SlideShare a Scribd company logo
1 of 5
Download to read offline
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/334205288
An Efļ¬cient and Highly Secure Technique to Encrypt and Decrypt Color
Images
ArticleĀ Ā inĀ Ā Engineering, Technology and Applied Science Research Ā· June 2019
CITATIONS
3
READS
67
3 authors:
Some of the authors of this publication are also working on these related projects:
Low cost Multilevel Modulation Formate for 100Gbps Transmission direct detection View project
A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption View project
Majed Dwairi
Al-Balqa Applied University
46 PUBLICATIONSĀ Ā Ā 133 CITATIONSĀ Ā Ā 
SEE PROFILE
Amjad Hindi
Al-Balqa' Applied University
27 PUBLICATIONSĀ Ā Ā 36 CITATIONSĀ Ā Ā 
SEE PROFILE
Ziad Alqadi
Al-Balqa' Applied University
155 PUBLICATIONSĀ Ā Ā 1,142 CITATIONSĀ Ā Ā 
SEE PROFILE
All content following this page was uploaded by Ziad Alqadi on 03 July 2019.
The user has requested enhancement of the downloaded file.
Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4165
www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images
An Efficient and Highly Secure Technique to Encrypt
and Decrypt Color Images
Majed O. Al-Dwairi
Department of Communication
Technology Engineering, Faculty of
Engineering Technology, Al-Balqa'
Applied University, Amman, Jordan
majeddw@bau.edu.jo
Amjad Y. Hendi
Department of Communication
Technology Engineering, Faculty of
Engineering Technology, Al-Balqa'
Applied University, Amman, Jordan
amjad_svyaz@yahoo.com
Ziad A. AlQadi
Computer & Network Engineering
Department, Faculty of Engineering
Technology, Al-Balqa' Applied
University, Amman, Jordan
natalia_maw@yahoo.com
Abstractā€”Digital color images are considered as the most widely
used data. They are exchanged frequently on the internet and via
email, so an efficient and highly secure method of color image
encryption and decryption is needed. Different methods of
encryption-decryption are used, but most of them suffer from low
efficiency or low-security level or both. In this paper, an efficient
and highly secure method of encryption-decryption will be
proposed, tested, and implemented. The efficiency parameters
will be calculated and compared with other methodsā€™ parameters
to prove the efficiency of the proposed method.
Keywords-encryption-decryption times; throughput; speedup;
MSE; PSNR
I. INTRODUCTION
Digital images are one of the most widely used data types,
and they are exchanged widely through e-mail and web
browsing. A digital image may be confidential or contain
highly confidential information [1]. In this case, it is necessary
to encrypt it in order to make it difficult to identify or the
information stored in it. The person authorized to view the
image can decrypt it and return it to the original form without
any errors. The digital image has a large size, so encoding it
may take a lot of time, which leads us to build an effective
method that reduces the encryption time as much as possible.
II. ENCRYPTION-DECRYPTION PARAMETERS
Regarding the effectiveness of the image encryption
method, the following parameters must be taken into account:
ā€¢ Encryption time: the time needed to process the encryption
method in order to convert the original image to an
encrypted image.
ā€¢ Decryption time: the time needed to process the decryption
method in order to convert the encrypted image to the
original image. Encryption and decryption times must be as
reduced as possible.
ā€¢ Throughput: the number of bits encrypted or decrypted per
time unit. It is equal to the image size in bits divided by the
encryption or decryption time.
ā€¢ Speedup: the proposed technique enhancement, which is
equal with the proposed technique throughput divided by
the throughput of another method.
ā€¢ Block: the number of bytes to be encrypted/decrypted at the
same moment.
ā€¢ Key size: the number of values (elements) for a secret key,
which must be equal with the block size.
ā€¢ Hacking time: the time needed by an unauthorized person
to guess the original image. This time must be as large as
possible. This time depends on the length of the key used
for encryption-decryption.
ā€¢ Mean square error (MSE) and peak signal-to-noise ratio
(PSNR): MSE is a measure of the quality of an estimatorā€”
it is always non-negative, and values closer to zero are
better. But for measuring it between the original image and
the encrypted one, the value must be very large. PSNR is an
engineering term for the ratio between the maximum
possible power of a signal and the power of corrupting
noise that affects the fidelity of its representation. For ideal
encryption, the PSNR between the original image and the
encrypted image must be very low, and between the
original image and the decrypted one must be infinite (zero
errors). These parameters can be calculated using the
following formulas:
ā€«Ü§ÜµÜÆā€¬ = āˆ‘ āˆ‘ āˆ‘ ąµ«ÜŗįˆŗŻ…, Ż†, Ż‡įˆ» āˆ’ Ü»įˆŗŻ…, Ż†, Ż‡įˆ»ąµÆ
ą¬¶
			
