Transposition Based Symmetric Encryption and Decryption Technique for Secured Image Transmission through Internet

被引:0
作者
Roslin, S. Emalda [1 ]
Nandhitha, N. M. [2 ]
Daniel, Anita [3 ]
机构
[1] Sathyabama Univ, Dept E&C, Madras, Tamil Nadu, India
[2] Sathyabama Univ, Fac E&E, Madras, Tamil Nadu, India
[3] Sri Ramanujar Engn Coll, Dept ECE, Madras, Tamil Nadu, India
来源
2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014) | 2014年
关键词
Network security; Image encryption; permutation; Sub image; Correlation index; Entropy;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The role of internet became a non replaceable one in our day to day life. Internet users also face various security threats such as eavesdropping and unauthorized access through intrusion. Internet users need to be protected and provided privacy. Network security and image encryption has become important and high profile issues. Various cryptographic techniques are already available in literature for secured data transmission. Image encryption is still a major area of research with extensive effort being spent in determining a standardized image encryption technique that is difficult for hackers to crack the image. Hence the proposed work aims at developing an effective and standardized image encryption technique. At the transmission side it involves the following steps: subdividing an image in to n number of sub images of p x q, finding a suitable permutation/combination to interchange the pixels, merging the sub images in to a single image and transmitting it. At the receiver side the received encrypted image is subdivided in to n number of sub images of size p x q, the original pixel positions are obtained and the original image is formed. The effectiveness of the technique is measured in terms of correlation index and entropy for different rules of permutation. Finally the most effective permutation is identified which results in lesser correlation index and stronger entropy. The computational complexity of the algorithm is also analyzed.
引用
收藏
页码:1578 / 1583
页数:6
相关论文
共 10 条
  • [1] Han shuihua, 2005, ECTI T COMPUTER INFO, V1, P126
  • [2] jolfae Alireza, J THEORETICAL APPL I, P117
  • [3] Kang X., 2013, EURASIP J IMAGE VIDE, V32, P1
  • [4] Kester Q.-A., 2013, INT J EMERGING TECHN, V3, P496, DOI 10.5120/16500-5752.
  • [5] Kumar K.M., 2010, INT J NETW SECUR APP, V2, P30
  • [6] Mitra A., 2006, International Journal of Computer Science, V1, P1306
  • [7] Rao AA, 2010, INT J COMPUT SCI NET, V10, P295
  • [8] Sadanand Shetty Deepesh, 2013, INT J EMERGING TECHN, V3, P511
  • [9] YAO HX, 2009, INT J NONLINEAR SCI, V7, P379
  • [10] Younes MAB, 2008, INT J COMPUT SCI NET, V8, P191