Open Access   Article Go Back

A Novel Hybrid Digital Image Encryption Technique

Vikas Thada1 , Utpal Shrivastava2

  1. Amity Institute of computer science and Engineering,Amity University, Haryana, India.
  2. Amity Institute of computer science and Engineering,Amity University, Haryana, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 585-592, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.585592

Online published on May 31, 2018

Copyright © Vikas Thada, Utpal Shrivastava . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vikas Thada, Utpal Shrivastava, “A Novel Hybrid Digital Image Encryption Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.585-592, 2018.

MLA Style Citation: Vikas Thada, Utpal Shrivastava "A Novel Hybrid Digital Image Encryption Technique." International Journal of Computer Sciences and Engineering 6.5 (2018): 585-592.

APA Style Citation: Vikas Thada, Utpal Shrivastava, (2018). A Novel Hybrid Digital Image Encryption Technique. International Journal of Computer Sciences and Engineering, 6(5), 585-592.

BibTex Style Citation:
@article{Thada_2018,
author = {Vikas Thada, Utpal Shrivastava},
title = {A Novel Hybrid Digital Image Encryption Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {585-592},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2025},
doi = {https://doi.org/10.26438/ijcse/v6i5.585592}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.585592}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2025
TI - A Novel Hybrid Digital Image Encryption Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Vikas Thada, Utpal Shrivastava
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 585-592
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
439 201 downloads 136 downloads
  
  
           

Abstract

In this growing era of information technology and the Internet, everybody is using interactive media in communication directly or indirectly. Images may have high confidential data.So these images need high security when they are stored somewhere, and when there is a need to send over any insecure communication network, then it is required to provide complete protection from tampering, accessing by illegal party that is not intended receiver. In this research work the problem is to design a novel scheme for 2D image encryption and decryption using an affine cipher, circular rotation of image matrix and the XOR operation. Father the security is enhanced by the fact that main secret key is broken into 3 sub keys and same sub keys are used for encrypting the three different panels of an RGB image. The use of circular shift is also performed by applying a secret operation on a secret key. A special secret key was also generated to be applied during the XOR operation after affine transformation is performed on the original. The cumulative effect of all the above steps results in secure encryption of the image. The encryption process is written in such a manner so that it can be easily reversed and decryption can be achieved by simply running the encryption algorithm in reverse order. This proposed encryption scheme can efficiently be utilized for securing the digital images.

