Open Access Open Access  Restricted Access Subscription or Fee Access

Permutation based Digital Image Encryption and Decryption Methods

Neha Balu Wagh

Abstract


According to research findings, a human brain decodes visual elements faster than text, thus increasing efficiency and effectiveness of communication. The growing popularity of micro-blogging and social networking sites, certainly tells the increase in sharing of posts with images. Image data or information is very crucial resource for any individual and has potential of getting misused. As there is no reliability over communication medium through which the information is sent, encryption is a way to ensure security. Image encryption techniques try to convert an original image to unreadable form, so an unauthorized access is not possible without a key. Over years, different image encryption schemes had been put forward as a medium to provide protection to digital images. The purpose of the work presented in paper is to study two image encryption techniques, namely, A secure image encryption algorithm based on Rubik's cube principle and A partial image encryption based on block wise shuffling using Arnold Map. The respective algorithms are implemented and evaluation parameters were calculated using MATLAB. Also, the comparison is made to analyze performances of both the techniques.


Keywords


Cryptography, Image Encryption, Rubik Cube, Arnold Map.

Full Text:

PDF

References


Wei Ding, Weiqi Yan and Dongxu Qi, “Digital Image Scrambling Technology based on Arnold Transformation,” Journal of Computer aided design & computer graphics, vol.13-No.4,pp.338-342,2001.

Mohammad Ali Bani Younes and Aman Jantan, “An image encryption approach using block based transformation algorithm,” IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03,2008.

Tiegang Gao and Zengqiang Chen, “Image encryption based on a new total shuffling algorithm,” Chaos, Solitons and Fractals, ISSN 0960-0779, vol.38(1), pp.213-220,2008.

Li Zhang, Xiaolin Tian and Shaowei Xia, “A scrambling algorithm of image encryption based on Rubik's cube rotation and Logistic sequence,” IEEE International Conference: Multimedia and Signal Processing (CMSP), vol.1,pp.312-315,2011.

Right Connect, “We process visuals 60,000 times fatser than text - Here's WHY,” December 5, 2011, Retrieved October 19, 2016, http://rhdeepexploration.wordpress.com/2011/12/05/visuals-60000-times-faster/

Joshi Rohit A, Joshi Sumit S and G.P. Bhosale, “Improved image encryption algorithm using chaotic map,” International Journal of Computer Applications (0975-8887), vol. 32-No.09, October 2011.

Khaled Loukhaouka, Jean-Yves Chouinard and Abdellah Berdai, “A secure image encryption algorithm based on Rubik's cube principle,” Hindawi Publishing Corporation, Journal of Electrical and Computer Engineering, vol. 2012, Laval University, 2012.

Mahmood Al-Khassaweneh and Shefa Tawalbeh, “A value transformation and random permutation based coloured image encrypion technique”, International Journal of Information and Computer Security, Vol.5,No-4, pp.290-300,2013.

Mr. Chaitanya V. Mahamuni, “Digital Video Watermarking using DWT and PCA in encrypted domain,” Research Chronicler International Multidisplinary Research Journal (RCIMRJ), vol.II-issue-III,pp.46-52 March 2014.

Nilesh Y.Choudhary and Ravindra K.Gupta, “ Partial image encryption based on block-wise shuffling using Arnold catmap,” International Jornal of Computer Applications, vol.97-No.10, July 2014.

Shrija Somaraj and Mohammed Ali Hussain, “Performance and Security Analysis for image encryption using Key image,” Indian Journal of Science and Technology, Vol 8(35), December 2015.

Hibbard.B.S.(2015), “ Images - Why Important, Proper Usage And Where To Use, ” Retrieved October 19, 2016, from http://www.themarktingbit.com/marketing-2/images-why-important-proper-usage-and-where-to-use/

Mr. Chaitanya V. Mahamuni, “A Comphrensive Study of Cryptography and Content Hiding Techniques for Security of Digital Videos,” International Journal of Advance Foundation and Research in Computer (IJAFRC),vol 2, issue-12, December 2015 pp. 46-52.

Stallings, W., & Stallings, W. (1999). Cryptography and network security: principles and practice. Upper Saddle River, NJ: Prentice Hall

Kahate, A. (2013). Cryptography and network security. New Delhi: McGraw Hill Education.

Arnold's Cat Map. (n.d.). Retrieved October 07, 2016, from http://ckw.phys.ncku.edu.tw/public/pub/Notes/NonlinearPhysics/Hilborn/nb_5.2/Chap8/Catmap/catmap3.htm


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.