ąÆ£
ąÆž
ąÆ–
ąÆ
ąÆ„
ąÆœ (1)
d=max{Xi,j,k,Yi,j,k},	ܲܵܰܓ = 10Żˆā€«ŻƒŻ‹ā€¬ į‰€Ż€ą¬¶
ā€«Ü§ÜµÜÆā€¬ąµ— į‰ (2)
where X and Y are color image matrices, r: rows, c: columns, p:
number of colors.
III. RELATED WORK
Some authors take data encryption standard (DES) [2], or
advanced encryption standard (AES) [3, 4] as bases for
encryption-decryption, but most of these works suffer from
high encryption-decryption time, which makes these methods
inefficient. Author in [5] suggested a method of encryption-
decryption by reshaping the 3D color matrix to a 2D matrix,
squaring the matrix, generating a secret key with size equal to
Corresponding author: Majed O. Al-Dwairi
Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4166
www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images
the image size, and applying matrix multiplication to get the
decrypted image. This method provides a good throughput, but
it is very difficult to remember the key, and thus the method
requires storing and transferring the key. In [6] an efficient
image encryption scheme using double logistic maps was
proposed, in which the image matrix was confused from row
and column. Confusion effect is carried out by the substitution
stage and Chen's system is employed to diffuse the gray value
distribution. In [7], a method of encryption-decryption was
proposed, this method was based on matrix reordering and it
has a medium throughput. In [8], a chaotic algorithm was
presented applying encryption-decryption by using power and
tangent functions instead of linear function. The process of
encryption is one-time-one-password system and is more
secure (but not enough) than the DES algorithm, also it has low
efficient parameters with big encryption-decryption time and
low throughput. In [9], an asymmetric image encryption-
decryption method was proposed, this method is based on
matrix transformation, but it has high encryption-decryption
time and thus low throughput. In [10] a method based on
Rubik's cube principle was proposed with a good security level,
but low throughput. In [11] a method of encryption-decryption
was presented, this method is based on using chaos-controlled
poker shuffle operation, both variants of this method (A-I and
A-II) have a poor throughput.
IV. PROPOSED METHOD
The proposed technique of color image encryption-
decryption requires the following operations (Figure 1):
ā€¢ Dividing the original image matrix into equal size blocks
(in our testing experiment the block size was equal to 8
bytes).
ā€¢ Selecting several secret keys (in our testing experiment we
selected 4 keys).
ā€¢ Key size must equal block size.
ā€¢ Key value must in the range from 0 to 255.
Fig. 1. Proposed encryptor-decryptor
The encryption phase can be implemented applying the
following steps:
ā€¢ Get the original color image matrix.
ā€¢ Reshape the color image matrix from 3D to 1D.
ā€¢ Divide the 1D matrix into equal blocks with size equal to 8
bytes.
ā€¢ Define 4 private keys with 8 elements each.
ā€¢ Each data matrix block must be submitted to exclusive-OR
operation with key1, key2, key3, and key4 consecutively.
ā€¢ The obtained blocks are the encrypted blocks.
The decryption phase can be implemented applying the
following steps:
ā€¢ Get the encrypted color image matrix.
ā€¢ Reshape the color image matrix from 3D to 1D.
ā€¢ Divide the 1D matrix into equal blocks with size equal to 8
bytes.
ā€¢ Use the defined 4 private keys with 8 elements each.
ā€¢ Each data block be submitted to exclusive-OR with key4,
key3, key 2, and key1 consecutively.
ā€¢ The obtained blocks are the decrypted blocks which must
be reshaped back to get the decrypted image.
The proposed algorithm provides a high level of security,
the number of combinations to guess the four keys is very high
and equal to 256ą¬¼
ąµˆ 256ą¬¼
ąµˆ 256ą¬¼
ąµˆ 256ą¬¼
= 256ą¬·ą¬¶
making
the hacking process very difficult. Figure 2 shows an example
of the keys, while Figures 3-5 show the original, encrypted and
decrypted images obtained by applying the proposed method.
From Figures 4 and 5 we can see that the original and
decrypted images are the same.
Fig. 2. Keys example
Fig. 3. Original image and histograms
Fig. 4. Encrypted image and histograms
Original image
0 100 200
0
1
2
3
x 10
4 Red histogram
0 100 200
0
1
2
3
x 10
4 Green histogram
0 100 200
0
1
2
3
x 10
4 Blue histogram
Encrypted image
0 100 200
0
1
2
x 10
4 Red histogram
0 100 200
0
1
2
x 10
4 Green histogram
0 100 200
0
1
2
x 10
4 Blue histogram
Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4167
www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images
Fig. 5. Decrypted image and histograms
V. RESULTS AND DISCUSSION
The proposed method can be used to encrypt-decrypt color
images of any type or size. Several images were treated by the
proposed technique, and Table I shows the results of the
implementation. From Table I we can conclude the following:
ā€¢ Calculated encryption/decryption times are significantly
small and grow linearly (as shown in Figure 6) when the
image size grows.
ā€¢ The proposed technique is accurate by keeping the
decrypted image the same with the original image (zero
MSE and infinite PSNR).
ā€¢ The proposed technique distorts the encrypted image by
maximizing MSE and minimizing PSNR between the
original image and the encrypted one.
ā€¢ The throughput of the proposed technique is always
between 28 and 29 MBits per second, which is considered a
high-performance index.
TABLE I. CALCULATED PARAMETERS
Image
number
Size
(Mbits)
Encryption
time (s)
Decryption
time (s)
Throughput
(Mbps)
1 2.0672 0.0710 0.0710 29.1151
2 1.1587 0.0410 0.0410 28.2613
3 0.3750 0.0130 0.0130 28.8462
4 8.5876 0.2940 0.2940 29.2097
5 4.1199 0.1410 0.1410 29.2190
6 25.9100 0.8930 0.8930 29.0145
7 18 0.628000 0.628000 28.6624
8 7.0862 0.2470 0.2470 28.6890
9 3.2959 0.1150 0.1150 28.6600
10 1.1547 0.0390 0.0390 29.6085
To prove the correctness of the proposed technique, MSE
and PSNR were calculated (Table II). The proposed technique
was compared with other existing techniques and the results of
the comparison are shown in Table III. From these results we
can see that the proposed technique enhanced efficiency by
minimizing encryption-decryption times, and maximizing
throughput which speeds up the proposed technique. Note that
increasing the block size will increase the technique efficiency
by decreasing the encryption-decryption time and increasing
the throughput.
TABLE II. MSE AND PSNR CALCULATIONS
Image
number
Comparing encrypted
image with original
Comparing decrypted
image with original
MSE PSNR MSE PSNR
1 1.6997e+004 13.4173 0 Infinite
2 7.8742e+003 21.1118 0 Infinite
3 6.0695e+003 23.7150 0 Infinite
4 7.7992e+003 21.2075 0 Infinite
5 1.1871e+004 17.0068 0 Infinite
6 1.4770e+004 14.8217 0 Infinite
