Image Encryption Using Image Division and Suffling Technique

Authors

  • Kumar Saw A Raipur Institute of Technology, Raipur (CG), India
  • Rathore YK Raipur Institute of Technology, Raipur (CG), India

DOI:

https://doi.org/10.26438/ijcse/v7i11.6467

Keywords:

Transposition, Error free encryption, PSNR, Cryptography

Abstract

Encryption is the most effective way to achieve data security and converting data to an unrecognizable or encrypted form. Its wide used to secure data sent over wireless networks and the internet. This paper aims at improving the protection and efficiency of image cryptography by employing a highly efficient shuffle based encryption rule and a comparable decryption rule supported random values obtained by using pseudo random number generator .In this paper, a image encryption is projected which has pixels shuffling image division technique. The planned algorithmic program has been examined using multiple analysis ways in and a PSNR value obtained is more than 35 in all cases which shows a good decryption.

References

[1]. A.J.Menezes ,P.C.Van Oorschot, and S.Vanstone , “Handbook of Applied cryptography”, CRC Press, Boca Ration,Florida, USA,1997.

[2] S. Maniccam and N. G. Bourbakis, “Lossless image compression and encryption using scan,” Pattern Recognition, vol. 34, no. 6, pp. 1229–1245, 2001.

[3] C.-C. Chang, M.-S. Hwang, and T.-S. Chen, “A new encryption algorithm for image cryptosystems,” Journal of Systems and Software, vol. 58, no. 2, pp. 83–91, 2001.

[4] C.-M. Shin, D.-H. Seo, K.-B. Cho, H.-W. Lee, and S.-J. Kim, “Multilevel image encryption by binary phase xor operations,” in Lasers and Electro-Optics, 2003. CLEO/Pacific Rim 2003. The 5th Pacific Rim Conferenceon, vol. 2. IEEE, 2003, pp. 426–vol.

[5] G. Gu and G. Han, “An enhanced chaos based image encryption algorithm,” in First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC’06), vol. 1. IEEE, 2006,pp. 492–495.

[6] T. Shah, I. Hussain, M. A. Gondal, and H. Mahmood, “Statistical analysis of s-box in image encryption applications based on majority logic criterion,” International Journal of Physical Sciences, vol. 6,no. 16, pp. 4110–4127, 2011.

[7] M. A. S. Hassan and I. S. I. Abuhaiba, “Image encryption using differential evolution approach in frequency domain,” ar Xiv preprintarXiv:1103.5783, 2011.

[8] S. P. Indrakanti and P. Avadhani, “Permutation based image encryption technique,” International Journal of Computer Applications (0975–8887) Volume, 2011.

[9] A. Nag, J. P. Singh, S. Khan, S. Ghosh, S. Biswas, D. Sarkar, and P.P.Sarkar, “Image encryption using affine transform and xor operation,” in Signal Processing, Communication, Computing and Networking Technologies (ICSC).

[10] L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Computers & Electrical Engineering, vol. 38, no. 5, pp. 1240–1248, 2012.

[11] Y. Liu, J. Tang, and T.Xie, “Cryptanalyzing a RGB image encryption algorithmbased on DNA encoding and chaosmap,” Optics and Laser Technology, vol. 60, pp. 111–115, 2014.

[12] X.-Y. Wang, Y.-Q. Zhang, and Y.-Y. Zhao, “A novel image encryption scheme based on 2-D logistic map and DNA sequence operations,” Nonlinear Dynamics. An InternationalJournal of Nonlinear Dynamics and Chaos in Engineering Systems,vol. 82, no. 3, pp. 1269–1280, 2015.

[13] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations,” Optics Lasers in Engineering, vol. 88, pp. 197–213, 2017.

[14] Y. Niu, X. Zhang, and F. Han, “Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database,” Computational Intelligence and Neuroscience, vol. 2017, Article ID 4079793, 9 pages, 2017.

[15] Jiancheng Zou , Rabab K. Ward , Dongxu Qi, “A New Digital Image Scrambling Method Based on Fibonacci Number, “Proceeding of the IEEE Inter Symposium On Circuits and Systems, Vancouver ,Canada ,Vol .03 , PP .965-968 , 2004.

[16] Nishith Sinha and Kishore Bhamidipati “Improving Security of Vigenère Cipher by Double Columnar Transposition”, International Journal of Computer Applications (0975 – 8887), Volume 100 – No.14, August 2014.

[17] Stallings W. “Pseudorandom Numbers “in Cryptography and Network Security- Principles and Practices, 5th edition.

[18]Zhang, GuoL, WeiXP .Image encryption using DNA addition combining with chaotic maps.MathComputModel2010;52:2028–35.

[19]Wang XY ,Zhang YQ ,Bao XM .A novel chaotic image encryption scheme using DNA sequence operations.OptLasersEng2015;73:53–61.

[20]ZhangYQ,WangXY,LiuJ,ChiZL. An image encryption scheme based on the MLNCML systemusingDNAsequences.OptLasersEng2016;82:95–103.

[21]. Quist-Aphetsi Kester,” Image Encryption based on the RGB PIXEL Transposition and Shuffling”, International Journal of Computer Network and Information Security, 2013, Vol 7, Pages:43-50.

[22]. Musheer Ahmad, M. Shamsher Alam,” A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal on Computer Science and Engineering,Vol.2(1), 2009, 46-50.

[23].Varsha Bhatt, Gajendra Singh Chandel,”Implementaion of new advance image Encryption Algorithm to enhance the security of Multimedia Component” International Journal of Advanced Technology & Engineering Research (IJATER), ISSN No: 2250- 3536 Volume 2, Issue 4, July 2012.

[24]. Hiral Rathod, Mahendra Singh Sisodia, Sanjay Kumar Sharma,”Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper image Encryption Algorithm)”, International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.

[25] F. Dufaux and T. Ebrahimi, ``Scrambling for privacy protection in video surveillance systems,`` IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, pp. 1168_1174, Aug. 2008.

[26] F. Dufaux and T. Ebrahimi, ``H. 264/AVC video scrambling for privacy protection,`` in Proc. IEEE Int. Conf. Image Process., Oct. 2008,pp. 1688_1691.

[27] P. Carrillo, H. Kalva, and S. Magliveras, ``Compression independent reversible encryption for privacy in video surveillance,`` Eurasip J. Inf.Secur., vol. 2009, no. 1, pp. 1_13, 2010.

[28] F. Dufaux, ``Video scrambling for privacy protection in video surveillance: Recent results and validation framework,`` Proc. SPIE, vol. 8063, pp. 307_314, May 2011.

Downloads

Published

2019-11-30
CITATION
DOI: 10.26438/ijcse/v7i11.6467
Published: 2019-11-30

How to Cite

[1]
A. Kumar Saw and Y. K. Rathore, “Image Encryption Using Image Division and Suffling Technique”, Int. J. Comp. Sci. Eng., vol. 7, no. 11, pp. 64–67, Nov. 2019.

Issue

Section

Research Article