A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding

被引:17
作者
Azam, Naveed Ahmed [1 ]
机构
[1] GIK Inst Engn Sci & Technol, Fac Engn Sci, Topi, Pakistan
关键词
IMAGE; SCHEME; STEGANOGRAPHY; CRYPTANALYSIS; ALGORITHM;
D O I
10.1155/2017/5790189
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel image encryption technique based on multiple right translated AES Gray S-boxes (RTSs) and phase embedding technique. First of all, a secret image is diffused with a fuzzily selected RTS. The fuzzy selection of RTS is variable and depends upon pixels of the secret image. Then two random masks are used to enhance confusion in the spatial and frequency domains of the diffused secret image. These random masks are generated by applying two different RTSs on a host image. The decryption process of the proposed cryptosystem needs the host image for generation of masks. It is therefore, necessary, to secure the host image from unauthorized users. This task is achieved by diffusing the host image with another RTS and embedding the diffused secret image into the phase terms of the diffused host image. The cryptographic strength of the proposed security systemismeasured by implementing it on several images and applying rigorous analyses. Performance comparison of the proposed security technique with some of the state-of-the-art security systems, including S-box cryptosystem and steganocryptosystems, is also performed. Results and comparison show that the newly developed cryptosystem is more secure.
引用
收藏
页数:9
相关论文
共 38 条
  • [1] Al-Assam H, 2013, INT CONF INTERNET, P369, DOI 10.1109/ICIST.2013.6747573
  • [2] Bahjat H., 2014, INT J COMPUTER APPL, V89, P7
  • [3] Bloisi Domenico, 2007, VISAPP 2007. Second International Conference on Computer Vision Theory and Applications, P127
  • [4] Challita Khalil, 2011, International Journal of New Computer Architectures and their Applications, V1, P199
  • [5] New image steganographic methods using run-length approach
    Chang, Chin-Chen
    Lin, Chih-Yang
    Wang, Yu-Zheng
    [J]. INFORMATION SCIENCES, 2006, 176 (22) : 3393 - 3408
  • [6] A virtual image cryptosystem based upon vector quantization
    Chen, TS
    Chang, CC
    Hwang, MS
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) : 1485 - 1488
  • [7] Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation
    Chen, Wen-Yuan
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (01) : 432 - 448
  • [8] Chuang C. H., 2010, INT J IMAGE PROCESSI, V3, P318
  • [9] Optical image cryptosystem based on adaptive steganography
    Chuang, Cheng-Hung
    Lin, Guo-Shiang
    [J]. OPTICAL ENGINEERING, 2008, 47 (04)
  • [10] Courtois NT, 2002, LECT NOTES COMPUT SC, V2501, P267