A Novel Image Encryption Technique Based on Inter Block Difference

被引:1
作者
Thamanam S.R. [1 ]
Nagaraja P. [1 ]
Naik B.B. [1 ]
Manjunathachari K. [1 ]
机构
[1] Department of EECE, Gandhi Institute of Technology and Management, Hyderabad, 502329, Telangana
关键词
advanced encryption standard (AES); decryption; encryption; inter block difference; TP; 309.7;
D O I
10.1007/s12204-021-2318-0
中图分类号
学科分类号
摘要
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner. © 2021, Shanghai Jiao Tong University and Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:488 / 493
页数:5
相关论文
共 11 条
[1]  
El Abbadi N.K., Mohamad A., Abdulhameed M., Image encryption based on singular value decomposition [J], Journal of Computer Science, 10, 7, pp. 1222-1230, (2014)
[2]  
Naskar P.K., Chaudhuri A., Chaudhuri A., A secure symmetric image encryption based on linear geometry [C], 2014 Applications and Innovations in Mobile Computing, pp. 67-74, (2014)
[3]  
Ye R.S., Zeng S.J., Lun P.Q., Et al., An image encryption scheme based on bit circular shift and bidirectional diffusion [J], International Journal of Information Technology and Computer Science, 6, 1, pp. 82-92, (2014)
[4]  
Kr N.P., Chaudhuri A., A secure symmetric image encryption based on bit-wise operation [J], International Journal of Image, Graphics and Signal Processing, 6, 2, pp. 30-38, (2014)
[5]  
Chen J.X., Zhu Z.L., Liu Z.J., Et al., A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J], Optics Express, 22, 6, pp. 7349-7361, (2014)
[6]  
Alghamdi A.S., Ullah H., A secure Iris image encryption technique using bio-chaotic algorithm [J], International Journal of Computer and Network Security, 2, 4, pp. 78-84, (2010)
[7]  
Alghamdi A.S., Ullah H., Mahmud M., Et al., Bio-chaotic stream cipher-based Iris image encryption [C], 2009 International Conference on Computational Science and Engineering, pp. 739-744, (2009)
[8]  
Sun Y.Y., Chen L.N., Xu R.D., Et al., An image encryption algorithm utilizing Julia sets and Hilbert curves [J], PLoS One, 9, 1, (2014)
[9]  
Dawahdeh Z.E., Yaakob S.N., Razif Bin Othman R., A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J], Journal of King Saud University-Computer and Information Sciences, 30, 3, pp. 349-355, (2018)
[10]  
Yasser I., Khalifa F., Mohamed M.A., Et al., A new image encryption scheme based on hybrid chaotic maps [J], Complexity, 2020, pp. 1-23, (2020)