7 1.3579e+004 15.6623 0 Infinite
8 1.3214e+004 15.9352 0 Infinite
9 1.0662e+004 18.0805 0 Infinite
10 1.2664e+004 16.3601 0 Infinite
TABLE III. COMPARISON RESULTS
Method
Encryption
time (s)
Decryption
time (s)
Throughput
(Mbits)
Speedup of
the proposed
method
Order
Proposed 0.0513 0.0513 29.2398 1 1
[4] 0.06469 0.062727 23.1876 1.2610 2
[6] 0.23 0.23 6.5217 4.4835 4
[7] 0.5 0.5 3 9.7466 6
[8] 0.4 0.4 3.7500 7.7973 5
[9] 0.12 0.12 12.5000 2.3392 3
[10] v. A-I 0.56 0.56 2.6786 10.9161 7
[10] v. A-II 1.01 1.01 1.4852 19.6874 8
Image size=256Ɨ256Ɨ3Ɨ8=1572864bit=1.5000Mbits
Fig. 6. Relationship between image size and encryption time
The proposed technique was implemented using the
previous images with a block size equal to 16 pixels and with
one 16 element key, the results of the implementation are
shown in Tables IV-V.
TABLE IV. PARAMETERS FOR BLOCK SIZE =16, ONE KEY
Image
number
Size
(Mbits)
Encryption
time (s)
Decryption
time (s)
Throughput
(Mbps)
1 2.0672 0.0290 0.0290 71.2817
2 1.1587 0.0170 0.0170 68.1597
3 0.3750 0.0050 0.0050 75.0000
4 8.5876 0.1250 0.1250 68.7012
5 4.1199 0.0560 0.0560 73.5692
6 25.9100 0.3670 0.3670 70.5993
7 18 0.2540 0.2540 70.8661
8 7.0862 0.1010 0.1010 70.1602
9 3.2959 0.0470 0.0470 70.1255
10 1.1547 0.0160 0.0160 72.1707
Decrypted image
0 100 200
0
1
2
3
x 10
4 Red histogram
0 100 200
0
1
2
3
x 10
4 Green histogram
0 100 200
0
1
2
3
x 10
4 Blue histogram
Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4168
www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images
Here the technique efficiency was rapidly increased but
with some negative effects by increasing the PSNR between
the original and the encrypted image, which means that the
encrypted image moves toward the original image. However,
this level of PSNR is still acceptable. Table VI shows the
efficiency speedup of increased block size.
TABLE V. MSE AND PSNR FOR BLOCK SIZE =16 AND ONE KEY
Image
number
Comparing encrypted image
with original
Comparing decrypted
image with original
MSE PSNR MSE PSNR
1 9.1362e+003 19.6253 0 Infinite
2 7.4460e+003 21.6710 0 Infinite
3 7.3327e+003 21.8243 0 Infinite
4 7.5590e+003 21.5203 0 Infinite
5 8.6746e+003 20.1437 0 Infinite
6 8.5122e+003 20.3327 0 Infinite
7 8.7733e+003 20.0305 0 Infinite
8 8.1958e+003 20.7116 0 Infinite
9 7.7113e+003 21.3209 0 Infinite
10 7.3976e+003 21.7362 0 Infinite
TABLE VI. SPEEDUP WITH INCREASED BLOCK SIZE
Image
number
Throughput (Mbps)
Speed up
of (2)
Block size=8
Number of keys=4 (1)
Block size=16
Number of
keys=1 (2)
1 29.1151 71.2817 2.4483
2 28.2613 68.1597 2.4118
3 28.8462 75.0000 2.6000
4 29.2097 68.7012 2.3520
5 29.2190 73.5692 2.5179
6 29.0145 70.5993 2.4332
7 28.6624 70.8661 2.4724
8 28.6890 70.1602 2.4455
9 28.6600 70.1255 2.4468
10 29.6085 72.1707 2.4375
VI. CONCLUSIONS
An efficient and highly secure technique for color image
encryption-decryption was proposed. The proposed technique
was implemented and tested, and the experimental results
showed the following conclusions:
ā€¢ The proposed technique is very efficient by increasing the
throughput and decreasing encryption-decryption times.
ā€¢ The proposed technique is 100% accurate by achieving zero
MSE and infinite PSNR between the original image and the
decrypted one.
REFERENCES
[1] M. J. Aqel, Z. AlQadi, A. A. Abdullah, ā€œRGB Color Image Encryption-
Decryption Using Image Segmentation and Matrix Multiplicationā€,
International Journal of Engineering and Technology, Vol. 7, No. 3.13,
pp. 104-107, 2018
[2] J. Thakur, N. Kumar, ā€œDES, AES, and Blowfish: Symmetric Key
Cryptography Algorithms Simulation Based Performance Analysisā€,
International Journal of Emerging Technology and Advanced
Engineering, Vol. 1, No. 2, pp. 6-12, 2011
[3] S. A. M. Rizvi, S. Z. Hussain, N. Wadhwa, ā€œA Comparative Study of
Two Symmetric Encryption Algorithms across Different Platformsā€,
International Conference on Security and Management, World Academy
of Science, Las Vegas, USA, July 18-21, 2011
[4] S. Wang, Y. Zheng, Z. Gao, ā€œA New Image Scrambling Method through
Folding Transformā€, IEEE International Conference on Computer
Application and System Modeling, Taiyuan, China, October 22-24, 2010
[5] J. N. Abdel-Jalil, ā€œPerformance analysis of color image
encryptiondecryption techniquesā€, International Journal of Advanced
Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016
[6] G. Ye, ā€œAn Efficient Image Encryption Scheme based on Logistic
mapsā€, International Journal of Pure and Applied Mathematics, Vol. 55,
No. 1, pp. 37-47, 2009
[7] T. Sivakumar, R. Venkatesan, ā€œA Novel Image Encryption Approach
using Matrix Reorderingā€, WSEAS Transactions on Computers, Vol. 12,
No. 11, pp. 407-418, 2013
[8] H. Gao, Y. Zhang, S. Liang, D. Li, ā€œA New Chaotic Algorithm for
Image Encryptionā€, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-
399, 2006
[9] G. Chen, Y. Mao, C. K. Chui, ā€œA Symmetric Image Encryption Scheme
based on 3D Chaotic Cat Mapsā€, Chaos, Solitons & Fractals, Vol. 21,
No. 3, pp. 749ā€“761, 2004
[10] K. Loukhaoukha, J. Y. Chouinard, A. Berdai, ā€œA Secure Image
Encryption Algorithm Based on Rubik's Cube Principleā€, Journal of
Electrical and Computer Engineering, Vol. 2012, Article ID 173931, pp.
pp. 1-13, 2012
[11] X. Wang, J. Zhang, ā€œAn Image Scrambling Encryption using Chaos-
controlled Poker Shuffle Operationā€, IEEE International Symposium on
Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24,
2008
AUTHORS PROFILE
Majed O. Al-Dwairi, PhD in Communication Systems. He
was born in 1968 in Jordan. He received his Diploma Degree
in 1994 and his PhD degree from Ukraine state Academy in
1998 in the field of Multichannel Communication. An
associate professor in the Department of Communication
Engineering Technology, Faculty of Engineering Technology,
Al-Balqaā€™ Applied University, Amman, Jordan. His research
interests include optical communication networks, digital communications,
signal and image processing, Antenna design, and microstrip patch antennas.
Amjad Y. Hendi, PhD in Radio and TV Systems. He
received his Diploma Degree in 1994 and PhD Degree from
the Ukraine state Academy in 1998 in the field of Radio &
TV systems. His research interests include digital
communications, signal and image processing, antenna
design, optimization techniques in antenna design, and
antenna measurement techniques and microstrip patch
antennas.
Ziad A. AlQadi, PhD in Computer Engineering. He was born
in 1955 in Jordan. He received his Diploma Degree in 1980
and PhD Degree from Ukraine in 1986 in the field of Computer
Engineering. Currently he is a Professor at the Computer
Engineering Department, Faculty of Engineering Technology,
Al-Balqaā€™ Applied University, Amman, Jordan.
View publication statsView publication stats

