An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption

被引:0
|
作者
Younes, Mohammad Ali Bani [1 ]
Jantan, Aman [1 ]
机构
[1] Univ Sains Malaysia Comp Sci, George Town, Malaysia
关键词
Image Correlation; Image encryption; Image entropy; Image histogram; Permutation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textual data may not be suitable for multimedia data. In most of the natural images the values of the neighboring pixels are strongly correlated. This means that the value of any given pixel can be reasonably predicted from the values of its neighbors. In this paper, we introduce a new permutation technique based on the combination of image permutation and a well known encryption algorithm called RijnDael. The original image was divided into 4 pixels x 4 pixels blocks, which were rearranged into a permuted image using a permutation process presented here, and then the generated image was encrypted using the RijnDael algorithm. The results showed that the correlation between image elements was significantly decreased by using the combination technique and higher entropy was achieved.
引用
收藏
页码:191 / 197
页数:7
相关论文
共 50 条
  • [41] On the Security of Permutation-Only Image Encryption Schemes
    Jolfaei, Alireza
    Wu, Xin-Wen
    Muthukkumarasamy, Vallipuram
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 235 - 246
  • [42] A chaotic color image encryption using integrated bit-level permutation
    Teng, Lin
    Wang, Xingyuan
    Meng, Juan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (06) : 6883 - 6896
  • [43] Image encryption using permutation generated by modified Regula-Falsi method
    Paul, Aakash
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    APPLIED INTELLIGENCE, 2022, 52 (10) : 10979 - 10998
  • [44] An efficient chaotic image encryption scheme using simultaneous permutation–diffusion operation
    Qingxin Sheng
    Chong Fu
    Zhaonan Lin
    Junxin Chen
    Lin Cao
    Chiu-Wing Sham
    The Visual Computer, 2024, 40 : 1643 - 1658
  • [45] Image encryption using permutation generated by modified Regula-Falsi method
    Aakash Paul
    Shyamalendu Kandar
    Bibhas Chandra Dhara
    Applied Intelligence, 2022, 52 : 10979 - 10998
  • [46] A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos
    Wang, Xing-Yuan
    Zhang, Ying-Qian
    Bao, Xue-Mei
    ENTROPY, 2015, 17 (06): : 3877 - 3897
  • [47] New approach to image encryption
    Chuang, TJ
    Lin, JC
    JOURNAL OF ELECTRONIC IMAGING, 1998, 7 (02) : 350 - 356
  • [48] Image encryption using a novel hybrid chaotic map and dynamic permutation−diffusion
    Atul Kumar
    Mohit Dua
    Multimedia Tools and Applications, 2024, 83 : 32789 - 32812
  • [49] A chaotic color image encryption using integrated bit-level permutation
    Lin Teng
    Xingyuan Wang
    Juan Meng
    Multimedia Tools and Applications, 2018, 77 : 6883 - 6896
  • [50] Image Encryption Using a Lightweight Stream Encryption Algorithm
    Bahrami, Saeed
    Naderi, Majid
    ADVANCES IN MULTIMEDIA, 2012, 2012