Have a personal or library account? Click to login
Security Features on and with Documents: A Survey Cover
By: C. Yamini and  N. Priya  
Open Access
|Sep 2024

Full Article

1
Introduction

Data present in documents can be of many types like confidential or just simple usable data. They may be critical data like transactional data, payment data, and so on. These data sources or resources need to be safeguarded. To safeguard them, various methods have been used throughout the years. The methods may vary based on the type of data. This article focuses on the various methods that were used throughout the years and were described in articles.

Data duplication is possible to some extent, including copying data to perform illegal transactions, some of which are meant to deceive another person. There are many other reasons for duplication or illegal use of documents. The following is a study of some techniques used for safeguarding documents from misuse.

Document safeguarding can be done using various technologies, and the technologies differ based on the types of documents. The purpose of the document decides the use of the technologies or their algorithms.

2
Techniques

data would be of various types, some of which are audio and video. If they are sensitive or critical, they need to be secured.

There are various methods with which the data can be secured. Some of them use data hiding as a technique, while some encrypt the data using keys and secure them. The technologies are of a wide range. Many related papers were referred to, and some are discussed below.

2.1
Image Scrambling

Image Scrambling is a part of data security and comes under the concept of data hiding. This means that the images, when scrambled, remain safe and secret from malicious sources. This would, in turn, keep the data scrambled and can be taken only by valid people.

Today, this has become a part of cryptography, even though it is not definitely encryption through an algorithm.

Ref. [1] suggested that image scrambling can be used in real time to safeguard data and gave us examples of Sudoku puzzles and Rubik’s cubes. Here, the image matrix is obtained and scrambled, which results in a matrix that is very different from the original image. Then, when this image is unscrambled, the original image is returned.

Ref. [2] Concludes that Image scrambling can be done two-way using the Arnold transform algorithm. Arnold transform can be confusing at times due to its complexity.

The Arnold transform algorithm processes under the concept where the n numbers of iterations are performed, and n is used as the key. The image is encrypted by shuffling the planes simultaneously. This has been done numerous times.

The Sudoku pairs are used to scramble blocks here and are then used as a part of Image Scrambling.

2.2
Bitplane

This is a set of bits arranged corresponding to a given bit position (MSB or LSB types) in a binary number representing signals. A Bitplane is meant to be regarding a discrete digital signal. For instance, audio or video forms may be taken.

The Most Significant Bit can be the most effective one with higher or critical approximation values of the plane, and LSB-Least Significant Bit would give us the lower values. Image Scrambling is also used here. This would mean that the Planes of an image are changed and then those bits are used as a key for the encryption of the original image.

Ref. [3] Suggested a new bit-plane decomposition algorithm using Image Scrambling where the result is received. This would mean that any image similar to the source image is taken, and bit plane methodology is used for decomposition of that image. It is then used as the key for the encryption. The Plane that can be used as a key can be decided by the user themself.

Ref. [4] Concluded that Arnold scrambling, a technique that uses the Arnold transform algorithm, and Bit Scrambling, which is performed as Bit Plane Decomposition, can be used for the encryption and decryption process.

The former is said to be simpler and easier to workout than the latter since Arnold Scrambling becomes somewhat confusing. Image Scrambling is generally a topic that is more common and known than Arnold Scrambling.

Here, the bit plane with a number of Most Significant bits would contribute more when compared to the Least Significant ones. This is because the Most Significant ones are of larger intensity.

2.3
Steganography

Steganography is the technique of concealing a message inside another or even more in a new format itself.

Here, one can conceal a new message within another one where the message that is visible may be unimportant, or the concealed message may be offensive or critical. These concealing may be done in both audio and video files. Most recent examples of these uses are Micro-Ink, which would be very small, like 1cm in diameter.

Ref. [5] uses an approach where for encryption Caesar cipher and Vigenère cipher are used to get the encrypted data. They are then combined with the hash function for Steganography purposes. This would lead to an increase in speed and security when compared to the other methods of LSB Image Steganography algorithms.

The Fig. 1 would give us a general example of how data can be embedded into an image for Security features.