More Related Content

What's hot

Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.Pradeep Vishwakarma
Ā 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Ā 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aeseSAT Publishing House
Ā 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
Ā 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
Ā 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
Ā 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
Ā 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
Ā 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
Ā 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...ranjit banshpal
Ā 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
Ā 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyAM Publications
Ā 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
Ā 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
Ā 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
Ā 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
Ā 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
Ā 

What's hot (18)

Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Ā 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Ā 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
Ā 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
Ā 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Ā 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
Ā 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
Ā 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Ā 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Ā 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Ā 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
Ā 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
Ā 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ā 
50120130405004 2
50120130405004 250120130405004 2
50120130405004 2
Ā 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
Ā 
Image encryption
Image encryptionImage encryption
Image encryption
Ā 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
Ā 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Ā 

Similar to An efficient and highly secure technique to encrypt

Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Ā 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
Ā 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
Ā 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
Ā 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
Ā 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311IJERA Editor
Ā 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311IJERA Editor
Ā 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
Ā 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
Ā 
R04405103106
R04405103106R04405103106
R04405103106IJERA Editor
Ā 
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish AlgorithmsImproving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish AlgorithmsIRJET Journal
Ā 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
Ā 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
Ā 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
Ā 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Ā 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
Ā 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
Ā 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
Ā 

Similar to An efficient and highly secure technique to encrypt (20)

Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
Ā 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
Ā 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
Ā 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Ā 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
Ā 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
Ā 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
Ā 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
Ā 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Ā 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
Ā 
R04405103106
R04405103106R04405103106
R04405103106
Ā 
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish AlgorithmsImproving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Ā 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
Ā 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
Ā 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
Ā 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
Ā 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
Ā 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Ā 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
Ā 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
Ā 

