Submit Search
Upload
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced Avalanche Effect
•
0 likes
•
1 view
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i9/IRJET-V10I9129.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd Iaetsd
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
AIRCC Publishing Corporation
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
AIRCC Publishing Corporation
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
ijcsit
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
IRJET Journal
Recommended
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd Iaetsd
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
AIRCC Publishing Corporation
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
AIRCC Publishing Corporation
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
ijcsit
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
IRJET Journal
www.ijerd.com
www.ijerd.com
IJERD Editor
R04405103106
R04405103106
IJERA Editor
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
IJECEIAES
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
IRJET- Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
IRJET Journal
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
IJITCA Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced Avalanche Effect
www.ijerd.com
www.ijerd.com
IJERD Editor
R04405103106
R04405103106
IJERA Editor
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
IJECEIAES
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
IRJET- Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
IRJET Journal
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
IJITCA Journal
Similar to Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced Avalanche Effect
(20)
www.ijerd.com
www.ijerd.com
R04405103106
R04405103106
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
IRJET- Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
Image encryption using aes key expansion
Image encryption using aes key expansion
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
JIT KUMAR GUPTA
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Kamal Acharya
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
ronahami
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
gragchanchal546
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
ppkakm
Signal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
National Chung Hsing University
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
sumitt6_25730773
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Amil baba
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
RashidFaridChishti
Recently uploaded
(20)
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
Signal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced Avalanche Effect
1.
© 2023, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 718 Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced Avalanche Effect Chirag Date1, Chris Correia2, Yashvi Vaghela3, Harshal Vaidya4 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today's data-driven landscape, securing digital assets is imperative. Digital images constitute a significant portion of the data transferred online, making them vulnerable to data theft and unauthorized access. This study aims to mitigate these risks by introducing an efficient encryption method. This research addresses the critical need for safeguarding digital image transfers. Employing a Symmetric Block Cipher in Electronic Code Book mode, the algorithm divides images into 64-pixel blocks for encryption. The key generation process incorporates prime numbers and character lists, ensuring a robust encryption key. The algorithm's unique strength lies in its combination of additive and multiplicative ciphers, introducing unpredictability and diffusion. The proposed algorithm achieves an exceptional avalanche effect of 98.48%, highlighting its ability to obscure patterns and relationships between the original and encrypted images. Additionally, the algorithm maintains a flat histogram, indicating a uniform distribution of pixel intensities, a desired characteristic for secure image encryption. In conclusion, the algorithm excels in both security and efficiency, making it suitable for various applications requiring the protection of sensitive image data. Its strong avalanche effect and decryption accuracy provide robust security in the face of evolving cyber threats. Future work could extend this algorithm to RGB images. Key Words: Symmetric Block Cipher, Grayscale Image Encryption, Avalanche Effect, Data Security 1.INTRODUCTION In today’s modern world, data has become the lifeblood of society and the economy, shaping the way we live, work, communicate, and make decisions. The need for safe data storage, retrieval, and transfer has also increased along with the exponential growth of data. Ensuring the confidentiality, integrity, and availability of data is not only a technical necessity but a strategic imperative to maintain trust, protect privacy, and enable informed decision-making in this interconnected world. Digital images constitute a substantial portion of the data being transferred online. Because of their intuitiveness and ease, they have become key data transmission material in the network. Particularly in light of the present degradation in network security, information transmission and sharing based on digital photographs regularly confront issues of data theft, deletion, and assault, which have led to major losses for the owners or publishers of digital images. As a result, it is important to prioritize the secure transfer of these digital images to prevent unauthorized access and potential breaches. The result of compromised image transfer goes beyond mere financial losses. They encompass a broader spectrum of data security consequences, including identity theft, loss of intellectual property, erosion of trust, and violation of privacy rights. The consequences ripple across individual users, businesses, and organizations alike, impacting their credibility and disrupting their operations. Therefore, establishing secure protocols for transferring digital images takes on paramount significance. One of the most effective ways to secure data, especially when it comes to the transfer of digital images, is by using encryption. Encryption is a process that transforms data into an unreadable format through the use of complex algorithms. This rendering of data into an unintelligible form serves as a virtual lock, ensuring that only those with authorized access can decrypt and comprehend the information. Encryption safeguards the confidentiality of images by making it exceedingly difficult for attackers to understand the data. This is particularly crucial when images contain personal information, intellectual property, or any other sensitive content. By rendering images into a scrambled format, encryption ensures that even if data falls into the wrong hands, it remains functionally useless without the corresponding decryption key. In a world where cyber threats continue to evolve and adapt, encryption stands as a foundational pillar of data security. It instills trust in data exchanges, and as technologies advance and cyber threats become more sophisticated, encryption remains a resilient and versatile tool that can adapt to various scenarios and security requirements. A common method in cryptographic techniques is cipher block chaining. In the context of digital image transfer, cipher block chaining involves breaking down the image into smaller blocks, and then encrypting them in a way that each block's encryption depends on the previous block's encrypted output. As a result, it becomes more International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
2.
