Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
…
4 pages
1 file
This new algorithm performs lossless image encryption by combining variable-length key-dependent XOR encryption with S-box substitution. This algorithm was implemented and tested by performing different permutations of XOR encryption and S-box substitution. Empirical analysis using different types of test images of different sizes showed that this new algorithm is effective and resistant to statistical attacks. The idea presented by this algorithm may be generalized to apply to input data other than images, and may be combined with other encryption methods.
International Journal of Information and Communication Technology, 2018
Encryption is the way to ensure confidentiality of different data, digital images have special features as large data, bulky data, and strong correlation between pixels, which makes traditional encryption algorithms not suitable for image encryption. For this concern, we propose a novel lossless encryption scheme for digital images based on combination of matrix transformations and XOR operation. The numerical experimental results confirms that the proposed method achieves high security level against brute force attacks, statistical attacks and sensitivity analysis, moreover the suggested algorithm provides a good randomness properties, thus our method can be applied for image encryption and transmission in sensitive domains.
Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing the two Boolean operations: XOR and Rotation that are done on the bits of the pixels in the image. This method is implemented by firstly doing a sequential XOR operation on all the bits of pixels in the image, and secondly makes a circular rotate right of these bits. These two operations are repeated many times during the encryption phase. The security and performance of the proposed encryption method have been evaluated by applying it on images and analyze the recorded results using key space analysis, key sensitivity analysis, and statistical analysis. The performance experiments show that the proposed method is promising to use effectively in wide fields of image encryption.
Asian Journal of Computer Science and Technology, 2018
In the present paper, we report security analysis of an effective method of scrambling i.e. XOR technique, which may be used as an important component in visual cryptography. Histogram of scrambled or encrypted images expressed that pixel values are distributed quite uniformly. This implies that nothing can be guessed about the original image using the encrypted image. For analyzing the complexity of encrypted images, information entropy, the correlation coefficient of adjacent pixels values were also calculated. Values of horizontal correlation, vertical correlation, and information entropy reflected that the complexity and randomness of pixel values are quite high for XOR cipher. Now a day's differential attack has been very common. Keeping the same in the mind, we have calculated Unified Average Changing Intensity (UACI) and the Number of Pixels Change Rate (NPCR), to exhibit the ability of encrypted image using XOR cipher to resist the differential attack. So we can say that XOR cipher is useful for secure transmission of an image.
Computer Science & Information Technology ( CS & IT ), 2012
Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. In this paper, we introduce an algorithm. The binary code of the pixel values of a colour image is extracted and permuted according to the entered 8 bit key which is followed by the permutation of every 8 consecutive pixels [4]. The image is further divided into blocks which are shifted accordingly. The above mentioned technique has a few drawbacks, like the small key size. To further enforce the encryption another method is appended to it which requires a 43 digit key. The encryption takes a total of 10 rounds in which two keys are use, both of which are derived from the 43 digit entered key. The results showed that the correlation between image elements was significantly decreased by using the proposed technique.
International Journal of Image, Graphics and Signal Processing, 2014
This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides additional protection of the secret data. The substitution and transposition are done using dynamic substitution box (SBOX) and transposition box (TBOX) which are generated using the secret key and made to vary for each block during ciphering. The size of encrypted data is same as the size of secret data and the proposed scheme has been tested using different images. We have also presented the security analysis such as key sensitivity analysis, statistical analysis, and differential analysis to prove the strength of our algorithm against crypto analysis.
Nucleus, 2019
The increasing applications of image processing have shifted the focus to the security of images during their transmission. In this work, the main focus is on the security of gray scale images against cryptanalysis attacks. A new model for encryption algorithm of the grayscale image is presented through substitution boxes (s-box). The proposed technique contained two parts; in the first part six different substitution boxes are generated from Galois field and linear fractional transformations. In the second part, the generated substitution boxes are used for the encryption process of message image. For the estimation of the strength of the proposed technique for nonlinearity and strict avalanche criteria, statistical tests and histogram analysis are performed on the substitution boxes and on the encrypted images respectively to check its resistance. The proposed algorithm is more robust as compared to other encryption techniques against attacks in insecure transmission paths.
International journal of engineering research and technology, 2013
This paper aims at improving the level of security and secrecy provided by the digital gray scale image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. Since the pixel of image is highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be practically predicted from a value of its neighbors. So there is a need of a technique that can shuffle the pixels to reduce the correlation between the neighbor pixels. Hence we used Scrambling technique that Shuffles the pixels of image .This Scrambled image is called transformed image. The transformed image then divided into 2 pixels x 2 pixels blocks and each block is encrypted using XOR operation by four 8-bit keys. The total size of key in our algorithm is 32 bit long which proves to be strong enough. The proposed encryption algorithm in this study has been tested on some Gray Scale images and showed good results.
International Journal of Signal Processing, Image Processing and Pattern Recognition, 2013
ELSEVIER, 2020
Chaos theory is initially developed in the 1970s and has been utilized in the field of cryptography for the last three decades. In present work, an implementation of image encryption technique using chaotic system, compression and S-boxes is discussed. In this encryption scheme, compression is used to hide the original size of (plain text) image and also reduce the time complexity of the scheme. In addition to this, a particular S-box is selected for the encryption process with the help of an improved range chaotic map. The proposed scheme is discussed in detail, along with its standard security analysis and experimental results. This improved chaotic map and S-boxes provide large key space and high level of security. The size of cipher text generated by this scheme is different from plain text and is easy to implement for practical application of secure transmission of confidential data. c
Academic Journal of Nawroz University
Sending digital pictures across open networks has emerged as a major privacy risk in recent years. Despite the environment's adaptability and the many benefits it offers, there are, however, a significant number of threats to one's privacy and safety. A great number of cryptosystems have been proposed in the literature on picture encryption in an effort to make communication more secure. For the purpose of data transmission, the AES algorithm is utilized due to the increased efficiency it offers in the block. This paper proposes image encryption techniques based on the AES algorithm and Henon map. The plain image has been encrypted using the AES algorithm at the first step. Then, the Henon map is used to generate a random key which is required to provide the second step of encryption. This step of encryption has been performed using the XOR operation. The results of the studies demonstrate that the strategy proposed resolves the issues that are present in conventional techn...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Optics Communications, 2012
Journal of Computer Science, 2016
International Journal of Computer Applications, 2014
International Journal of Computer Applications, 2013
Springer Journal of Multimedia Tools and Applications, 2020
Journal of Systems and Software, 2001
International Journal of Network Security & Its Applications, 2012
Harran Üniversitesi Mühendislik Dergisi, 2022
Academic journal of Nawroz University, 2022
International journal of engineering research and technology, 2021
Zeitschrift für Naturforschung A, 2012