More from ZiadAlqady

Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andZiadAlqady
Ā 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
Ā 
Analysis of speech signal mlbp features
Analysis of speech signal mlbp featuresAnalysis of speech signal mlbp features
Analysis of speech signal mlbp featuresZiadAlqady
Ā 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising processZiadAlqady
Ā 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
Ā 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color imageZiadAlqady
Ā 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andZiadAlqady
Ā 
Secure secret message steganography (ssms)
Secure secret message steganography (ssms)Secure secret message steganography (ssms)
Secure secret message steganography (ssms)ZiadAlqady
Ā 
Analysis of speech signal mlbp features
Analysis of speech signal mlbp featuresAnalysis of speech signal mlbp features
Analysis of speech signal mlbp featuresZiadAlqady
Ā 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising processZiadAlqady
Ā 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color imageZiadAlqady
Ā 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andZiadAlqady
Ā 
Secure secret message steganography (ssms)
Secure secret message steganography (ssms)Secure secret message steganography (ssms)
Secure secret message steganography (ssms)ZiadAlqady
Ā 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
Ā 
Analysis of speech signal mlbp features
Analysis of speech signal mlbp featuresAnalysis of speech signal mlbp features
Analysis of speech signal mlbp featuresZiadAlqady
Ā 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising processZiadAlqady
Ā 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
Ā 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color imageZiadAlqady
Ā 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andZiadAlqady
Ā 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
Ā 

More from ZiadAlqady (20)

Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
Ā 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
Ā 
Analysis of speech signal mlbp features
Analysis of speech signal mlbp featuresAnalysis of speech signal mlbp features
Analysis of speech signal mlbp features
Ā 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
Ā 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
Ā 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
Ā 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
Ā 
Secure secret message steganography (ssms)
Secure secret message steganography (ssms)Secure secret message steganography (ssms)
Secure secret message steganography (ssms)
Ā 
Analysis of speech signal mlbp features
Analysis of speech signal mlbp featuresAnalysis of speech signal mlbp features
Analysis of speech signal mlbp features
Ā 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
Ā 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
Ā 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
Ā 
Secure secret message steganography (ssms)
Secure secret message steganography (ssms)Secure secret message steganography (ssms)
Secure secret message steganography (ssms)
Ā 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
Ā 
Analysis of speech signal mlbp features
Analysis of speech signal mlbp featuresAnalysis of speech signal mlbp features
Analysis of speech signal mlbp features
Ā 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
Ā 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
Ā 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
Ā 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
Ā 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
Ā 

Recently uploaded

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
Ā 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
Ā 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
Ā 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
Ā 
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...vershagrag
Ā 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
Ā 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
Ā 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
Ā 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
Ā 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
Ā 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
Ā 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
Ā 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsArindam Chakraborty, Ph.D., P.E. (CA, TX)
Ā 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
Ā 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
Ā 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
Ā 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
Ā 
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...Call Girls Mumbai
Ā 

Recently uploaded (20)

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ā 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Ā 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
Ā 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
Ā 
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
Ā 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
Ā 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Ā 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Ā 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Ā 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Ā 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
Ā 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
Ā 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Ā 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
Ā 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Ā 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Ā 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Ā 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
Ā 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Ā 
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
Ā 

