Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Evaluation of Block based Image Encryption Algorithms

Dr. A. Kalai Selvi, Dr.M. Mohamed Sathik

Abstract


With the fast development of data exchange in electronic system, safety of information is becoming more important in data storage and transmits. Because of commonly using images in industrial practice, it is very important to protect the confidential data from unauthorized access. This paper suggests that image encryption and decryption process based on block based encryption. The algorithms consider here are zonal based image encryption and primitive root based image encryption. The zone based image encryption is working based on the principle of zonal transformation matrix, whereas primitive root based image encryption is based on the principle of primitive root theorem. The attribute considered for the comparative study are information entropy and average deviation analysis. Experimental results demonstrate that the zone based image encryption method provides        effective performance compared to primitive root based encryption method.


Keywords


Encryption, Decryption, Transformation Matrix, Primitive Root Theorem.

Full Text:

PDF

References


Aloha Sinha, Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, 2003, 1-6 .

S.S.Maniccam,N.G. Bourbakis, “Lossless image compression and encryption using SCAN”, Pattern Recognition 34 (2001), pp.1229-1245.

Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, “A new encription algorithm for image cryptosystems”, The Journal of Systems and Software 58 (2001), 83-91.

Jiun-In Guo, Jui-Cheng Yen, “A new mirror-like image encryption algorithm and its VLSI architecture”, Department of Electronics Engineering National Lien-Ho College of Technology and Commerce.

Jui-Cheng Yen, Jiun-In Guo, “A new chaotic image encryption algorithm“,Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China, E-mail: jcyen@mail.lctc.edu.tw

Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding”, MICROWAVE AND OPTICAL TECHNOLOGY LETTERS / Vol. 21, No. 5, June 5 1999, 318-322.

Bidhudendra Acharya, Sarat Kumar Patra and Ganapati Panda “ A Novel Cryptosystem Using Matrix Transformation”, Proceedings of SPIT-IEEE Colloquium & International Conference Vol 4, pp. 92 – 95, 2008.

Bidhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra and Saroj Kumar Panigrahy. “Novel Methods of Generating Self Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security (CSS Journals ). Vol 1, Issue. (1), pp. 14 – 21, 2007.

Lerma, M.A., 2005. Modular Arithmetic. http://www.math.northwestern.edu/~mlerma/problem_solving/results/modular_arith.pdf.

Rastislav Lukac and Konstantinos N.Plataniotis. “ A Secret Sharing Scheme for Image Encryption” 46th International Symposium Electronics in Marine, EIMAR-2004, 2004, pp 549 – 554.

Qais H. Alsafasfeh , Aouda A. Arfoa,‖ Image Encryption Based on the General Approach for Multiple Chaotic Systems‖, Journal of Signal and Informati on Processing, 2011

A.Kalai Selvi, Dr.M. Mohamed Sathik, “Multimedia Security Using Secret Sharing Scheme for Image Encryption”, International Journal of Computer AND Internet Security, 2010, pp. 57-66.

A.Kalai Selvi, Dr.M.Mohamed Sathik,” Polynomial Based Secret Sharing Scheme for Image Encryption Based on Mathematical Theorem”, International Journal of Advanced Research in Computer Science, 201, pp. 284-287.

Ibrahim S I Abuhaiba , Maaly A S Hassan, “Image Encryption Using Differential Evolution Approach In Frequency Domain”, International Journal of Signal & Image Processing, March 2011.

Mohammad Ali Bani Younes and Aman Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption”, International Journal of Computer Science and Network Security, April 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.