Image. Automation, Control and Intelligent Systems, 3(2-1), 22-34. https://doi.org/10.11648/j.acis.s.2015030201.15

    Copy | Download

    ACS Style

    Salman Abd Kadum; Ali Abdul Azeez Mohammad Baker. Hybrid method for Ciphering Colored Image. Autom. Control Intell. Syst. 2015, 3(2-1), 22-34. doi: 10.11648/j.acis.s.2015030201.15

    Copy | Download

    AMA Style

    Salman Abd Kadum, Ali Abdul Azeez Mohammad Baker. Hybrid method for Ciphering Colored Image. Autom Control Intell Syst. 2015;3(2-1):22-34. doi: 10.11648/j.acis.s.2015030201.15

    Copy | Download

  • @article{10.11648/j.acis.s.2015030201.15,
      author = {Salman Abd Kadum and Ali Abdul Azeez Mohammad Baker},
      title = {Hybrid method for Ciphering Colored Image},
      journal = {Automation, Control and Intelligent Systems},
      volume = {3},
      number = {2-1},
      pages = {22-34},
      doi = {10.11648/j.acis.s.2015030201.15},
      url = {https://doi.org/10.11648/j.acis.s.2015030201.15},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.acis.s.2015030201.15},
      abstract = {Security has more and more importance in current era especially in the organizations where information is more critical and more effective, so there are many methods that will be used in keeping information secure and safety like steganography, cryptography, barcode, password, and biometrics. different techniques will be used to protect image data from unauthorized access, In this paper a hybrid method will be proposed for ciphering secure image by translating information from original RGB image to YCbCr format then using public key algorithm after normalized pixels values to insure that will be within public and prevent keys region after that the Modified Arnold Transform, Generalized Fibonacci Transform, and Fibonacci-Lucas Transform will be applied on each ciphered band from YCbCr image respectively.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Hybrid method for Ciphering Colored Image
    AU  - Salman Abd Kadum
    AU  - Ali Abdul Azeez Mohammad Baker
    Y1  - 2015/03/31
    PY  - 2015
    N1  - https://doi.org/10.11648/j.acis.s.2015030201.15
    DO  - 10.11648/j.acis.s.2015030201.15
    T2  - Automation, Control and Intelligent Systems
    JF  - Automation, Control and Intelligent Systems
    JO  - Automation, Control and Intelligent Systems
    SP  - 22
    EP  - 34
    PB  - Science Publishing Group
    SN  - 2328-5591
    UR  - https://doi.org/10.11648/j.acis.s.2015030201.15
    AB  - Security has more and more importance in current era especially in the organizations where information is more critical and more effective, so there are many methods that will be used in keeping information secure and safety like steganography, cryptography, barcode, password, and biometrics. different techniques will be used to protect image data from unauthorized access, In this paper a hybrid method will be proposed for ciphering secure image by translating information from original RGB image to YCbCr format then using public key algorithm after normalized pixels values to insure that will be within public and prevent keys region after that the Modified Arnold Transform, Generalized Fibonacci Transform, and Fibonacci-Lucas Transform will be applied on each ciphered band from YCbCr image respectively.
    VL  - 3
    IS  - 2-1
    ER  - 

    Copy | Download

Author Information
  • Computer Systems Techniques, Al Furat Al Wast University, Al Najaf Technical Institute, Al Najaf, Iraq

  • Computer Systems Techniques, Al Furat Al Wast University, Al Najaf Technical Institute, Al Najaf, Iraq

  • Sections