Image encryption using sequence generated by cyclic group

被引:49
|
作者
Kandar, Shyamalendu [1 ]
Chaudhuri, Dhaibat [2 ]
Bhattacharjee, Apurbaa [2 ]
Dhara, Bibhas Chandra [2 ]
机构
[1] Indian Inst Engn Sci & Technol Shibpur, Dept Informat Technol, Howrah 711103, India
[2] Jadavpur Univ, Dept Informat Technol, Salt Lake Campus, Kolkata 700098, India
关键词
Image encryption; Non-chaotic method; Permutation; Multiplicative cyclic group; Generator of cyclic group; FRACTIONAL FOURIER-TRANSFORM; CHAOS-BASED IMAGE; SELF-ADAPTIVE PERMUTATION; COUPLED MAP; SCHEME; ALGORITHM; CRYPTANALYSIS; OPERATION; COMPRESSION; DIFFUSION;
D O I
10.1016/j.jisa.2018.12.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image encryption using permutation is gaining its popularity over general encryption schemes like AES, DES, RSA etc., due to its high security, less time complexity using reasonable computational overheads. Mainly chaotic functions are employed in permutation based techniques to define a sequence, based on which the pixels or bits of an image are permuted. In parallel, researches are also carried out to define permutation using non chaotic techniques. In this paper, a novel non-chaotic image encryption technique is proposed. The properties of cyclic group are used as the backbone of the proposed method and using these properties some sequences/permutations are defined. These permutations are used for row/column level permutation of pixels and bit-level permutation. Iterative pixel addition operation with bit shifting using a 'Transform array' transforms the pixel value of the bit permuted image. Experimental results show that the proposed scheme is secure against statistical and differential attacks and provide a secure and efficient way for digital image encryption. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:117 / 129
页数:13
相关论文
共 50 条
  • [21] Batch Image Encryption Using Generated Deep Features Based on Stacked Autoencoder Network
    Hu, Fei
    Wang, Jingyuan
    Xu, Xiaofei
    Pu, Changjiu
    Peng, Tao
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [22] SHAPE AND REFLECTANCE FROM AN IMAGE SEQUENCE GENERATED USING EXTENDED SOURCES
    NAYAR, SK
    IKEUCHI, K
    KANADE, T
    [J]. PROCEEDINGS - 1989 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOL 1-3, 1989, : 28 - 35
  • [23] TIMING INDIVIDUALS IN A GROUP USING A COMPUTER-GENERATED CODE SEQUENCE
    FEENEY, WR
    [J]. BEHAVIOR RESEARCH METHODS & INSTRUMENTATION, 1978, 10 (05): : 715 - 717
  • [24] Image Encryption using an Image Pattern based on Advanced Encryption Standard
    Ruelas Quenaya, Merisabel
    Villa-Herrera, Alejandro-Antonio
    Chambi Ytusaca, Samuel Felipe
    Yauri Ituccayasi, Julio Enrique
    Velazco-Paredes, Yuber
    Flores-Quispe, Roxana
    [J]. 2021 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2021,
  • [25] An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher
    Shraida, Ghofran Kh.
    Younis, Hameed A.
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Younis, Hussain A.
    Hasbullah, Iznan H.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2641 - 2654
  • [26] A novel chaos-based image encryption algorithm using DNA sequence operations
    Chai, Xiuli
    Chen, Yiran
    Broyde, Lucie
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 88 : 197 - 213
  • [27] Image encryption using Queen
    Nadeem Iqbal
    [J]. Multimedia Tools and Applications, 2024, 83 : 10551 - 10585
  • [28] Chaos-based image encryption using a hybrid cellular automata and a DNA sequence
    Niyat, Abolfazl Yaghouti
    Hei, Reza Mohammad Hei
    Jahan, Majid Vafaei
    [J]. SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), 2015, : 247 - 252
  • [29] Optical image encryption and authentication using phase-only computer-generated hologram
    Wang, Wenqi
    Wang, Xiaogang
    Xu, Bijun
    Chen, Junlang
    [J]. OPTICS AND LASERS IN ENGINEERING, 2021, 146
  • [30] CNN-based Color Image Encryption Algorithm using DNA Sequence Operations
    Wang, Jingshuai
    Long, Fei
    Ou, Weihua
    [J]. 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 730 - 736