Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, International journal of engineering research and technology
This paper aims at improving the level of security and secrecy provided by the digital gray scale image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. Since the pixel of image is highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be practically predicted from a value of its neighbors. So there is a need of a technique that can shuffle the pixels to reduce the correlation between the neighbor pixels. Hence we used Scrambling technique that Shuffles the pixels of image .This Scrambled image is called transformed image. The transformed image then divided into 2 pixels x 2 pixels blocks and each block is encrypted using XOR operation by four 8-bit keys. The total size of key in our algorithm is 32 bit long which proves to be strong enough. The proposed encryption algorithm in this study has been tested on some Gray Scale images and showed good results.
Multimedia Tools and Applications, 2020
Design principles for image encryption schemes abound in the literature. Among these schemes, few were built upon the philosophy of swapping of the pixels in the given input image. Swapping is a very straightforward and a naïve approach for image scrambling. We believe that fuller potential of swapping has not been realized yet. In this work, a novel image encryption scheme is being presented through the swapping of pixel values of the given gray scale input image. The 5D multi-wing hyperchaotic system rendering five key streams of random numbers have been used in the proposed cipher. After the gray scale image is input, its pixels are swapped randomly. The random numbers given through the first two key streams jointly determine the address of the first pixel to be swapped with the second pixel whose address is determined by the random numbers given through the third and fourth key streams. In this way, the pixels of the given image are swapped abundantly. The selection of both the pixels for swapping is purely arbitrary and random in character having no restriction of linearity and sequentiality as was done by other schemes previously. To create the diffusion effects, an XOR operation is carried out between this scrambled image and the key image formed through the fifth stream of random numbers given by the chaotic system. SHA-384 hash codes have been used in the proposed scheme to embed the plaintext sensitivity. The simulation and the extensive security analyses carried out at the end expressly portray the good security effects and the potential for the real world application of the reported scheme.
2018
In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension (2D) input image is divided into various blocks of size N × N. Each block is transformed into a one dimensional (1D) array by using the Zigzag pattern. Then, the exclusive or (XOR) logical operation is used to encrypt each block with the analogous secret key. In the second scheme, after the transformation process, the first block of each image is encrypted by the corresponding secret key. Then, before the next block is encrypted, it is XORed with the first encrypted block to become the next input to the encrypting routine and so on. This feedback mechanism depends on the cipher block chaining (CBC) mode of operation which considers the heart of some ciphers because it is highly nonlinear. In the case of color images, the color component is separated into blocks with ...
2015
random grid is a two-dimensional array of pixels that are either transparent or opaque. Each pixel in a random grid is produced in a totally random way. In this paper, a new algorithm is designed to carry out the encryption of the gray scale images by using random grids in such way that neither of two shares gives any especial information of original image. The original image can be recognized only when two encrypted shares are combined by XOR operation. In this approach, against others, bit planes are used instead of half toning techniques and also gray scale level will remain after decryption process in decrypted image.
International Journal of Network Security & Its Applications, 2012
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Journal of emerging technologies and innovative research, 2020
In latest years, there is a speedy development in the multimedia and network technologies in computer era. Transmission of multimedia information over the network leads the major problems of security, privacy and data size. Images are widely used and the major problems are how to protect the images and also reduce size of the image in order to maximize the network utilization. Various techniques are there with a view to secure the image and to reduce the size of the image. Security and privateness aren’t taken into consideration in the sooner Image compression techniques. To provide the privacy and security, the encryption is applied as well as compression reduces the data size. So that, to overcome the issues in multimedia and network technologies, compression is combined with encryption. In order to get higher network utilization, the encrypted images are compressed. An efficient image Encryption Then Compression (ETC) system is designed. In proposed scheme Advanced Encryption Sta...
