Skip to main content

2018 | OriginalPaper | Buchkapitel

A Novel Self-transforming Image Encryption Algorithm Using Intrinsically Mutating PRNG

verfasst von : Soorya Annadurai, R. Manoj, Roshan David Jathanna

Erschienen in: Proceedings of First International Conference on Smart System, Innovations and Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this research paper, a new approach to image encryption has been proposed. The technique involves using a seed to generate a random list of prime numbers, which is then used to generate subsequent lists recursively. In this manner, a random number generation is created by recursive seeding, rather than one direct seed. This final set of lists is used to encrypt each pixel of the image. Moreover, each pixel is encrypted with its counterpart pixel in the original image, to reduce the possibility of deducing the original image without knowledge of the key. Statistical analysis tests are used to justify the strength of the algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nigam Sangwan, Text Encryption with Huffman Compression, International Journal of Computer Applications (0975 8887) Volume 54 No.6, September 2012. Nigam Sangwan, Text Encryption with Huffman Compression, International Journal of Computer Applications (0975 8887) Volume 54 No.6, September 2012.
2.
Zurück zum Zitat Ayushi, A Symmetric Key Cryptographic Algorithm International Journal of Computer Applications (09758887) Volume 1 No. 15. Ayushi, A Symmetric Key Cryptographic Algorithm International Journal of Computer Applications (09758887) Volume 1 No. 15.
3.
Zurück zum Zitat S. Lian and X. Chen, On the design of partial encryption scheme for multimedia content, Mathematical and Computer Modelling. S. Lian and X. Chen, On the design of partial encryption scheme for multimedia content, Mathematical and Computer Modelling.
4.
Zurück zum Zitat F. Bao and R. H. Deng, Light-weight encryption schemes for multimedia data and high-speed networks, GLOBECOM 07, pp. 188192, November 2007. F. Bao and R. H. Deng, Light-weight encryption schemes for multimedia data and high-speed networks, GLOBECOM 07, pp. 188192, November 2007.
5.
Zurück zum Zitat A. Jolfaei and A. Mirghadri, Image Encryption Using A5/1 and W7, vol. 2, no. 8. A. Jolfaei and A. Mirghadri, Image Encryption Using A5/1 and W7, vol. 2, no. 8.
6.
Zurück zum Zitat Cryptography & Network Security, 6th Edition - William Stallings. Cryptography & Network Security, 6th Edition - William Stallings.
7.
Zurück zum Zitat N. Thomas, D. Redmill, and D. Bull, Secure transcoders for single layer video data, Signal Processing, vol. 25, no. 3, pp. 196207, 2010. N. Thomas, D. Redmill, and D. Bull, Secure transcoders for single layer video data, Signal Processing, vol. 25, no. 3, pp. 196207, 2010.
8.
Zurück zum Zitat F. Liu and H. Koenig, A survey of video encryption algorithms, Computers and Security, vol. 29, no. 1, pp. 3–15, 2010. F. Liu and H. Koenig, A survey of video encryption algorithms, Computers and Security, vol. 29, no. 1, pp. 3–15, 2010.
9.
Zurück zum Zitat S. Bahrami, M. Naderi, Image Encryption Using a Lightweight Stream Encryption Algorithm, Advances in Multimedia, Article ID 767364, 2012. S. Bahrami, M. Naderi, Image Encryption Using a Lightweight Stream Encryption Algorithm, Advances in Multimedia, Article ID 767364, 2012.
10.
Zurück zum Zitat Secure Image Encryption Algorithms: A Review, International Journal of Scientific & Technology Research Volume 2, Issue 4, April 2013, ISSN 2277-8616. Secure Image Encryption Algorithms: A Review, International Journal of Scientific & Technology Research Volume 2, Issue 4, April 2013, ISSN 2277-8616.
11.
Zurück zum Zitat Zhi-Hong Guan, Fangjun Huang, Wenjie Guan, Chaosbased image encryption algorithm, Physics Letters A 346, Elsevier, 2005. Zhi-Hong Guan, Fangjun Huang, Wenjie Guan, Chaosbased image encryption algorithm, Physics Letters A 346, Elsevier, 2005.
