Two-Level Image Encryption Algorithm Based On Key-Image

Authors

  • Sridhar V CSE Dep. MVSR Engineering College, Hyderabad India
  • Dyna M CSE Dep. MVSR Engineering College, Hyderabad India

DOI:

https://doi.org/10.26438/ijcse/v6i8.9991008

Keywords:

Image security, Cryptography, Network security, Image processing

Abstract

In the contemporary world images play key role in information interchange. Medical, defence, space and various areas of domain make use of high scale images in several applications. Security becomes the main concern wherein the images are to be protected so that they cannot be seen by any advisory. This can be achieved by image encryption. There are various image encryption methods that are based on textual key and text data which are not efficient for high definition images. In this paper we propose a three step image encryption algorithm which uses another image as a key. In the first step, key image is scaled and tiled, in step2 encryption is achieved using grey-value substitution and in step-3 the output generated from step-2 is scrambled using Fibonacci transformation to add additional security. This multistep encryption provides high security for images. The performance of this algorithm is analyzed using different attack models which results in high security without any loss of input image

References

[1] Y. Zhou, K. Panetta and S. Agaian, "Image encryption using binary key-images," 2009 IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, 2009, pp. 4569-4574. doi: 10.1109/ICSMC.2009.5346780

[2] Y. Zhou, K. Panetta and S. Agaian, "Comparison of recursive sequence based image scrambling algorithms," 2008 IEEE International Conference on Systems, Man and Cybernetics, Singapore, 2008, pp. 697-701. doi:10.1109/ICSMC.2008.4811359

[3] Yicong Zhou, Sos Agaian, Valencia M. Joyner, Karen Panetta, "Two Fibonacci P-code based image scrambling algorithms", Proc. SPIE 6812, Image Processing: Algorithms and Systems VI, 681215 (3 March 2008); doi:10.1117/12.766591

[4] Jiancheng Zou, R. K. Ward and Dongxu Qi, "A new digital image scrambling method based on Fibonacci numbers," 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), 2004, pp.III-965-8Vol.3. doi:10.1109/ISCAS.2004.1328909

[5] K. C. Iyer and A. Subramanya, "Image Encryption by Pixel Property Separation," Cryptology ePrint Archive, 2009.

[6] M. Yang, N. Bourbakis, and S. Li, "Data-image-video encryption," Potentials, IEEE, vol. 23, no. 3, pp. 28-34,2004.

[7] J. Zou, R. K. Ward, and D. Qi, "A new digital image Scrambling method based on Fibonacci numbers," in Circuits and Systems, 2004. ISCAS `04. Proceedings of the 2004 International Symposium on, 2004 pp. III-965-8 Vol.3.

[8] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.

[9] Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., "Performance Analysis of Self Adaptive Image Encryption Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.44-58, 2017.

[10] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i8.9991008
Published: 2025-11-15

How to Cite

[1]
V. Sridhar and M. Dyna, “Two-Level Image Encryption Algorithm Based On Key-Image”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 999–1008, Nov. 2025.

Issue

Section

Research Article