Security, Storage And Transmission Of Electronic Digital Images

2439 words - 10 pages

1. 1 Overview

Many digital services require reliable security in storage and transmission of electronic digital images. Due to the rapid growth with the internet in the electronic digital world today, the protection of digital images is becoming more important and enticed much attention. The prevalence of multimedia technology in this society has promoted electronic digital images to play a far more significant role than the traditional texts, which demand significant protection of users' privacy for all those applications. Encryption and steganography techniques of digital images are extremely important and should be used to frustrate opponent problems from unauthorized access (Mitra et ...view middle of the document...

Normally, most of the available encryption algorithms utilized for text data. On the other hand, due to large data size and real-time constrains, algorithms that are beneficial to textual data may not be well suited for multimedia data (Yas Any. Alsultanny, 2008), (Droogenbroech along with Benedett, 2002), (Fong along with Singh, 2002). According to Xun (2001) and Wang (2005), even though triple-data encryption standard (T-DES) along with 1nternational data encryption algorithm (IDEA) can perform high security, they might not be suitable intended for multimedia applications (Xun et ing, 2001), (Wang et ing, 2005). Therefore, encryption algorithms for instance data encryption standard (DES), advanced encryption standard (AES), along with international data encryption criteria (IDEA) were built intended for textual data (Lee et ing, 2003), (Syed, 2002), (Xun et ing, 2001).

Although we will use the traditional encryption algorithms to encrypt images directly, this may not be a good idea for 2 reasons. First, the image size is normally larger than text. Therefore, the traditional encryption algorithms need an extended period to directly encrypt this image data. Second, the decrypted text has to be equal to the original text but this requirement just isn't necessary for image info. According to Chang (2001), due to the characteristic of human belief, a decrypted image containing small distortion is frequently acceptable (Chang et ing, 2001), (Jiri Jan, 2005), (David Salomon, 2005). The intelligible information seen in an image is because the
correlation among the image elements in a given arrangement. According to Mitra (2006), this perceivable information could be reduced by decreasing this correlation among image things using certain transformation techniques (Mitra et al, 2006).

To recognize and support the security services of the organization at its effective level, the manager requires a systematic way. One approach is always to consider three aspects of information security that's Security attack, Security procedure and Security services. Security attack identifies different modes with which intruder tries to get unauthorized information along with the services are intended to counter security attacks, and they make use of one or more security mechanisms to offer the service. There isn't single mechanism that can provide all the services specific.

In addition to cryptography, steganography techniques are receiving significantly more sophisticated and also have been widely used. The steganography techniques are classified as the
perfect supplement for encryption that allows a user to hide considerable amounts of information within an image. Thus, it is often used in conjunction with cryptography so that the data is doubly protected, that's, first it is encrypted, then it is hidden so that an adversary has to discover the hidden information before this decryption takes place (Kisik Chang et ing, 2004), (Kessler, 2001), (Kathryn Hempstalk,...

Find Another Essay On Security, Storage and Transmission of Electronic Digital Images

Computer Security, Defines encryption and explain how it is used to protect transmission of information

886 words - 4 pages location.Study Case (Bank of Shenandoah Valley)While both encryption and authentication method are providing some measures of security, the implementation of security itself has totally a different approach. Before any methods chosen, the two most important factors in security implementations are having to be determined. The level of security needed and the cost involved, so the appropriate steps can be taken to ensure a safe and secure

How Do New Technologies Face the Rapid Expansion of the Electronic Data Storage?

1214 words - 5 pages The term data can be defined as “numbers, characters, images or other method of recording, in a form which can be assessed by a human or input into a computer” (FOLDOC, 2007). It can be processed or stored for posterior use. The stored data are called historical data which are collected and amassed for potential future verification of events or as resources for further research. Two types of data storage are presented: paper and electronic. The

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages only 2% of their credit card transactions were conducted via the Internet, however this accounted for about 50% of disputes and discovered frauds (Furnell and Karweni, 1999).In response to the understandable lack of trust in credit card security over the Internet, Electronic Money (E-money), developed by Digicash, mimics cash transactions on the Internet. The customers can download digital coins from a bank's server. The coins encrypted with a

Comparing and Contrasting Subunits of Memory Storage

791 words - 4 pages The study of memory has two primary parts: the systems problem of memory and the molecular problem of memory. Along with these two parts, there are two subunits into which memory falls. Implicit memory is the motor and perceptual aspect of our memory while explicit memory is the recall of facts and events. In this lecture, the systems used for memory storage in these two subunits are explained and contrasted. Implicit memory storage differs

