A Novel Encryption Method for Image Security (original) (raw)

Image Encryption Using Permutation and Rotational XOR Technique

Computer Science & Information Technology ( CS & IT ), 2012

Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. In this paper, we introduce an algorithm. The binary code of the pixel values of a colour image is extracted and permuted according to the entered 8 bit key which is followed by the permutation of every 8 consecutive pixels [4]. The image is further divided into blocks which are shifted accordingly. The above mentioned technique has a few drawbacks, like the small key size. To further enforce the encryption another method is appended to it which requires a 43 digit key. The encryption takes a total of 10 rounds in which two keys are use, both of which are derived from the 43 digit entered key. The results showed that the correlation between image elements was significantly decreased by using the proposed technique.

A Secure Symmetric Image Encryption Based on Bit-wise Operation

International Journal of Image, Graphics and Signal Processing, 2014

This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides additional protection of the secret data. The substitution and transposition are done using dynamic substitution box (SBOX) and transposition box (TBOX) which are generated using the secret key and made to vary for each block during ciphering. The size of encrypted data is same as the size of secret data and the proposed scheme has been tested using different images. We have also presented the security analysis such as key sensitivity analysis, statistical analysis, and differential analysis to prove the strength of our algorithm against crypto analysis.

A New Approach For Image Cryptography Techniques

With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access.The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm .a combination of four S -boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.

An Image Encryption Algorithm with XOR and S-box

2015

This new algorithm performs lossless image encryption by combining variable-length key-dependent XOR encryption with S-box substitution. This algorithm was implemented and tested by performing different permutations of XOR encryption and S-box substitution. Empirical analysis using different types of test images of different sizes showed that this new algorithm is effective and resistant to statistical attacks. The idea presented by this algorithm may be generalized to apply to input data other than images, and may be combined with other encryption methods.

Image Encryption Using Random Scrambling And XOR Operation

International journal of engineering research and technology, 2013

This paper aims at improving the level of security and secrecy provided by the digital gray scale image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. Since the pixel of image is highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be practically predicted from a value of its neighbors. So there is a need of a technique that can shuffle the pixels to reduce the correlation between the neighbor pixels. Hence we used Scrambling technique that Shuffles the pixels of image .This Scrambled image is called transformed image. The transformed image then divided into 2 pixels x 2 pixels blocks and each block is encrypted using XOR operation by four 8-bit keys. The total size of key in our algorithm is 32 bit long which proves to be strong enough. The proposed encryption algorithm in this study has been tested on some Gray Scale images and showed good results.

Analysis of Data Hiding Techniques in Encrypted Images-A Survey

2013

As the use digital techniques for transmitting and storing images are increasing; it is becoming an important issue how to protect the confidentiality, integrity and authenticity of images. This study paper extends to the performance parameters used in encryption processes and analyzing on their security issues which have been developed and are in practice today.

Security Analysis of XOR Based Ciphered Image

Asian Journal of Computer Science and Technology, 2018

In the present paper, we report security analysis of an effective method of scrambling i.e. XOR technique, which may be used as an important component in visual cryptography. Histogram of scrambled or encrypted images expressed that pixel values are distributed quite uniformly. This implies that nothing can be guessed about the original image using the encrypted image. For analyzing the complexity of encrypted images, information entropy, the correlation coefficient of adjacent pixels values were also calculated. Values of horizontal correlation, vertical correlation, and information entropy reflected that the complexity and randomness of pixel values are quite high for XOR cipher. Now a day's differential attack has been very common. Keeping the same in the mind, we have calculated Unified Average Changing Intensity (UACI) and the Number of Pixels Change Rate (NPCR), to exhibit the ability of encrypted image using XOR cipher to resist the differential attack. So we can say that XOR cipher is useful for secure transmission of an image.

A Survey Report on Image Encryption Techniques

2013

In these days as multimedia data transferred over insecure channel, it becomes an important issue to encrypt image with a suitable image encryption algorithms. An image encryption is different from text due to large processing, pixels definition, time to encrypt and size. This is also a different approach due to different type of attacks possible on text and image data. In this paper we study some encryption technique on the basis of their classification. Major technique are classified in different categories are, (I) Pixel Position permutation based algorithm, (II) value transformation based algorithm and (III) visual transformation based algorithm. We aim to frame this paper as literature survey of these classifications.

A New Secure Image Encryption Algorithm using Logical and Visual Cryptography Algorithms and based on Symmetric Key Encryption

Image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. There are many image encryption schemes have been proposed, each one of them has its strength and weakness. In this paper I suggested a new, secure and robust cryptography algorithm to prevent unauthorized access to contents of encrypted images. The main features of cryptography algorithm defined in this article are logical cryptography and visual cryptography together, the ability to encrypt the secret image in successive stages, changing the physical structure of the secret image, no limitation for the number of keys, using logical operation, creating six keys, Interdependence of all keys in all stages of encrypting and decrypting, bigger changes in the physical structure of the encrypted image In case of wrong decryption and to make the resulting keys and encrypted image unique after the cryptography process.