An efficient and highly secure technique to encrypt

  • 1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/334205288 An Efļ¬cient and Highly Secure Technique to Encrypt and Decrypt Color Images ArticleĀ Ā inĀ Ā Engineering, Technology and Applied Science Research Ā· June 2019 CITATIONS 3 READS 67 3 authors: Some of the authors of this publication are also working on these related projects: Low cost Multilevel Modulation Formate for 100Gbps Transmission direct detection View project A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption View project Majed Dwairi Al-Balqa Applied University 46 PUBLICATIONSĀ Ā Ā 133 CITATIONSĀ Ā Ā  SEE PROFILE Amjad Hindi Al-Balqa' Applied University 27 PUBLICATIONSĀ Ā Ā 36 CITATIONSĀ Ā Ā  SEE PROFILE Ziad Alqadi Al-Balqa' Applied University 155 PUBLICATIONSĀ Ā Ā 1,142 CITATIONSĀ Ā Ā  SEE PROFILE All content following this page was uploaded by Ziad Alqadi on 03 July 2019. The user has requested enhancement of the downloaded file.
  • 2. Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4165 www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images Majed O. Al-Dwairi Department of Communication Technology Engineering, Faculty of Engineering Technology, Al-Balqa' Applied University, Amman, Jordan majeddw@bau.edu.jo Amjad Y. Hendi Department of Communication Technology Engineering, Faculty of Engineering Technology, Al-Balqa' Applied University, Amman, Jordan amjad_svyaz@yahoo.com Ziad A. AlQadi Computer & Network Engineering Department, Faculty of Engineering Technology, Al-Balqa' Applied University, Amman, Jordan natalia_maw@yahoo.com Abstractā€”Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methodsā€™ parameters to prove the efficiency of the proposed method. Keywords-encryption-decryption times; throughput; speedup; MSE; PSNR I. INTRODUCTION Digital images are one of the most widely used data types, and they are exchanged widely through e-mail and web browsing. A digital image may be confidential or contain highly confidential information [1]. In this case, it is necessary to encrypt it in order to make it difficult to identify or the information stored in it. The person authorized to view the image can decrypt it and return it to the original form without any errors. The digital image has a large size, so encoding it may take a lot of time, which leads us to build an effective method that reduces the encryption time as much as possible. II. ENCRYPTION-DECRYPTION PARAMETERS Regarding the effectiveness of the image encryption method, the following parameters must be taken into account: ā€¢ Encryption time: the time needed to process the encryption method in order to convert the original image to an encrypted image. ā€¢ Decryption time: the time needed to process the decryption method in order to convert the encrypted image to the original image. Encryption and decryption times must be as reduced as possible. ā€¢ Throughput: the number of bits encrypted or decrypted per time unit. It is equal to the image size in bits divided by the encryption or decryption time. ā€¢ Speedup: the proposed technique enhancement, which is equal with the proposed technique throughput divided by the throughput of another method. ā€¢ Block: the number of bytes to be encrypted/decrypted at the same moment. ā€¢ Key size: the number of values (elements) for a secret key, which must be equal with the block size. ā€¢ Hacking time: the time needed by an unauthorized person to guess the original image. This time must be as large as possible. This time depends on the length of the key used for encryption-decryption. ā€¢ Mean square error (MSE) and peak signal-to-noise ratio (PSNR): MSE is a measure of the quality of an estimatorā€” it is always non-negative, and values closer to zero are better. But for measuring it between the original image and the encrypted one, the value must be very large. PSNR is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. For ideal encryption, the PSNR between the original image and the encrypted image must be very low, and between the original image and the decrypted one must be infinite (zero errors). These parameters can be calculated using the following formulas: ā€«Ü§ÜµÜÆā€¬ = āˆ‘ āˆ‘ āˆ‘ ąµ«ÜŗįˆŗŻ…, Ż†, Ż‡įˆ» āˆ’ Ü»įˆŗŻ…, Ż†, Ż‡įˆ»ąµÆ ą¬¶ ąÆ£ ąÆž ąÆ– ąÆ ąÆ„ ąÆœ (1) d=max{Xi,j,k,Yi,j,k}, ܲܵܰܓ = 10Żˆā€«ŻƒŻ‹ā€¬ į‰€Ż€ą¬¶ ā€«Ü§ÜµÜÆā€¬ąµ— į‰ (2) where X and Y are color image matrices, r: rows, c: columns, p: number of colors. III. RELATED WORK Some authors take data encryption standard (DES) [2], or advanced encryption standard (AES) [3, 4] as bases for encryption-decryption, but most of these works suffer from high encryption-decryption time, which makes these methods inefficient. Author in [5] suggested a method of encryption- decryption by reshaping the 3D color matrix to a 2D matrix, squaring the matrix, generating a secret key with size equal to Corresponding author: Majed O. Al-Dwairi
  • 3. Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4166 www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images the image size, and applying matrix multiplication to get the decrypted image. This method provides a good throughput, but it is very difficult to remember the key, and thus the method requires storing and transferring the key. In [6] an efficient image encryption scheme using double logistic maps was proposed, in which the image matrix was confused from row and column. Confusion effect is carried out by the substitution stage and Chen's system is employed to diffuse the gray value distribution. In [7], a method of encryption-decryption was proposed, this method was based on matrix reordering and it has a medium throughput. In [8], a chaotic algorithm was presented applying encryption-decryption by using power and tangent functions instead of linear function. The process of encryption is one-time-one-password system and is more secure (but