Calculus Logarithmic Function for Image Encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Calculus Logarithmic Function for Image Encryption

Authors: Adil AL-Rammahi

Abstract:

When we prefer to make the data secure from various attacks and fore integrity of data, we must encrypt the data before it is transmitted or stored. This paper introduces a new effective and lossless image encryption algorithm using a natural logarithmic function. The new algorithm encrypts an image through a three stage process. In the first stage, a reference natural logarithmic function is generated as the foundation for the encryption image. The image numeral matrix is then analyzed to five integer numbers, and then the numbers’ positions are transformed to matrices. The advantages of this method is useful for efficiently encrypting a variety of digital images, such as binary images, gray images, and RGB images without any quality loss. The principles of the presented scheme could be applied to provide complexity and then security for a variety of data systems such as image and others.

Keywords: Linear Systems, Image Encryption, Calculus.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1092538

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2405

References:


[1] P. P. Dang, and P. M. Chau, "Image encryption for secure Internet multimedia applications, Consumer Electronics”, IEEE Transactions on Image Processing, 46(3), 2000, pp. 395-403.
[2] M. A. B. Younes and A. Jantan, "Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 35:1, 2003, pp. 1-8.
[3] Y. Mao, G. Chen, S. Lian, "A Novel Fast Image Encryption Scheme Based On 3d Chaotic Baker Maps”, International Journal of Bifurcation and Chaos, Vol. 14, No. 10, pp. 3613-3624.
[4] Y. Wu, ,Y. Zhou, J. P. Noonan, K. Panetta, S. Agaian, "Image Encryption using the Sudoku Matrix”, Mobile Multimedia/Image Processing, Security, and Applications, 2010, pp. 1-12.
[5] J. Kushwaha and B. N. Roy, "Secure Image Data by Double encryption”, International Journal of Computer Applications, 5(10), 2010, pp. 28-32.
[6] A. S. Alghamdi and Hanif Ullah, "A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm”, International Journal of Computer and Network Security, 2(4), 2010, pp. 78-84.
[7] A. Jolfaei and A. Mirghadri, "Survey: Image Encryption Using Salsa20”, International Journal of Computer Science Issues, 7(5), 2010, pp. 213-220.
[8] R. Ye and W. Zhou, "An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice”, International Journal of Information and Communication Technology Research, 1(8), 2011, pp. 344-348.
[9] S. Dey, "An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES", International Journal of Cyber-Security and Digital Forensics, 1(2), 2012, pp. 82-88.
[10] I. Landge, B. Contractor, A. Patel, and R. Choudhary, "Image encryption and decryption using blowfish algorithm", World Journal of Science and Technology, 2(3), 2012, pp. 151-156.
[11] M. A. F. Al-Husainy, "A Novel Encryption Method for Image Security", International Journal of Security and Its Applications, 6(1) , 2012, pp. 1-8.
[12] M.A. Shreef and H. K. Hoomod , "Image Encryption Using Lagrange-Least Squares Interpolation", International Journal of Advanced Computer Science and Information Technology , 2(4), 2013, pp. 35-55.
[13] R. Ye, "A Highly Secure Image Encryption Scheme using Compound Chaotic Maps", Journal of Emerging Trends in Computing and Information Sciences, 4(6), 2013, pp. 532 – 544.
[14] A. AL-Rammahi, "Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers", To be published at The International Conference of Applied and Engineering Mathematics, World Congress on Engineering, International Association of Engineers, London , 2-4 July 2014.
[15] N. Al-Ebadi, A. AL-Rammahi, and M. Al-Kufi, "Image Encryption Based on Singular Value Decomposition", Journal of Computer Science 10 (7), 2014, pp. 1222-1230.