12.
Zurück zum Zitat Mitra, Y. V. Subba Rao and S. R. M. Prasanna, A New Image Encryption Approach using Combinational Permutation Techniques, IJECE, 2006. Mitra, Y. V. Subba Rao and S. R. M. Prasanna, A New Image Encryption Approach using Combinational Permutation Techniques, IJECE, 2006.
13.
Zurück zum Zitat M. Zeghid, M. Machhout, L. khriji, A modified AES based algorithm for image Encryption, World Academy of Science, Engineering and Technology 3, 2007. M. Zeghid, M. Machhout, L. khriji, A modified AES based algorithm for image Encryption, World Academy of Science, Engineering and Technology 3, 2007.
14.
Zurück zum Zitat Z. Zhu, W. Zhang, K. Wong, A chaos-based symmetric image encryption scheme using bit-level permutation, Information Sciences, 1171–1186 Elsevier, 2010. Z. Zhu, W. Zhang, K. Wong, A chaos-based symmetric image encryption scheme using bit-level permutation, Information Sciences, 1171–1186 Elsevier, 2010.
15.
Zurück zum Zitat G. Zhang and Q. Liu, A novel image encryption method based on total shuffling scheme, Optics Communications, vol. 284, no. 12, pp. 2775 2780, 2011. G. Zhang and Q. Liu, A novel image encryption method based on total shuffling scheme, Optics Communications, vol. 284, no. 12, pp. 2775 2780, 2011.
16.
Zurück zum Zitat Ismail, Amin, A Digital Image Encryption Algorithm On Composition Of Two Chaotic Logistic Maps, Proc. 27th IEEE Intl Conf. Signal Processing, 733–739, 2011. Ismail, Amin, A Digital Image Encryption Algorithm On Composition Of Two Chaotic Logistic Maps, Proc. 27th IEEE Intl Conf. Signal Processing, 733–739, 2011.
17.
Zurück zum Zitat H. Alsafasfeh, A. A. Arfoa, Image encryption based on the general approach for multiple chaotic system, Journal of Signal & Information Processing 2, 238–244, 2011. H. Alsafasfeh, A. A. Arfoa, Image encryption based on the general approach for multiple chaotic system, Journal of Signal & Information Processing 2, 238–244, 2011.
18.
Zurück zum Zitat Khaled Loukhaoukha, J. Chouinard, A. Berdai, A Secure Image Encryption Algorithm Based on Rubiks Cube Principle, Laval University, Canada G1K 7P4, 2011. Khaled Loukhaoukha, J. Chouinard, A. Berdai, A Secure Image Encryption Algorithm Based on Rubiks Cube Principle, Laval University, Canada G1K 7P4, 2011.
19.
Zurück zum Zitat USC-SIPI Image Database, Signal & Image Processing Institute. USC-SIPI Image Database, Signal & Image Processing Institute.
20.
Zurück zum Zitat C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, no. 4, pp. 656715, 1949. C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, no. 4, pp. 656715, 1949.
21.
Zurück zum Zitat Yong Wanga, Kwok-Wo Wong, Xiaofeng Liaoc, Guanrong Chen, A new chaos-based fast image encryption algorithm, Applied Soft Computing, Elsevier, 2011. Yong Wanga, Kwok-Wo Wong, Xiaofeng Liaoc, Guanrong Chen, A new chaos-based fast image encryption algorithm, Applied Soft Computing, Elsevier, 2011.
22.
Zurück zum Zitat P. Sree, M. Padmaja, An Improved Image Encryption Using Pixel XOR Transpose Technique Over Images, IJETTCS, Vol. 4, Issue 3, May–June 2015 ISSN 22786856 P. Sree, M. Padmaja, An Improved Image Encryption Using Pixel XOR Transpose Technique Over Images, IJETTCS, Vol. 4, Issue 3, May–June 2015 ISSN 22786856
23.
Zurück zum Zitat A. Dixit, P. Dhruve, Image encryption using permutation and rotational XOR technique (Eds): SIPM, FCST, ITCA, WSE, ACSIT pp. 01–09, 2012. A. Dixit, P. Dhruve, Image encryption using permutation and rotational XOR technique (Eds): SIPM, FCST, ITCA, WSE, ACSIT pp. 01–09, 2012.
Metadaten
Titel
A Novel Self-transforming Image Encryption Algorithm Using Intrinsically Mutating PRNG
verfasst von
Soorya Annadurai
R. Manoj
Roshan David Jathanna
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5828-8_20