Improving Image Encryption and Decryption Using WU`s Algorithm

Authors

  • Mary Kurian S Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India
  • Manuel N Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India
  • Joseph N Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India
  • George N Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India

Keywords:

Encryption, Wu’s algorithms

Abstract

In this advanced world, pictures are generally utilized in various cycles. Along these lines, the security of picture and information from unapproved utilizes is significant. Presently, data security is turning out to be progressively significant in information capacity and broadcasting. It is fundamental for getting picture, either on the way or store on gadgets. Nonetheless, some picture encryption calculations actually have numerous security issues and can be effortlessly gone after by assailants. This proposed framework plays out the cryptanalysis of a recently proposed variety picture encryption scheme utilizing Wu's algorithms. For encryption plot, typically utilizes a pseudo-irregular encryption key created by a calculation and which makes the picture safer. An approved recipient can without much of a stretch unscramble the message with the mystery key given by the originator to recipient however not to unapproved clients.

References

W. Stallings, “Cryptography and Network Security”,Fourth Edition, Prentice Hall, Vol. 16, 2005.

Eberhart, R. C. "Chaos theory for the biomedical engineer" IEEE engineering in medicine and biology magazine: the quarterly magazine of the Engineering in Medicine & Biology Society,Vol. 8, Issue 3, pp. 41-45,1998.

Lorenz, Edward N. "Deterministic non-periodic flow". Journal of the Atmospheric Sciences Vol.20 Issue.2, pp.130-141,1963.

Zouhozr Ben Jemaa, Safya Belghzth "Correlation properties of binary sequences generated by the logistic map-application to DSCDMA." Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Hammamet, Tunisia. pp. 447-451,2002

Jin-mei Liu, Qiang Qu, "Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map" Proceedings of Third International Symposium on Information Processing, pp. 67-69,2010

M. Salleh, S. Ibrahim, I. F. Isnin, "Enhanced chaotic image encryption algorithm based on Baker's map." Proceedings of IEEE Conference on Circuits and Systems, Vol.2, pp. 508-511,2002

K. Wang, W. Pei, L. Zou, A. Song, Z. He, "On the security of 3D Cat map based symmetric image encryption scheme," Physics Letters A, Vol. 343, pp. 432-439,2005

Vinodh P Vijayan, Deepti John, Merina Thomas, Neetha V Maliackal, Sara Sangeetha Varghese “Multi Agent Path Planning Approach to Dynamic Free Flight Environment”, International Journal of Recent Trends in Engineering (IJRTE), pp.41-46,2009

Juby Joseph, Vinodh P Vijayan” Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression usingLonger Path Protocol” International Journal of Advanced Research in Computer Science and Software Engineering, Vol 4, Issue 7, pp. 825-829,2014

V P Vijayan, Biju Paul “Multi Objective Traffic Prediction Using Type-2 Fuzzy Logic and Ambient Intelligence”,IEEE International Conference on Advances in Computer Engineering, Published in IEEE Computer Society Proceedings, 2010

Downloads

Published

2025-11-12

How to Cite

[1]
S. Mary Kurian, N. Manuel, N. Joseph, and N. George, “Improving Image Encryption and Decryption Using WU`s Algorithm”, Int. J. Comp. Sci. Eng., vol. 6, no. 1, pp. 413–416, Nov. 2025.

Issue

Section

Research Article