Open Access   Article Go Back

Image Encryption Using Image Division and Suffling Technique

Abhishek Kumar Saw1 , Yogesh Kumar Rathore2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-11 , Page no. 64-67, Nov-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i11.6467

Online published on Nov 30, 2019

Copyright © Abhishek Kumar Saw, Yogesh Kumar Rathore . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Abhishek Kumar Saw, Yogesh Kumar Rathore, “Image Encryption Using Image Division and Suffling Technique,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.64-67, 2019.

MLA Style Citation: Abhishek Kumar Saw, Yogesh Kumar Rathore "Image Encryption Using Image Division and Suffling Technique." International Journal of Computer Sciences and Engineering 7.11 (2019): 64-67.

APA Style Citation: Abhishek Kumar Saw, Yogesh Kumar Rathore, (2019). Image Encryption Using Image Division and Suffling Technique. International Journal of Computer Sciences and Engineering, 7(11), 64-67.

BibTex Style Citation:
@article{Saw_2019,
author = {Abhishek Kumar Saw, Yogesh Kumar Rathore},
title = {Image Encryption Using Image Division and Suffling Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2019},
volume = {7},
Issue = {11},
month = {11},
year = {2019},
issn = {2347-2693},
pages = {64-67},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4946},
doi = {https://doi.org/10.26438/ijcse/v7i11.6467}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i11.6467}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4946
TI - Image Encryption Using Image Division and Suffling Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Abhishek Kumar Saw, Yogesh Kumar Rathore
PY - 2019
DA - 2019/11/30
PB - IJCSE, Indore, INDIA
SP - 64-67
IS - 11
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
504 436 downloads 215 downloads
  
  
           

Abstract

Encryption is the most effective way to achieve data security and converting data to an unrecognizable or encrypted form. Its wide used to secure data sent over wireless networks and the internet. This paper aims at improving the protection and efficiency of image cryptography by employing a highly efficient shuffle based encryption rule and a comparable decryption rule supported random values obtained by using pseudo random number generator .In this paper, a image encryption is projected which has pixels shuffling image division technique. The planned algorithmic program has been examined using multiple analysis ways in and a PSNR value obtained is more than 35 in all cases which shows a good decryption.

