Raise the Strength of Cryptosystem Using Variety Effects (original) (raw)
Related papers
A Novel Encryption Method for Image Security
Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing the two Boolean operations: XOR and Rotation that are done on the bits of the pixels in the image. This method is implemented by firstly doing a sequential XOR operation on all the bits of pixels in the image, and secondly makes a circular rotate right of these bits. These two operations are repeated many times during the encryption phase. The security and performance of the proposed encryption method have been evaluated by applying it on images and analyze the recorded results using key space analysis, key sensitivity analysis, and statistical analysis. The performance experiments show that the proposed method is promising to use effectively in wide fields of image encryption.
A Survey Report on Image Encryption Techniques
2013
In these days as multimedia data transferred over insecure channel, it becomes an important issue to encrypt image with a suitable image encryption algorithms. An image encryption is different from text due to large processing, pixels definition, time to encrypt and size. This is also a different approach due to different type of attacks possible on text and image data. In this paper we study some encryption technique on the basis of their classification. Major technique are classified in different categories are, (I) Pixel Position permutation based algorithm, (II) value transformation based algorithm and (III) visual transformation based algorithm. We aim to frame this paper as literature survey of these classifications.
Image Encryption Using Permutation and Rotational XOR Technique
Computer Science & Information Technology ( CS & IT ), 2012
Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. In this paper, we introduce an algorithm. The binary code of the pixel values of a colour image is extracted and permuted according to the entered 8 bit key which is followed by the permutation of every 8 consecutive pixels [4]. The image is further divided into blocks which are shifted accordingly. The above mentioned technique has a few drawbacks, like the small key size. To further enforce the encryption another method is appended to it which requires a 43 digit key. The encryption takes a total of 10 rounds in which two keys are use, both of which are derived from the 43 digit entered key. The results showed that the correlation between image elements was significantly decreased by using the proposed technique.
IJERT-A Survey Report on Image Encryption Techniques
International Journal of Engineering Research and Technology (IJERT), 2013
https://www.ijert.org/a-survey-report-on-image-encryption-techniques https://www.ijert.org/research/a-survey-report-on-image-encryption-techniques-IJERTV2IS101165.pdf In these days as multimedia data transferred over insecure channel, it becomes an important issue to encrypt image with a suitable image encryption algorithms. An image encryption is different from text due to large processing, pixels definition, time to encrypt and size. This is also a different approach due to different type of attacks possible on text and image data. In this paper we study some encryption technique on the basis of their classification. Major technique are classified in different categories are, (I) Pixel Position permutation based algorithm, (II) value transformation based algorithm and (III) visual transformation based algorithm. We aim to frame this paper as literature survey of these classifications.
A New Approach For Image Cryptography Techniques
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access.The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm .a combination of four S -boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.
A New Cryptographic Strategy for Digital Images Article Info ABSTRACT Corresponding Author
Journal of Electrical Engineering, 2014
In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features.
A Survey and Analysis of the Image Encryption Methods
At the present time, the protection of multimedia data has become a very important process which can be achieved by encryption. Basically, so many different techniques have been used to protect private image data from those who illegally try to have access. An efficient cryptographic scheme is one that has a space of a large key that resists brute force search time, less execution time complexity/ Highspeed and should be able to provide high confusion and diffusion for good security. In this paper, we survey an existing work which uses classic and modern techniques for image encryption, as the classic techniques used for text based on alphabets as basic elements while the modern techniques overcome this limitation by used mathematical algorithms for coding the information due to their digital system. A comparison has been conducted between several ciphers techniques (classic and modern) for images based on various parameters such as: Histogram, Correlation, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Peak Signal to Noise Ratio (PSNR), Entropy and Time complexity. An analysis of simulation result shows that chaotic encryption technique especially hyper-chaotic is the most efficient among the all.
Image Based Encryption Techniques : A Review
2014
Now a day’s rapid increasing growth of internet and multimedia data, security is main problem in storage and communication of images. The solution of this multimedia data can be solved by using encryption. There are various techniques available to protect the image data from unauthorized access. In this paper, authors reviewed different existing techniques of image encryption and also discussed the basic knowledge of Cryptography. Keywords— Chaotic Map, Cryptography, Decryption, Encryption, SCAN pattern, Security.
A Secure Symmetric Image Encryption Based on Bit-wise Operation
International Journal of Image, Graphics and Signal Processing, 2014
This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides additional protection of the secret data. The substitution and transposition are done using dynamic substitution box (SBOX) and transposition box (TBOX) which are generated using the secret key and made to vary for each block during ciphering. The size of encrypted data is same as the size of secret data and the proposed scheme has been tested using different images. We have also presented the security analysis such as key sensitivity analysis, statistical analysis, and differential analysis to prove the strength of our algorithm against crypto analysis.