An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption

被引:0
作者
Younes, Mohammad Ali Bani [1 ]
Jantan, Aman [1 ]
机构
[1] Univ Sains Malaysia Comp Sci, George Town, Malaysia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 04期
关键词
Image Correlation; Image encryption; Image entropy; Image histogram; Permutation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textual data may not be suitable for multimedia data. In most of the natural images the values of the neighboring pixels are strongly correlated. This means that the value of any given pixel can be reasonably predicted from the values of its neighbors. In this paper, we introduce a new permutation technique based on the combination of image permutation and a well known encryption algorithm called RijnDael. The original image was divided into 4 pixels x 4 pixels blocks, which were rearranged into a permuted image using a permutation process presented here, and then the generated image was encrypted using the RijnDael algorithm. The results showed that the correlation between image elements was significantly decreased by using the combination technique and higher entropy was achieved.
引用
收藏
页码:191 / 197
页数:7
相关论文
共 50 条
  • [31] Medical image encryption based on improved ElGamal encryption technique
    Laiphrakpam, Dolendro Singh
    Khumanthem, Manglem Singh
    OPTIK, 2017, 147 : 88 - 102
  • [32] Comment on 'A technique for image encryption using digital signature'
    Encinas, L. Hernandez
    Dominguez, A. Peinado
    OPTICS COMMUNICATIONS, 2006, 268 (02) : 261 - 265
  • [33] Provable image encryption scheme via trapdoor permutation
    Li, Dongmei
    Liu, Haikuan
    IET IMAGE PROCESSING, 2023, 17 (05) : 1355 - 1363
  • [34] Image encryption scheme based on double permutation and DNA
    Zhang, Xuncai
    Di, Jiali
    Niu, Ying
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (19) : 57291 - 57316
  • [35] An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
    Chen, Jun-xin
    Zhu, Zhi-liang
    Fu, Chong
    Zhang, Li-bo
    Zhang, Yushu
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 23 (1-3) : 294 - 310
  • [36] Color image encryption based on joint permutation and diffusion
    Li, Taiyong
    Shi, Jiayi
    Zhang, Duzhong
    JOURNAL OF ELECTRONIC IMAGING, 2021, 30 (01)
  • [38] An Image Encryption Scheme with Efficient Permutation and Diffusion Processes
    Ye, Ruisong
    ADVANCES IN COMPUTER SCIENCE AND EDUCATION APPLICATIONS, PT II, 2011, 202 : 32 - 39
  • [39] Image encryption using permutation generated by modified Regula-Falsi method
    Paul, Aakash
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    APPLIED INTELLIGENCE, 2022, 52 (10) : 10979 - 10998
  • [40] An efficient chaotic image encryption scheme using simultaneous permutation–diffusion operation
    Qingxin Sheng
    Chong Fu
    Zhaonan Lin
    Junxin Chen
    Lin Cao
    Chiu-Wing Sham
    The Visual Computer, 2024, 40 : 1643 - 1658