Computer Science & Information Technology ( CS & IT ), 2012
Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. In this paper, we introduce an algorithm. The binary code of the pixel values of a colour image is extracted and permuted according to the entered 8 bit key which is followed by the permutation of every 8 consecutive pixels [4]. The image is further divided into blocks which are shifted accordingly. The above mentioned technique has a few drawbacks, like the small key size. To further enforce the encryption another method is appended to it which requires a 43 digit key. The encryption takes a total of 10 rounds in which two keys are use, both of which are derived from the 43 digit entered key. The results showed that the correlation between image elements was significantly decreased by using the proposed technique.
International Journal of Image, Graphics and Signal Processing, 2014
This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides additional protection of the secret data. The substitution and transposition are done using dynamic substitution box (SBOX) and transposition box (TBOX) which are generated using the secret key and made to vary for each block during ciphering. The size of encrypted data is same as the size of secret data and the proposed scheme has been tested using different images. We have also presented the security analysis such as key sensitivity analysis, statistical analysis, and differential analysis to prove the strength of our algorithm against crypto analysis.
Multimedia Tools and Applications, 2020
In this paper, a novel grayscale image cryptosystem based on hybrid chaotic maps is proposed. The scheme employs both confusion phase to scramble the location of pixels and diffusion phase for changing the content of pixels in consecutive manner. In this scheme, Arnold's cat map is introduced to perform confusion operation and the principle of diffusion is achieved by using the proper selection of combined Sine map, Logistic map, and Tent map. Furthermore, exclusive OR (XOR), exchange, and transform operations are used to enhance the efficiency of diffusion phase. Accordingly, the use of chaotic maps and XOR operation provides a dual layer of security. Depending on the average absolute value of horizontal, vertical, and diagonal correlation coefficient of plain image as well as bifurcation properties of chaotic maps, one of the mentioned chaotic maps is selected for diffusion phase. First, original gray scale image matrix is extended to square matrix by adding the sequences generated with proper chaotic maps to implement the first step of diffusion phase. Then the Arnold's cat map changes pixels location of new extended matrix by means of certain equation as confusion phase. The encrypted image is generated after applying XOR, exchange and transform operations on the content of pixels as second step of diffusion phase. Thus the system is able to build several more complicated chaotic structures. In addition the encryption and decryption processing time directly depend on the value of correlation coefficient of original image. Plain images with less correlation coefficient have less encryption and decryption processing time, and vice versa. Compared with several existing methods, the proposed scheme has more better properties, including wider chaotic ranges and more complex chaotic behavior. Experimental results show that the proposed system has proper encryption and decryption processing time, unified average changing intensity (UACI), number of pixel change rate (NPCR), and extensive security analysis for kind of images.
International Journal of Computer Applications, 2014
This paper proposed a new algorithm for digital image encryption. The proposed algorithm encrypts an mxn size image by using the set of array pixel values. At the end, plain images will be encrypted using the algorithm and analysis will be performed on the ciphered images to determine the efficiency of the algorithm in ciphering the image. The algorithm ultimately makes it possible for encryption and decryption of the images to be done based on the RGB pixel. The algorithm was implemented using MATLAB.
This paper lays down the various image encryption techniques and specifically gives an account of chaos based encryption of images. The kinds of techniques studied include image encryption using digital signatures, lossless image compression and encryption using SCAN, mirror like image encryption, chaotic image encryption and colour image encryption using double random phase coding. Image encryption is different from text encryption because of the larger scale of data, higher redundancy and stronger correlation of pixels in images. Hence traditional encryption algorithms are not suitable for digital image encryption. To overcome these drawbacks we present a chaos based algorithm for images. This algorithm is based on scrambling of pixels where the randomness of chaos is utilized. The data are scrambled in the order of randomness of elements based on the chaotic map and reshuffled again to their original positions in the decryption process. Compared to traditional methods, chaotic image key encryption has a larger space, simple implementation, robustness and the advantages of faster encryption.