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages signed with the electronic signature, legally, is as good as a document signed by hand. Also, another characteristic is that it uses biometrics recognition. It is a powerful tool, that when misused, can cause a lot of trouble. Naturally a couple questions come to mind: How safe is to use the electronic signature? Is my privacy kept? Privacy, security and biometrics There are two main fields of study regarding the use of electronic signature. The

The Principles and Limitations of Transmission and Scanning Electron Microscopes

1149 words - 5 pages The Principles and Limitations of Transmission and Scanning Electron Microscopes Introduction Microscopy has a major role in cytology.From the very beginning researchers have tried to develop ways of looking directly at living cells.This examination has revealed much about the morphology of cells and tissues.In recent years,development in microscopes,dyes,staining and preparatory techniques have helped reveal even

Electronic Commerce, discusses methods and concerns of Electronic Commerce

1383 words - 6 pages merchants. Businesses need two keys in public-key encryption: one to encrypt, the other to decrypt the message. Everyone who expects to receive a message publishes a key. To send digital cash to someone, you look up the public key and use the algorithm to encrypt the payment. The recipient then uses the private half of the key pair for decryption. Although encryption fortifies our electronic transaction against thieves, there is a cost: The

Images of power and authority in art

542 words - 2 pages Images of Power and Authority in ArtArt has been used to portray figures of power and authority many times in history.Different cultures have different ways of portraying the image to have power and authority. Oneexample of using art to portray images of power and authority is the Victory Stele of Naram-Sin.This was made to commemorate King Naram-Sin for his defeat of Lullubi. The King stands aloneat the top, taller than everyone else. This

The Importance of Storage in Fresh Fruit and Vegetables Logistics

2116 words - 9 pages . On the other hand After damaged induce much shorter storage lives and very poor appearance in storage. Dirty produce can introduce pests into the store. Maybe dirty conditions of harvesting cause shorter storage lives and decreasing quality of storage conditions. The produce should be harvested carefully using some specific equipments. The fruits and vegetables should not be placed on the ground where they are dirty. They should be careful to

Symbols, images, and places of great expectations

807 words - 3 pages Study Guide for EnglishFinals Spring 2004Great Expectations - Symbols, Images, PlacesNote: Symbols, images, and places all tie in together - they all symbolize something in a different way. For specifics, they are labeled S, I, and P. Sorry for the mess - just wrote it as it came.1. Statis House (SP) - Pip's romantic view of the upper class. A mansion in which every thing that inhibits it seems unnatural. The name itself means "enough" (see page

Studies on Storage of MLX-NLC and Possible Toxicity

1188 words - 5 pages MLX-NLC gel stored at different temperature and humidity conditions (Table 1) were evaluated for any changes in particle size, PI, zeta potential, and drug content at 30, 60, 90 days time points to assess the effect of storage conditions on the stability as a function of time. The particle size was monitored at regular time intervals during storage to assess particle aggregation. The nanoparticles are thermodynamically unstable system and for

Similar Essays

Data Storage And Transmission Essay

769 words - 3 pages . Vision, for example, is an analog experience because we perceive infinitely smooth gradations of shapes and colors.When used in reference to data storage and transmission, analog format is that in which information is transmitted by modulating a continuous transmission signal, such as amplifying a signal's strength or varying its frequency to add or take away data. For example, telephones take sound vibrations and turn them into electrical

Electronic And Digital Technology Essay

1441 words - 6 pages Looking back 15 years ago to the electronic and digital technology we had then compared to what we have now is incredible to see first hand. Society knew this new technology would come but never thought it would be here this immediate to where everyone and their grandmother’s posse some form of it. It is deranged that a great deal of individuals hate this new age where technology is ubiquitous and taking over. Most of them that are not fond of

The Catalysts And Images Of Terrorism: National Security Threat

3468 words - 14 pages modern terrorism has learned their lessons from the past and has adapted their techniques in order to achieve their political agenda. Dr. Robert Brathwaite, asserts, “The U.S. National Security establishment currently views terrorism as the single biggest challenge the U.S. faces” (pg. 2). Most policy makers debate over the true definition of terrorism, but many agree on a narrow set of reasons why terrorism poses such a threat. First image

Towards The Secure Storage Of Images On Multi Cloud System

1568 words - 7 pages users and also from the cloud service providers. This paper proposes an integrated encryption scheme based on DNA sequences and scrambling using zigzag pattern or Magic Square of doubly even order pattern to ensure double-fold security for the secure storage of confidential images on multi-cloud. 2. DEFINITIONS FOR THE PROPOSED SYSTEM 2.1. Cryptosystem : A cryptosystem is a five tuple (M, C, , , D) where i. M is a finite set of plain-text (images