not enough) than the DES algorithm, also it has low efficient parameters with big encryption-decryption time and low throughput. In [9], an asymmetric image encryption- decryption method was proposed, this method is based on matrix transformation, but it has high encryption-decryption time and thus low throughput. In [10] a method based on Rubik's cube principle was proposed with a good security level, but low throughput. In [11] a method of encryption-decryption was presented, this method is based on using chaos-controlled poker shuffle operation, both variants of this method (A-I and A-II) have a poor throughput. IV. PROPOSED METHOD The proposed technique of color image encryption- decryption requires the following operations (Figure 1): ā€¢ Dividing the original image matrix into equal size blocks (in our testing experiment the block size was equal to 8 bytes). ā€¢ Selecting several secret keys (in our testing experiment we selected 4 keys). ā€¢ Key size must equal block size. ā€¢ Key value must in the range from 0 to 255. Fig. 1. Proposed encryptor-decryptor The encryption phase can be implemented applying the following steps: ā€¢ Get the original color image matrix. ā€¢ Reshape the color image matrix from 3D to 1D. ā€¢ Divide the 1D matrix into equal blocks with size equal to 8 bytes. ā€¢ Define 4 private keys with 8 elements each. ā€¢ Each data matrix block must be submitted to exclusive-OR operation with key1, key2, key3, and key4 consecutively. ā€¢ The obtained blocks are the encrypted blocks. The decryption phase can be implemented applying the following steps: ā€¢ Get the encrypted color image matrix. ā€¢ Reshape the color image matrix from 3D to 1D. ā€¢ Divide the 1D matrix into equal blocks with size equal to 8 bytes. ā€¢ Use the defined 4 private keys with 8 elements each. ā€¢ Each data block be submitted to exclusive-OR with key4, key3, key 2, and key1 consecutively. ā€¢ The obtained blocks are the decrypted blocks which must be reshaped back to get the decrypted image. The proposed algorithm provides a high level of security, the number of combinations to guess the four keys is very high and equal to 256ą¬¼ ąµˆ 256ą¬¼ ąµˆ 256ą¬¼ ąµˆ 256ą¬¼ = 256ą¬·ą¬¶ making the hacking process very difficult. Figure 2 shows an example of the keys, while Figures 3-5 show the original, encrypted and decrypted images obtained by applying the proposed method. From Figures 4 and 5 we can see that the original and decrypted images are the same. Fig. 2. Keys example Fig. 3. Original image and histograms Fig. 4. Encrypted image and histograms Original image 0 100 200 0 1 2 3 x 10 4 Red histogram 0 100 200 0 1 2 3 x 10 4 Green histogram 0 100 200 0 1 2 3 x 10 4 Blue histogram Encrypted image 0 100 200 0 1 2 x 10 4 Red histogram 0 100 200 0 1 2 x 10 4 Green histogram 0 100 200 0 1 2 x 10 4 Blue histogram
  • 4. Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4167 www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images Fig. 5. Decrypted image and histograms V. RESULTS AND DISCUSSION The proposed method can be used to encrypt-decrypt color images of any type or size. Several images were treated by the proposed technique, and Table I shows the results of the implementation. From Table I we can conclude the following: ā€¢ Calculated encryption/decryption times are significantly small and grow linearly (as shown in Figure 6) when the image size grows. ā€¢ The proposed technique is accurate by keeping the decrypted image the same with the original image (zero MSE and infinite PSNR). ā€¢ The proposed technique distorts the encrypted image by maximizing MSE and minimizing PSNR between the original image and the encrypted one. ā€¢ The throughput of the proposed technique is always between 28 and 29 MBits per second, which is considered a high-performance index. TABLE I. CALCULATED PARAMETERS Image number Size (Mbits) Encryption time (s) Decryption time (s) Throughput (Mbps) 1 2.0672 0.0710 0.0710 29.1151 2 1.1587 0.0410 0.0410 28.2613 3 0.3750 0.0130 0.0130 28.8462 4 8.5876 0.2940 0.2940 29.2097 5 4.1199 0.1410 0.1410 29.2190 6 25.9100 0.8930 0.8930 29.0145 7 18 0.628000 0.628000 28.6624 8 7.0862 0.2470 0.2470 28.6890 9 3.2959 0.1150 0.1150 28.6600 10 1.1547 0.0390 0.0390 29.6085 To prove the correctness of the proposed technique, MSE and PSNR were calculated (Table II). The proposed technique was compared with other existing techniques and the results of the comparison are shown in Table III. From these results we can see that the proposed technique enhanced efficiency by minimizing encryption-decryption times, and maximizing throughput which speeds up the proposed technique. Note that increasing the block size will increase the technique efficiency by decreasing the encryption-decryption time and increasing the throughput. TABLE II. MSE AND PSNR CALCULATIONS Image number Comparing encrypted image with original Comparing decrypted image with original MSE PSNR MSE PSNR 1 1.6997e+004 13.4173 0 Infinite 2 7.8742e+003 21.1118 0 Infinite 3 6.0695e+003 23.7150 0 Infinite 4 7.7992e+003 21.2075 0 Infinite 5 1.1871e+004 17.0068 0 Infinite 6 1.4770e+004 14.8217 0 Infinite 7 1.3579e+004 15.6623 0 Infinite 8 1.3214e+004 15.9352 0 Infinite 9 1.0662e+004 18.0805 0 Infinite 10 1.2664e+004 16.3601 0 Infinite TABLE III. COMPARISON RESULTS Method Encryption time (s) Decryption time (s) Throughput (Mbits) Speedup of the proposed method Order Proposed 0.0513 0.0513 29.2398 1 1 [4] 0.06469 0.062727 23.1876 1.2610 2 [6] 0.23 0.23 6.5217 4.4835 4 [7] 0.5 0.5 3 9.7466 6 [8] 0.4 0.4 3.7500 7.7973 5 [9] 0.12 0.12 12.5000 2.3392 3 [10] v. A-I 0.56 0.56 2.6786 10.9161 7 [10] v. A-II 1.01 1.01 1.4852 19.6874 8 Image size=256Ɨ256Ɨ3Ɨ8=1572864bit=1.5000Mbits Fig. 6. Relationship between image size and encryption time The proposed technique was implemented using the previous images with a block size equal to 16 pixels and with one 16 element key, the results of the implementation are shown in Tables IV-V. TABLE IV. PARAMETERS FOR BLOCK SIZE =16, ONE KEY Image number Size (Mbits) Encryption time (s) Decryption time (s) Throughput (Mbps) 1 2.0672 0.0290 0.0290 71.2817 2 1.1587 0.0170 0.0170 68.1597 3 0.3750 0.0050 0.0050 75.0000 4 8.5876 0.1250 0.1250 68.7012 5 4.1199 0.0560 0.0560 73.5692 6 25.9100 0.3670 0.3670 70.5993 7 18 0.2540 0.2540 70.8661 8 7.0862 0.1010 0.1010 70.1602 9 3.2959 0.0470 0.0470 70.1255 10 1.1547 0.0160 0.0160 72.1707 Decrypted image 0 100 200 0 1 2 3 x 10 4 Red histogram 0 100 200 0 1 2 3 x 10 4 Green histogram 0 100 200 0 1 2 3 x 10 4 Blue histogram