Key-Words / Index Term

affine, encryption, decryption, key, image, xor

References

[1] Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar, ParthaPratim Sarkar “Image Encryption Using Affine Transform and XOR Operation” 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011), 21-22 July 2011, pages : 309-312.
[2] Long Bao, Yicong Zhou, C. L. Philip Chen, Hongli Liu “A New Chaotic System for Image Encryption” 2012 International Conference on System Science and Engineering, June 30-July 2, 2012, pages: 69-73 .
[3] Qiudong Sun, Ping Guan, YongpingQiu, YunfengXue “A Novel Digital Image Encryption Method Based on One-dimensional Random Scrambling” 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, 29-31 May 2012, page: 1669-1672.
[4] AmneshGoel, Nidhi Chandra “A Technique for Image Encryption Based On Explosive n*n Block displacement Followed By Inter-Pixel Displacement of RGB Attribute of A Pixel” 2012 International Conference on Communication Systems and Network Technologies, 11-13 May 2012, page: 884-888.
[5] Saraswati D. Joshi, Dr. V.R. Udupi, Dr. D.R. Joshi, “A Novel Neural Network Approach for Digital Image Data Encryption/Decryption”, Power, Signals, Controls and Computation (EPSCICON), 2012 International Conference on 3-6 Jan. 2012, pages: 1-4.
[6] Mohammed Abbas Fadhil Al-Husainy, “A Novel Encryption Method for Image Security”, International Journal of Security and Its Applications, vol.6, no.1, January 2012, pages: 1-8.
[7] Anchal Jain, NavinRajpal, “A Two Layer Chaotic Network Based Image Encryption Technique”, Computing and Communication Systems (NCCCS), 2012 National Conference on 21-22 Nov.2012, pages: 1-5.
[8] NidhiSethi, Deepika Sharma, “A New Cryptographic Approach for Image Encryption”, Parallel, Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on 6-8 Dec. 2012, pages: 905-908.
[9] SomdipDey, “SD-AEI: An Advanced Encryption Technique for Images”, Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on 10-12 July 2012, pages: 68-73.
[10] Hazem Mohammad Al-Najjar, “Digital Image Encryption Algorithm Based on Multi-Dimensional Chaotic System and Pixels Location”, International Journal of Computer Theory and Engineering, Vol. 4, No. 3, June 2012, pages: 354-357.
[11] Dattatherya, S. VenkataChalam&Manoj Kumar Singh, “Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP”, International Journal of Image Processing (IJIP), Volume (6), Issue (1), 25 Feb 2012, pages: 13-25.
[12] Pia Singh, Karamjeet Singh, “Image Encryption and Decryption Using Blowfish Algorithm in MATLAB”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013, pages: 150-154.
[13] RiahUkurGinting, Rocky YefrencesDillak, “Digital Color Image Encryption Using RC4 Stream Cipher and Chaotic Logistic Map”, Information Technology and Electrical Engineering (ICITEE), 2013 International Conference on 7-8 Oct. 2013, pages: 101-105.
[14] Gurpreet Singh, Amandeep Kaur, “GS-IES: An Advanced Image Encryption Scheme” International Journal of Engineering Research & Technology, Vol. 2 Issue 9, September – 2013, pages: 465-468.
[15] D. R.Stinson, Cryptography, Theory and Practice. Third edition: Chapman & Hall/CRC, 2006.
[16] William Stallings, Cryptography and Network Security, Principles and Practice. Fifth edition.
[17] ShujiangXu, Yinglong Wang, Jizhi Wang, YucuiGuo, “A Fast Image Encryption Scheme Based on a Nonlinear Chaotic Map”, 2010 2nd International Conference on Signal Processing Systems (ICSPS), 5-7 July 2010, pages: v2-326-v2-330.
[18] Linhua Zhang, Xiaofeng Liao, Xuebing Wang, “An image encryption approach based on chaotic maps”, Chaos, Solitons & Fractals. Volume 24, Issue 3, May 2005, Pages 759–765.
[19] http://en.wikipedia.org/wiki/Histogram
[20] Karl Pearson (1895), "Contributions to the Mathematical Theory of Evolution II, Skew Variation in Homogeneous Material". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 186: 343–414.
[21] XuShujiang Wang Yinglong, GuoYucui Wang Cong, “A Novel Chaos-based Image Encryption Scheme”, International Conference on Information Engineering and Computer Science (ICIECS) 2009, 19-20 Dec. 2009, pages: 1- 4.
[22] http://www.waset.org/journals/waset/v3/v3-7.pdf Analysis and Comparison of Image Encryption Algorithms by IsmetÖztürk and Ibrahim Soukpinar.
[23] Abhinav Srivastava, “A survey report on Different Techniques of Image Encryption”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 6, June 2012, pages: 163-167.
[24] Khaled Loukhaoukha, Jean-Yves Chouinard, and AbdellahBerdai, “A Secure Image Encryption Algorithm Based on Rubik`s Cube Principle”, Journal of Electrical and Computer Engineering, Volume 2012 (2012), Article ID 173931, 13 pages.
[25] J. Bangarraju, V. Rajagopal, and B. Nithin, “Mitigation of supply disturbances using three-leg VSC based DVR from Single Phase P-Q Control Strategy,” in 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015, pp. 1–6.
[26] P. K. Naskar, A. Chaudhuri, and A. Chaudhuri, “A Secure Symmetric Image Encryption Based on Linear Geometry,” in Ieee, 2014, pp. 67–74.
[27] Nurhayati and S. S. Ahmad, “Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm,” in 2016 4th International Conference on Cyber and IT Service Management, 2016, pp. 1–6.
[28] N. Saikumar, R. B. Krishnan, S. Meganathan, and N. R. Raajan, “An encryption approach for security enhancement in images using key based partitioning technologies (ICCPCT), 2016, pp.-1-4.
[29] K. Sivaranjani and P. B. Prabahar, “Mended algorithm for image encryption based on random shuffling technique,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013, pp. 1–4.
[30] C. Torres-Huitzil, “Hardware realization of a lightweight 2D cellular automata-based cipher for image encryption,” in 2013 IEEE 4th Latin American Symposium on Circuits and Systems (LASCAS), 2013, pp. 1–4.
[31] J. Vreugdenhil, K. Iverson, and R. S. Katti, “Image encyption using dynamic shuffling and XORing processes,” in 2009 IEEE International Symposium on Circuits and Systems, 2009, no. 2, pp. 734–737.
[32] M. Bin Younas and J. Ahmad, “Comparative analysis of chaotic and non-chaotic image encryption schemes,” in Proceedings - 2014 International Conference on Emerging Technologies, ICET 2014, 2014, pp. 81–86.