Two-Level Image Encryption Algorithm Based On Key-Image
DOI:
https://doi.org/10.26438/ijcse/v6i8.9991008Keywords:
Image security, Cryptography, Network security, Image processingAbstract
In the contemporary world images play key role in information interchange. Medical, defence, space and various areas of domain make use of high scale images in several applications. Security becomes the main concern wherein the images are to be protected so that they cannot be seen by any advisory. This can be achieved by image encryption. There are various image encryption methods that are based on textual key and text data which are not efficient for high definition images. In this paper we propose a three step image encryption algorithm which uses another image as a key. In the first step, key image is scaled and tiled, in step2 encryption is achieved using grey-value substitution and in step-3 the output generated from step-2 is scrambled using Fibonacci transformation to add additional security. This multistep encryption provides high security for images. The performance of this algorithm is analyzed using different attack models which results in high security without any loss of input image
References
[1] Y. Zhou, K. Panetta and S. Agaian, "Image encryption using binary key-images," 2009 IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, 2009, pp. 4569-4574. doi: 10.1109/ICSMC.2009.5346780
[2] Y. Zhou, K. Panetta and S. Agaian, "Comparison of recursive sequence based image scrambling algorithms," 2008 IEEE International Conference on Systems, Man and Cybernetics, Singapore, 2008, pp. 697-701. doi:10.1109/ICSMC.2008.4811359
[3] Yicong Zhou, Sos Agaian, Valencia M. Joyner, Karen Panetta, "Two Fibonacci P-code based image scrambling algorithms", Proc. SPIE 6812, Image Processing: Algorithms and Systems VI, 681215 (3 March 2008); doi:10.1117/12.766591
[4] Jiancheng Zou, R. K. Ward and Dongxu Qi, "A new digital image scrambling method based on Fibonacci numbers," 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), 2004, pp.III-965-8Vol.3. doi:10.1109/ISCAS.2004.1328909
[5] K. C. Iyer and A. Subramanya, "Image Encryption by Pixel Property Separation," Cryptology ePrint Archive, 2009.
[6] M. Yang, N. Bourbakis, and S. Li, "Data-image-video encryption," Potentials, IEEE, vol. 23, no. 3, pp. 28-34,2004.
[7] J. Zou, R. K. Ward, and D. Qi, "A new digital image Scrambling method based on Fibonacci numbers," in Circuits and Systems, 2004. ISCAS `04. Proceedings of the 2004 International Symposium on, 2004 pp. III-965-8 Vol.3.
[8] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[9] Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., "Performance Analysis of Self Adaptive Image Encryption Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.44-58, 2017.
[10] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
