An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption

被引:0
作者
Younes, Mohammad Ali Bani [1 ]
Jantan, Aman [1 ]
机构
[1] Univ Sains Malaysia Comp Sci, George Town, Malaysia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 04期
关键词
Image Correlation; Image encryption; Image entropy; Image histogram; Permutation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textual data may not be suitable for multimedia data. In most of the natural images the values of the neighboring pixels are strongly correlated. This means that the value of any given pixel can be reasonably predicted from the values of its neighbors. In this paper, we introduce a new permutation technique based on the combination of image permutation and a well known encryption algorithm called RijnDael. The original image was divided into 4 pixels x 4 pixels blocks, which were rearranged into a permuted image using a permutation process presented here, and then the generated image was encrypted using the RijnDael algorithm. The results showed that the correlation between image elements was significantly decreased by using the combination technique and higher entropy was achieved.
引用
收藏
页码:191 / 197
页数:7
相关论文
共 50 条
  • [41] A chaotic color image encryption using integrated bit-level permutation
    Teng, Lin
    Wang, Xingyuan
    Meng, Juan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (06) : 6883 - 6896
  • [42] Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
    Ahmad, Musheer
    Ahmad, Faiyaz
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 481 - 488
  • [43] Image encryption using permutation generated by modified Regula-Falsi method
    Aakash Paul
    Shyamalendu Kandar
    Bibhas Chandra Dhara
    [J]. Applied Intelligence, 2022, 52 : 10979 - 10998
  • [44] Image encryption using a novel hybrid chaotic map and dynamic permutation−diffusion
    Atul Kumar
    Mohit Dua
    [J]. Multimedia Tools and Applications, 2024, 83 : 32789 - 32812
  • [45] A chaotic color image encryption using integrated bit-level permutation
    Lin Teng
    Xingyuan Wang
    Juan Meng
    [J]. Multimedia Tools and Applications, 2018, 77 : 6883 - 6896
  • [46] Image Encryption Technique for Improvement of Image Security
    Devade, Sanket Pandurang
    Metkar, Shilpa P.
    [J]. AMBIENT COMMUNICATIONS AND COMPUTER SYSTEMS, RACCCS 2017, 2018, 696 : 671 - 682
  • [47] Image encryption using memristive hyperchaos
    Lai, Qiang
    Liu, Yuan
    Yang, Liang
    [J]. APPLIED INTELLIGENCE, 2023, 53 (19) : 22863 - 22881
  • [48] Image Encryption using an Image Pattern based on Advanced Encryption Standard
    Ruelas Quenaya, Merisabel
    Villa-Herrera, Alejandro-Antonio
    Chambi Ytusaca, Samuel Felipe
    Yauri Ituccayasi, Julio Enrique
    Velazco-Paredes, Yuber
    Flores-Quispe, Roxana
    [J]. 2021 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2021,
  • [49] Image Encryption Using Genetic Algorithm
    Afarin, Roza
    Mozaffari, Saeed
    [J]. 2013 8TH IRANIAN CONFERENCE ON MACHINE VISION & IMAGE PROCESSING (MVIP 2013), 2013, : 441 - 445
  • [50] Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard
    Zhang, Xiaoqiang
    Wang, Xuesong
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (09):