Figure 1.

Indian Rupee with its features that are highlighted

It shows Indian Currency and its Security features. The Indian currency has various security features such as:

  • Color Shifting ink when it is exposed to light.

  • Microprint of the currency value.

  • RBI written on the Spectacles of Mahatma Gandhi, which is not visible to the naked eye.

  • Some other typographic unique features that cannot be duplicated easily.

  • Numbers written in Braille script.

  • Raised-up print that is shown at a certain angle.

  • The watermark of Mahatma Gandhi and electrolyte numerical of the currency written

Out of these features, almost four or five are part of Steganography. It has its basics here, and hence, any data can be embedded into an image.

2.4
Cryptography

It means sending a message through a secured channel by encrypting it using a code, which is later decrypted by using another code. The code used is called a key.

In Cryptography, there are various algorithms that are commonly used. Some are the AES, DES, and RSA. In each and every algorithm, the process of encrypting and the number of rounds of encryption varies. As well as the way the encryption is done.

For example, in AES, there 13 rounds of process which would result in encrypting the whole data. For decryption, the same method is used, but with the reversing of the processes done.

Ref. [6] Uses Image encryption techniques and channel coding. Chaotic maps are used here that are based on Cryptography. They give us a wide range of Security and would help in real-time data more.

Figure 2 shows us the general concept of Cryptography. It branches out to various other methods of cryptography as well later on. The image depicts how plain text by the sender is encrypted using a Public key to make it Cipher text.

Figure 2.

Cryptography concept

The Decryption is done using the same key that is made Private such that only the receiver knows about that. Once the decryption is done, the original text is received back by the Receiver. In the mean while all the other ways used to decode the encrypted text would result in error only.

2.5
Blockchain

Blockchain is defined as a mathematical structure that can store data corresponding to a particular detail or the component specified.

From Refs. [7,8,9,10], which are based on the concept of Blockchain and its various methods of implementation, it can be concluded that Blockchain is becoming a trending technology while using medical images nowadays. Physicians would like to see the various stages of improvement or the disease of a patient along with the comments or descriptions given to them respectively. Refs. [11, 12] also adds that Blockchain would mean that the data is safe and can be viewed only by the necessary person.

Ref. [13] tells us about how to encrypt an image securely using Blockchain. Here, the images are scrambled and random permutation is used and blocks are obtained.

These blocks are later mapped with cipher blocks. The Blockchain is obtained using the SHA-512 hash. That is later embedded in covering audio signals for enhanced protection.

Here, the image is taken first and encrypted and then the Block permutation is performed on that for shuffling them. Later the data is embedded that needs to be sent along with the image.

Once the receiver gets the specified data, they need to decrypt them first to get the data and the image separately, after which the data is kept secret as it is, and after reversing the process of encryption, the original image is returned as supposed.

3
Comparison of the Techniques

In this paper, over all the methods that have been discussed, Blockchain would mean more efficient and Successful encryption technology.

Even though Steganography holds half the importance in the Image encryption trend nowadays, Blockchain gives us more place for research and also for improvisation.

Of all the technologies given above, the most trending ones are Image scrambling and Blockchain. Image scrambling can be confusing sometimes due to its excessive calculative approach, whereas Blockchain would mean a simpler way to encrypt images and save some other data over that.

Let us compare these technologies to find the superior one. When these technologies are considered individually, they receive different efficiency scores, and when they are compared with others, for example, Bitplane and Image Scrambling are popular, their efficiency scores are different.

4
Metrics Considered
4.1
Accuracy

When it comes to accuracy, Cryptography and blockchain technology can be considered, as they are the latest and most used.

When considering both of them together, the accuracy tends to be higher than when they are taken separately. The rest of the technologies also give us the result, but the accuracy rate tends to lessen them.

4.2
Efficiency

The efficiency would depict as to which level can the result be accepted and dependency of the technologies.

As seen in Table 2, the efficiency of Blockchain is higher when other technologies, such as Steganography and Scrambling, are involved. Cryptography gives us much higher one compared to Steganography.

This is because the latter one was used from olden times and cryptography gives the latest version.

