Open Access   Article Go Back

Two-Level Image Encryption Algorithm Based On Key-Image

V. Sridhar1 , M. Dyna2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 999-1008, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.9991008

Online published on Aug 31, 2018

Copyright © V. Sridhar, M. Dyna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Sridhar, M. Dyna, “Two-Level Image Encryption Algorithm Based On Key-Image,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.999-1008, 2018.

MLA Style Citation: V. Sridhar, M. Dyna "Two-Level Image Encryption Algorithm Based On Key-Image." International Journal of Computer Sciences and Engineering 6.8 (2018): 999-1008.

APA Style Citation: V. Sridhar, M. Dyna, (2018). Two-Level Image Encryption Algorithm Based On Key-Image. International Journal of Computer Sciences and Engineering, 6(8), 999-1008.

BibTex Style Citation:
@article{Sridhar_2018,
author = {V. Sridhar, M. Dyna},
title = {Two-Level Image Encryption Algorithm Based On Key-Image},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {999-1008},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2807},
doi = {https://doi.org/10.26438/ijcse/v6i8.9991008}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.9991008}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2807
TI - Two-Level Image Encryption Algorithm Based On Key-Image
T2 - International Journal of Computer Sciences and Engineering
AU - V. Sridhar, M. Dyna
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 999-1008
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
564 230 downloads 260 downloads
  
  
           

Abstract

In the contemporary world images play key role in information interchange. Medical, defence, space and various areas of domain make use of high scale images in several applications. Security becomes the main concern wherein the images are to be protected so that they cannot be seen by any advisory. This can be achieved by image encryption. There are various image encryption methods that are based on textual key and text data which are not efficient for high definition images. In this paper we propose a three step image encryption algorithm which uses another image as a key. In the first step, key image is scaled and tiled, in step2 encryption is achieved using grey-value substitution and in step-3 the output generated from step-2 is scrambled using Fibonacci transformation to add additional security. This multistep encryption provides high security for images. The performance of this algorithm is analyzed using different attack models which results in high security without any loss of input image.

Key-Words / Index Term

Image security, Cryptography, Network security, Image processing

References

[1] Y. Zhou, K. Panetta and S. Agaian, "Image encryption using binary key-images," 2009 IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, 2009, pp. 4569-4574. doi: 10.1109/ICSMC.2009.5346780
[2] Y. Zhou, K. Panetta and S. Agaian, "Comparison of recursive sequence based image scrambling algorithms," 2008 IEEE International Conference on Systems, Man and Cybernetics, Singapore, 2008, pp. 697-701. doi:10.1109/ICSMC.2008.4811359
[3] Yicong Zhou, Sos Agaian, Valencia M. Joyner, Karen Panetta, "Two Fibonacci P-code based image scrambling algorithms", Proc. SPIE 6812, Image Processing: Algorithms and Systems VI, 681215 (3 March 2008); doi:10.1117/12.766591
[4] Jiancheng Zou, R. K. Ward and Dongxu Qi, "A new digital image scrambling method based on Fibonacci numbers," 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), 2004, pp.III-965-8Vol.3. doi:10.1109/ISCAS.2004.1328909
[5] K. C. Iyer and A. Subramanya, "Image Encryption by Pixel Property Separation," Cryptology ePrint Archive, 2009.
[6] M. Yang, N. Bourbakis, and S. Li, "Data-image-video encryption," Potentials, IEEE, vol. 23, no. 3, pp. 28-34,2004.
[7] J. Zou, R. K. Ward, and D. Qi, "A new digital image Scrambling method based on Fibonacci numbers," in Circuits and Systems, 2004. ISCAS `04. Proceedings of the 2004 International Symposium on, 2004 pp. III-965-8 Vol.3.
[8] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[9] Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., "Performance Analysis of Self Adaptive Image Encryption Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.44-58, 2017.
[10] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.