Key-Words / Index Term

Transposition, Error free encryption, PSNR, Cryptography

References

[1]. A.J.Menezes ,P.C.Van Oorschot, and S.Vanstone , “Handbook of Applied cryptography”, CRC Press, Boca Ration,Florida, USA,1997.
[2] S. Maniccam and N. G. Bourbakis, “Lossless image compression and encryption using scan,” Pattern Recognition, vol. 34, no. 6, pp. 1229–1245, 2001.
[3] C.-C. Chang, M.-S. Hwang, and T.-S. Chen, “A new encryption algorithm for image cryptosystems,” Journal of Systems and Software, vol. 58, no. 2, pp. 83–91, 2001.
[4] C.-M. Shin, D.-H. Seo, K.-B. Cho, H.-W. Lee, and S.-J. Kim, “Multilevel image encryption by binary phase xor operations,” in Lasers and Electro-Optics, 2003. CLEO/Pacific Rim 2003. The 5th Pacific Rim Conferenceon, vol. 2. IEEE, 2003, pp. 426–vol.
[5] G. Gu and G. Han, “An enhanced chaos based image encryption algorithm,” in First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC’06), vol. 1. IEEE, 2006,pp. 492–495.
[6] T. Shah, I. Hussain, M. A. Gondal, and H. Mahmood, “Statistical analysis of s-box in image encryption applications based on majority logic criterion,” International Journal of Physical Sciences, vol. 6,no. 16, pp. 4110–4127, 2011.
[7] M. A. S. Hassan and I. S. I. Abuhaiba, “Image encryption using differential evolution approach in frequency domain,” ar Xiv preprintarXiv:1103.5783, 2011.
[8] S. P. Indrakanti and P. Avadhani, “Permutation based image encryption technique,” International Journal of Computer Applications (0975–8887) Volume, 2011.
[9] A. Nag, J. P. Singh, S. Khan, S. Ghosh, S. Biswas, D. Sarkar, and P.P.Sarkar, “Image encryption using affine transform and xor operation,” in Signal Processing, Communication, Computing and Networking Technologies (ICSC).
[10] L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Computers & Electrical Engineering, vol. 38, no. 5, pp. 1240–1248, 2012.
[11] Y. Liu, J. Tang, and T.Xie, “Cryptanalyzing a RGB image encryption algorithmbased on DNA encoding and chaosmap,” Optics and Laser Technology, vol. 60, pp. 111–115, 2014.
[12] X.-Y. Wang, Y.-Q. Zhang, and Y.-Y. Zhao, “A novel image encryption scheme based on 2-D logistic map and DNA sequence operations,” Nonlinear Dynamics. An InternationalJournal of Nonlinear Dynamics and Chaos in Engineering Systems,vol. 82, no. 3, pp. 1269–1280, 2015.
[13] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations,” Optics Lasers in Engineering, vol. 88, pp. 197–213, 2017.
[14] Y. Niu, X. Zhang, and F. Han, “Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database,” Computational Intelligence and Neuroscience, vol. 2017, Article ID 4079793, 9 pages, 2017.
[15] Jiancheng Zou , Rabab K. Ward , Dongxu Qi, “A New Digital Image Scrambling Method Based on Fibonacci Number, “Proceeding of the IEEE Inter Symposium On Circuits and Systems, Vancouver ,Canada ,Vol .03 , PP .965-968 , 2004.
[16] Nishith Sinha and Kishore Bhamidipati “Improving Security of Vigenère Cipher by Double Columnar Transposition”, International Journal of Computer Applications (0975 – 8887), Volume 100 – No.14, August 2014.
[17] Stallings W. “Pseudorandom Numbers “in Cryptography and Network Security- Principles and Practices, 5th edition.
[18]Zhang, GuoL, WeiXP .Image encryption using DNA addition combining with chaotic maps.MathComputModel2010;52:2028–35.
[19]Wang XY ,Zhang YQ ,Bao XM .A novel chaotic image encryption scheme using DNA sequence operations.OptLasersEng2015;73:53–61.
[20]ZhangYQ,WangXY,LiuJ,ChiZL. An image encryption scheme based on the MLNCML systemusingDNAsequences.OptLasersEng2016;82:95–103.
[21]. Quist-Aphetsi Kester,” Image Encryption based on the RGB PIXEL Transposition and Shuffling”, International Journal of Computer Network and Information Security, 2013, Vol 7, Pages:43-50.
[22]. Musheer Ahmad, M. Shamsher Alam,” A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal on Computer Science and Engineering,Vol.2(1), 2009, 46-50.
[23].Varsha Bhatt, Gajendra Singh Chandel,”Implementaion of new advance image Encryption Algorithm to enhance the security of Multimedia Component” International Journal of Advanced Technology & Engineering Research (IJATER), ISSN No: 2250- 3536 Volume 2, Issue 4, July 2012.
[24]. Hiral Rathod, Mahendra Singh Sisodia, Sanjay Kumar Sharma,”Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper image Encryption Algorithm)”, International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.
[25] F. Dufaux and T. Ebrahimi, ``Scrambling for privacy protection in video surveillance systems,`` IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, pp. 1168_1174, Aug. 2008.
[26] F. Dufaux and T. Ebrahimi, ``H. 264/AVC video scrambling for privacy protection,`` in Proc. IEEE Int. Conf. Image Process., Oct. 2008,pp. 1688_1691.
[27] P. Carrillo, H. Kalva, and S. Magliveras, ``Compression independent reversible encryption for privacy in video surveillance,`` Eurasip J. Inf.Secur., vol. 2009, no. 1, pp. 1_13, 2010.
[28] F. Dufaux, ``Video scrambling for privacy protection in video surveillance: Recent results and validation framework,`` Proc. SPIE, vol. 8063, pp. 307_314, May 2011.