4.3
Reliability

The reliability would tell us how reliable the results are. When compared using various algorithms of the above-mentioned technologies, Cryptography has a wide range of algorithms that perform well and have more recent updates. This holds good for Blockchain as well.

4.4
Security

This is one of the most important metrics that needs to be checked. Security is provided through all the technologies since they are basically used for encryption purposes only. But the level differs. Blockchain would provide security for the data and cryptography uses algorithms for that. Some of these algorithms are complex, which would make it difficult for them to be processed at the earlier stages.

5
Comparison of the Methods and their Metrics

Here, the comparison between the techniques is explained in table 1.

Also, table 2 gives us the metrics and their functionality in regards with the techniques are given.

Table 1.

Comparison according to Techniques

Image Scrambling:
Authors Referred: [2], [4]
Algorithms Used: Rubic’s Cubic algorithm and Arnold Transformation, Arnold Scrambling
Pros: Simple and easy to work
Cons: Uses basic methods so need of more efficiency is there
Efficiency (Comparatively): Has some negative effects and termed as not much efficient
Bit Plane:
Authors Referred: [3]
Algorithms Used: Image encryption algorithm using Bitplane, Arnold Scrambling
Pros: Similar to Image Scrambling
Cons: Even after doing this, confusion exists in the model
Efficiency (Comparatively): Efficient when considered with Image Scrambling
Cryptography:
Authors Referred: [12]
Algorithms Used: An algorithm based on Chaos and improved DES
Pros: Familiar approach but various techniques
Cons: Encryption can be done using various methods where some are not satisfactory
Efficiency (Comparatively): More than Steganography
Steganography:
Authors Referred: [1], [14], [15]
Algorithms Used: Embedding and Extracting algorithm, Caesar/Vigenère cipher
Pros: Easier to understand and does the necessary correctly
Cons: Old style method of encryption
Efficiency (Comparatively): Not much when compared with cryptography
Blockchain:
Authors Referred: [5], [6], [7], [8], [9], [10], [13], [16], [17]
Algorithms Used: Blockchain technology, Steganography
Pros: Can extend to save more details
Cons: Requires additional storage space
Efficiency (Comparatively): Efficient when taken alongside other technologies
Table 2.

Comparison according to Metrics

Accuracy:
Image Scrambling: Higher compared to other techniques
Bit Plane: Not much since this is used along with Image scrambling
Cryptography: Higher compared to other techniques
Steganography: Higher compared to other techniques
Blockchain: Higher compared to other techniques
Efficiency:
Image Scrambling: More efficient in terms of small images
Bit Plane: Doesn’t matter since always used with Image scrambling
Cryptography: More efficient and used since a very long time
Steganography: More efficient compared to other techniques since protection is higher
Blockchain: Efficient in terms of medical images as mostly used there
Reliability:
Image Scrambling: Reliable but not as much as the latest technologies
Bit Plane: Not much when compared to other techniques
Cryptography: Reliable because of Security features embedded
Steganography: Reliable since it uses password for protection
Blockchain: Reliable when information is not much confidential
Security:
Image Scrambling: Secures the image
Bit Plane: Not much since this is used along with Image scrambling
Cryptography: Higher for the embedded data
Steganography: Higher for the embedded data but then image is also password protected
Blockchain: Higher for the embedded data than the image
6
Conclusion

This study was conducted in regard to the various methods of Encryption and Decryption and the methods through which data can be made more secure.

The main purpose of this study is to learn the various techniques used for image encryption and storage of data and also to compare and get the most relevant and easier one in the process. The comparison is given in table 1 and that gives us the related conclusion.

This study and references in Refs. [14], [18], and [19] tell that Data can be encrypted, scrambled, rearranged, hidden, and encoded to keep it safe from assailants. The blockchain method also yields us another advantage: one can get or save other details regarding the data along with encrypting it and keeping it safe.

DOI: https://doi.org/10.2478/ias-2024-0006 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 72 - 79
Published on: Sep 23, 2024
Published by: Cerebration Science Publishing Co., Limited
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2024 C. Yamini, N. Priya, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.