Open Access   Article Go Back

Color Image Encryption using Single Layer Artificial Neural Network and Buffer Shuffling

Dipankar Dey1 , Soumen Paul2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 202-211, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.202211

Online published on Mar 31, 2019

Copyright © Dipankar Dey, Soumen Paul . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dipankar Dey, Soumen Paul, “Color Image Encryption using Single Layer Artificial Neural Network and Buffer Shuffling,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.202-211, 2019.

MLA Style Citation: Dipankar Dey, Soumen Paul "Color Image Encryption using Single Layer Artificial Neural Network and Buffer Shuffling." International Journal of Computer Sciences and Engineering 7.3 (2019): 202-211.

APA Style Citation: Dipankar Dey, Soumen Paul, (2019). Color Image Encryption using Single Layer Artificial Neural Network and Buffer Shuffling. International Journal of Computer Sciences and Engineering, 7(3), 202-211.

BibTex Style Citation:
@article{Dey_2019,
author = {Dipankar Dey, Soumen Paul},
title = {Color Image Encryption using Single Layer Artificial Neural Network and Buffer Shuffling},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {202-211},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3819},
doi = {https://doi.org/10.26438/ijcse/v7i3.202211}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.202211}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3819
TI - Color Image Encryption using Single Layer Artificial Neural Network and Buffer Shuffling
T2 - International Journal of Computer Sciences and Engineering
AU - Dipankar Dey, Soumen Paul
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 202-211
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
798 441 downloads 170 downloads
  
  
           

Abstract

An image encryption is a traditional way to hide original image to an adversary in the case of secure image transmission. In this regard, the Artificial Neural Network (ANN) can be used in digital communication systems (digital image transmission) to achieve a secure and reliable data transmission. However, we have designed a new scheme that encrypts a color image, which can be used in secure image transmission. This proposed scheme is divided into three steps, (a) we subdivide the color image into R (red), G (green) and B (blue) factors, and using the chaotic map, we randomly shuffle these RGB factors to get first encrypted image; (b) we process the first encrypted image through the single-layer artificial neural network to get the second encrypted image; and (c) pixels of the second encrypted image are shuffled using exclusive-or (XOR) operation to get the final encrypted image, which can be transmitted over insecure channel. Furthermore, we have examined the proposed scheme on some standard color images each of size 512 × 512. The several security study and experimental outcomes indicate that the proposed scheme can protect from several statistical attacks like Plaintext Attack, Cipher text Attacks, Brute Force Attack, and Birthday Attack etc.

Key-Words / Index Term

Encryption, RGB buffer shuffle, Artificial Neural Network, Attacks

References

[1] W. Yao, X. Zhang, Z. Zheng and W. Qiu, “A color image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems”, Non-linear Dynamics, Vol. 81, pp. 151-168, 2015.
[2] X. J. Tong, Z. Wang, M. Zhang, Y. Liu, H. Xu and J. Ma, “An image encryption algorithm based on the perturbed high-dimensional chaotic map”, Nonlinear Dynamics, Vol. 80, pp. 1493-1508, 2015.
[3] A. Kanso and M. Ghebleh, “An efficient and robust image encryption scheme for medical applications”, Commun Nonlinear Sci Numer Simulat, Vol. 24, pp. 98-116, 2015.
[4] M. Chauhan and R. Prajapati, “Image encryption using chaotic based artificial neural network”, International Journal of Scientific Engineering Research, Vol. 5, pp. 2229-5518, 2014.
[5] Dr. S. Ramakrishnan, R. R. Rakshitha, V.Gayathiri and P.Kalaiyarasi, “Neural network based image encryption and authentication using chaotic maps”, International Journal of Current Trends in Engineering Research, Vol. 3, pp. 29-37, 2017.
[6] P. Alfke, “Efficient Shift Registers, LFSR Counters, and Long Pseudo-Random Sequence Generators”, XAPP 052, (Version 1.1), July 7,1996.
[7] H. Bahjat and M. A. Salih, “Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices”, International Journal of Computer Applications, Vol. 89, pp. 0975-8887, 2014.
[8] Q. A. Kester, “Image Encryption based on the RGB PIXEL Transposition and Shuffling”, I. J. Computer Network and Information Security, Vol. 7, pp. 43-50, 2013.
[9] W. S. Yap, R. C. W. Phan, W. C. Yau, S. H. Heng “Cryptanalysis of a new image alternate encryption algorithm based on chaotic map”, Nonlinear Dynamics, Vol. 80, pp. 483-1491, 2015.
[10] R. Rhouma, S. Meherzi and S. Belghith “OCML-based colour image encryption”, Science Direct, Vol. 40, pp. 309-318, 2009.
[11] L. M. Jawad and G. Sulong “Chaotic map-embedded Blowfish algorithm for security enhancement of color image encryption”, Nonlinear Dynamics, Vol. 81, pp. 2079-2093, 2015.
[12] D. Arroyo, S. Li, J. M. Amigoc, G. Alvarez and R. Rhouma “Comment on - Image encryption with chaotically coupled chaotic maps”, Science Direct, Vol. 239, pp. 1002-1006, 2010.
[13] C. K. Huang and H. H. Nien “Multi chaotic systems based pixel shuffle for image encryption”, Science Direct, Vol. 282, pp. 2123-2127, 2009.
[14] L. Hongjun and W. Xingyuan “Color image encryption based on one-time keys and robust chaotic maps”, Science Direct, Vol. 59, pp. 3320-3327, 2010.
[15] C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez and G. Chen “On the security defects of an image encryption scheme”, Science Direct, Vol. 27, pp. 1371-1381, 2009.
[16] W. Chen and X. Chen “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain”, Science Direct, Vol. 284, pp. 3913-3917, 2011.
[17] N. R. Kumar , G. Manikandan , R. B. Krishnan , N. R. Raajan and N. Sairam “A reversible visual cryptography technique for color images using Galois field arithmetic”, Biomedical Research, Vol. 28 (5), pp. 2036-2039, 2017.
[18] S. N. Lagmiri , N. E. Alami and J. E. Alami “Color and gray images encryption algorithm using chaotic systems of different dimensions ”, IJC-SNS International Journal of Computer Science and Network Security, Vol. 18, pp. 1, 2018.
[19] S. Banerjee, L. Rondoni, S. Mukhopadhyay and A. P. Misra “Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption ”, Optics Communications, Vol. 284, pp. 2278-2291, 2011.
[20] M. Joshi, C. Shakher and K. Singh “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys ”, Optics Communications, Vol. 283, pp. 2496-2505, 2001.
[21] Y. Tang, Z. Wanga and J. A. Fang, “Image encryption using chaotic coupled map lattices with time-varying delays”, Commun Nonlinear Sci Nu-mer Simulat, Vol. 15, pp. 2456-2468, 2010.
[22] L. Hongjun and W. Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”, Computers and Mathematics with Applications, Vol. 59, pp. 3320-3327, 2010.
[23] W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain”, Optics Communications, Vol. 284, pp. 3913-3917, 2011.
[24] Jyotsna, A. Papola, “An Image Encryption Using Chaos Algorithm Based on GLCM and PCA”, International Journal of Computer Sciences and Engineering, Vol. 6(3), pp. 76-81, 2018.
[25] M. Dasgupta, J. K. Mandal, “Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS)”, International Journal of Computer Sciences and Engineering, Vol. 4(6), pp. 65-70, 2016.