  • 5. Engineering, Technology & Applied Science Research Vol. 9, No. 3, 2019, 4165-4168 4168 www.etasr.com Al-Dwairi et al.: An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images Here the technique efficiency was rapidly increased but with some negative effects by increasing the PSNR between the original and the encrypted image, which means that the encrypted image moves toward the original image. However, this level of PSNR is still acceptable. Table VI shows the efficiency speedup of increased block size. TABLE V. MSE AND PSNR FOR BLOCK SIZE =16 AND ONE KEY Image number Comparing encrypted image with original Comparing decrypted image with original MSE PSNR MSE PSNR 1 9.1362e+003 19.6253 0 Infinite 2 7.4460e+003 21.6710 0 Infinite 3 7.3327e+003 21.8243 0 Infinite 4 7.5590e+003 21.5203 0 Infinite 5 8.6746e+003 20.1437 0 Infinite 6 8.5122e+003 20.3327 0 Infinite 7 8.7733e+003 20.0305 0 Infinite 8 8.1958e+003 20.7116 0 Infinite 9 7.7113e+003 21.3209 0 Infinite 10 7.3976e+003 21.7362 0 Infinite TABLE VI. SPEEDUP WITH INCREASED BLOCK SIZE Image number Throughput (Mbps) Speed up of (2) Block size=8 Number of keys=4 (1) Block size=16 Number of keys=1 (2) 1 29.1151 71.2817 2.4483 2 28.2613 68.1597 2.4118 3 28.8462 75.0000 2.6000 4 29.2097 68.7012 2.3520 5 29.2190 73.5692 2.5179 6 29.0145 70.5993 2.4332 7 28.6624 70.8661 2.4724 8 28.6890 70.1602 2.4455 9 28.6600 70.1255 2.4468 10 29.6085 72.1707 2.4375 VI. CONCLUSIONS An efficient and highly secure technique for color image encryption-decryption was proposed. The proposed technique was implemented and tested, and the experimental results showed the following conclusions: ā€¢ The proposed technique is very efficient by increasing the throughput and decreasing encryption-decryption times. ā€¢ The proposed technique is 100% accurate by achieving zero MSE and infinite PSNR between the original image and the decrypted one. REFERENCES [1] M. J. Aqel, Z. AlQadi, A. A. Abdullah, ā€œRGB Color Image Encryption- Decryption Using Image Segmentation and Matrix Multiplicationā€, International Journal of Engineering and Technology, Vol. 7, No. 3.13, pp. 104-107, 2018 [2] J. Thakur, N. Kumar, ā€œDES, AES, and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysisā€, International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 2, pp. 6-12, 2011 [3] S. A. M. Rizvi, S. Z. Hussain, N. Wadhwa, ā€œA Comparative Study of Two Symmetric Encryption Algorithms across Different Platformsā€, International Conference on Security and Management, World Academy of Science, Las Vegas, USA, July 18-21, 2011 [4] S. Wang, Y. Zheng, Z. Gao, ā€œA New Image Scrambling Method through Folding Transformā€, IEEE International Conference on Computer Application and System Modeling, Taiyuan, China, October 22-24, 2010 [5] J. N. Abdel-Jalil, ā€œPerformance analysis of color image encryptiondecryption techniquesā€, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016 [6] G. Ye, ā€œAn Efficient Image Encryption Scheme based on Logistic mapsā€, International Journal of Pure and Applied Mathematics, Vol. 55, No. 1, pp. 37-47, 2009 [7] T. Sivakumar, R. Venkatesan, ā€œA Novel Image Encryption Approach using Matrix Reorderingā€, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013 [8] H. Gao, Y. Zhang, S. Liang, D. Li, ā€œA New Chaotic Algorithm for Image Encryptionā€, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393- 399, 2006 [9] G. Chen, Y. Mao, C. K. Chui, ā€œA Symmetric Image Encryption Scheme based on 3D Chaotic Cat Mapsā€, Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749ā€“761, 2004 [10] K. Loukhaoukha, J. Y. Chouinard, A. Berdai, ā€œA Secure Image Encryption Algorithm Based on Rubik's Cube Principleā€, Journal of Electrical and Computer Engineering, Vol. 2012, Article ID 173931, pp. pp. 1-13, 2012 [11] X. Wang, J. Zhang, ā€œAn Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operationā€, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008 AUTHORS PROFILE Majed O. Al-Dwairi, PhD in Communication Systems. He was born in 1968 in Jordan. He received his Diploma Degree in 1994 and his PhD degree from Ukraine state Academy in 1998 in the field of Multichannel Communication. An associate professor in the Department of Communication Engineering Technology, Faculty of Engineering Technology, Al-Balqaā€™ Applied University, Amman, Jordan. His research interests include optical communication networks, digital communications, signal and image processing, Antenna design, and microstrip patch antennas. Amjad Y. Hendi, PhD in Radio and TV Systems. He received his Diploma Degree in 1994 and PhD Degree from the Ukraine state Academy in 1998 in the field of Radio & TV systems. His research interests include digital communications, signal and image processing, antenna design, optimization techniques in antenna design, and antenna measurement techniques and microstrip patch antennas. Ziad A. AlQadi, PhD in Computer Engineering. He was born in 1955 in Jordan. He received his Diploma Degree in 1980 and PhD Degree from Ukraine in 1986 in the field of Computer Engineering. Currently he is a Professor at the Computer Engineering Department, Faculty of Engineering Technology, Al-Balqaā€™ Applied University, Amman, Jordan. View publication statsView publication stats