Journal of Electrical Engineering, 2014
In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features.
arXiv: Image and Video Processing, 2018
In this paper, chaotic block image permutation and XOR operation are performed to achieve image encryption. The studied method of encryption makes use of chaotic systems properties for secure and speed image encryption. Firstly, the original image is divided into blocks of equal size. Then, two chaotic maps are used to generate two key streams which are permuted among themselves to produce one key steam. The image blocks are then shuffled using part of key stream. Finally, scrambled image is diffused by XOR operation with the key stream to get the encrypted image. The experimental results of several performance analyses about the pixel correlation, various statistical analysis, information entropy analysis, differential analysis, the key space and key sensitivity analysis, show that the algorithm can resist several know attacks effectively and has the advantages of large key space, high security, and high speed, assuring safety performance and secure image encryption.
International Journal of Electrical and Computer Engineering (IJECE), 2014
In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features.
Sensors, 2022
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
In recent years, encryption technology has been developed quickly and many image encryption methods have been used. As a result of Development Of computer network technology, communication of information through personal computer is becoming more convenient. It also gives opportunities to hackers to attack the network. Therefore, the communication security is now an important issue for multimedia. This paper proposed various encryption techniques for color or gray scale image based on chaotic system and other traditional methods. New image encryption techniques for images have suggested several advantages over the traditional encryption algorithms such as high security, speed and computational power. This paper presents numbers of image encryption techniques from which researchers can get an idea for efficient techniques to be used.
— With digital India popularity, organizations are proposing numerous frameworks focusing on digital encryption techniques. Due to the ease of copying, editing, and tampering of digital documents and images has led to encrypting the information mandatory for transmission and storage. It evident that the correlation between the image pixels to its neighborhood region is high, reducing correlation between the pixels value makes it difficult to guess for the original image and thus improve the security. In this paper, we introduce a novel image encryption method which initially rearranges the image on the basis of switching gray codes and pixel explosion. The pixel explosion uses well-defined key that switches between the gray-code of the image pixels. Experimental results would show that the proposed pixel explosion is enough for partial encryption and enhances security of the data. Further, it could also support as an armament for any existing algorithm.
2014
Now a day’s rapid increasing growth of internet and multimedia data, security is main problem in storage and communication of images. The solution of this multimedia data can be solved by using encryption. There are various techniques available to protect the image data from unauthorized access. In this paper, authors reviewed different existing techniques of image encryption and also discussed the basic knowledge of Cryptography. Keywords— Chaotic Map, Cryptography, Decryption, Encryption, SCAN pattern, Security.
Asian Journal of Computer Science and Technology, 2018
In the present paper, we report security analysis of an effective method of scrambling i.e. XOR technique, which may be used as an important component in visual cryptography. Histogram of scrambled or encrypted images expressed that pixel values are distributed quite uniformly. This implies that nothing can be guessed about the original image using the encrypted image. For analyzing the complexity of encrypted images, information entropy, the correlation coefficient of adjacent pixels values were also calculated. Values of horizontal correlation, vertical correlation, and information entropy reflected that the complexity and randomness of pixel values are quite high for XOR cipher. Now a day's differential attack has been very common. Keeping the same in the mind, we have calculated Unified Average Changing Intensity (UACI) and the Number of Pixels Change Rate (NPCR), to exhibit the ability of encrypted image using XOR cipher to resist the differential attack. So we can say that XOR cipher is useful for secure transmission of an image.
Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing the two Boolean operations: XOR and Rotation that are done on the bits of the pixels in the image. This method is implemented by firstly doing a sequential XOR operation on all the bits of pixels in the image, and secondly makes a circular rotate right of these bits. These two operations are repeated many times during the encryption phase. The security and performance of the proposed encryption method have been evaluated by applying it on images and analyze the recorded results using key space analysis, key sensitivity analysis, and statistical analysis. The performance experiments show that the proposed method is promising to use effectively in wide fields of image encryption.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.