Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A New Image Encryption Approach using Combinational Permutation Techniques
Authors: A. Mitra, Y. V. Subba Rao, S. R. M. Prasanna
Abstract:
This paper proposes a new approach for image encryption using a combination of different permutation techniques. The main idea behind the present work is that an image can be viewed as an arrangement of bits, pixels and blocks. The intelligible information present in an image is due to the correlations among the bits, pixels and blocks in a given arrangement. This perceivable information can be reduced by decreasing the correlation among the bits, pixels and blocks using certain permutation techniques. This paper presents an approach for a random combination of the aforementioned permutations for image encryption. From the results, it is observed that the permutation of bits is effective in significantly reducing the correlation thereby decreasing the perceptual information, whereas the permutation of pixels and blocks are good at producing higher level security compared to bit permutation. A random combination method employing all the three techniques thus is observed to be useful for tactical security applications, where protection is needed only against a casual observer.Keywords: Encryption, Permutation, Good key, Combinationalpermutation, Pseudo random index generator.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1081199
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2237References:
[1] A. J. Elbirt and C. Paar, "An Instruction-Level Distributed Processor for Symmetric-Key Cryptography," IEEE Trans. Parallel and distributed systems, vol. 16, no. 5, pp. 468-480, May 2005.
[2] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[3] W. Stallings, Cryptography and Network Security. Englewood Cliffs, NJ: Prentice Hall, 2003.
[4] E. Besdok, "Hiding information in multispectral spatial images," Int. J. Electron. Commun. (AEU) 59, pp. 15-24, 2005.
[5] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746- 757, Feb. 2005.
[6] Y. Wu, "On the Security of an SVD-Based Ownership Watermarking," IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624-627, Aug. 2005.
[7] Y. T. Wu and F. Y. Shih, "An adjusted-purpose digital watermarking technique," Pattern Recognition 37, pp. 2349-2359, 2004.
[8] A. Masoud and A. H. Tewfik, "Geometric Invariance in Image Watermarking," IEEE Trans. Image Processing, vol. 13, no. 2, pp. 145-153, Feb. 2004.
[9] S. S. Maniccam and N. G. Bourbakis,"Image and video encryption using scan patterns," Pattern Recognition 37, pp. 725-737, 2004.
[10] P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet Multimedia Applications," IEEE Trans. Consumer Electronics, vol. 46, no. 3, pp. 395-403, Aug. 2000.
[11] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129, March 2003.
[12] L. T.Wang and E. J. McCluskey, "Linear Feedback Shift Register Design Using Cyclic Codes," IEEE Trans. Computers, vol. 37, no. 10, pp. 1302- 1306, Oct. 1988.
[13] A. Fuster and L. J. Garcia, "An efficient algorithm to generate binary sequences for cryptographic purposes," Theoretical Computer Science 259, pp. 679-688, 2001.
[14] S. R. M. Prasanna et. al., "Study of Permutations in the Context of Speech Privacy," in Proc. ECCAP 2000, Chennai, Jan. 2000, pp. 99- 106.