© 2023, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 719 difficult for attackers to identify patterns in the encrypted data due to the increased interdependence between the blocks. The advantage of cipher block chaining for images is its resistance to patterns. Without chaining, if two identical blocks of data are encrypted using the same key, they would produce the same ciphertext, potentially revealing information about the data. In cipher block chaining, even if the data blocks are identical, the interdependence introduced by the chaining mechanism ensures that they will have different encrypted forms. 2. LITERATURE REVIEW Panigrahy, S.K., Acharya, B. and Jena, D [1] employed generating self-invertible matrices for the Hill Cipher algorithm , which removed the computational cost involved in finding the inverse of the matrix while decrypting the message. The research covered the Hill Cipher's drawbacks, including its inability to encrypt pictures with large portions of a single color. The proposed method was tested on different grayscale and color images, and the results were presented. Acharya, B., Panigrahy, S.K., Patra, S.K. and Panda, G. [2] addresses the challenge of key invertibility and presents a method to generate an involutory key matrix, ensuring decryption without matrix inversion. The algorithm demonstrated effectiveness in encrypting grayscale and color images. It overcame the limitations of the original Hill Cipher, especially for images with uniform backgrounds. The research offered valuable insights for image encryption. Singh, L.D. and Singh, K.M [3] mapped the pixel values of the image to Elliptic curve coordinates using a lookup table or point multiplication operation with a generator. The data stream from the image is encrypted using a pseudo-random key stream created by a cyclic elliptic curve point and chaotic system. To decrypt the image, a mapping table is required. The Elliptic Curve Discrete Logarithm Problem provides high security with the use of comparatively smaller key sizes to other cryptographic techniques. Jolfaei, A. and Mirghadri [4] presented a combination of pixel shuffling and a modified version of simplified AES. The encryption scheme uses chaotic baker's map for pixel shuffling and S-AES algorithm for encryption. The algorithm was evaluated through various tests and found to have satisfactory security and efficiency. The cipher has a uniform distribution and is resistant to statistical and known plaintext attacks. The proposed scheme also recorded high key sensitivity, making it difficult for an attacker to break the cipher. Akkasaligar, P.T. and Biradar, S., 2020 [5] applied cryptography in medical image encryption discusses the challenges of providing security and maintaining confidentiality of medical images during transmission. The research used DNA cryptography for medical image encryption. The study suggested a selective medical image cryptosystem employing a dual hyperchaos map and DNA sequences, since traditional encryption techniques are unable to offer the required level of security for medical images. The research explained the digitized medical image encryption schemes and the entropy measurement used to evaluate the quality of the encryption algorithm. Krikor, L., Baba, S., Arif, T. and Shaaban, Z. [6] used stream cipher and DCT for encryption of data with visual characteristics. The algorithm introduced a selective encryption method that encrypts only small parts of the image bitstream. The two levels of security for digital image encryption: low-level and high-level security encryption where lower-level degrades the visual quality of image, while the latter scrambled the content completely. A. B. Mohamed, G. Zaibi and A. Kachouri [7] investigated the application of RC5 and RC6 block ciphers for securing digital image transmission in contexts such as military applications, radar systems, and biometrics. They assessed the encryption efficiency of the algorithms, performed a thorough security analysis including key space analysis and differential attacks, and evaluated their performance in the presence of errors in ambient noise. The results demonstrated that while RC6 offers higher security, it comes at the cost of increased energy consumption and packet retransmission in noisy environments. The research emphasizes the need for a balanced approach in choosing encryption algorithms, considering both security and energy efficiency, particularly in applications like wireless sensor networks. S. Sangewar and S. Gugulothu [8] presented a method for securing image transmission using visual cryptography. It addresses the challenge of transmitting confidential images securely over a network. The method involves splitting two confidential images, overlaying the portions, and then encrypting the resulting image. RSA algorithm and hashing methods are employed in the encryption process. At the receiver end, decryption requires a key provided by the sender. 3. METHODOLOGY The proposed algorithm is a block cipher in Electronic Code Book mode. The algorithm makes use of three unique lists, each with a particular function. These lists are essential components of the algorithm. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 720 - `prime_list`: This list contains a series of prime numbers. These primes are used as multipliers in the multiplicative cipher, a crucial component of the encryption process. - `multi_inv_list`: This list holds the multiplicative inverses corresponding to the prime numbers in `prime_list`. Multiplicative inverses are essential for decryption. - `char_list`: A list of characters, including digits and uppercase letters. It's used to generate a random encryption key. 3.1 Key generation In key generation, the algorithm initiates by generating a 64-bit random encryption key, utilizing characters from char_list. This key is fundamental to the encryption and decryption procedures, assuring the security of the data. The randomness and length of this key contribute significantly to the robustness of the encryption scheme, making it exceedingly challenging for unauthorized parties to decipher the protected information. Fig 1. Proposed Key Generation algorithm The encryption key is subdivided into 16 subkeys. Each subkey is an 8-character string extracted from the original key. The function repeatedly does a circular left shift operation on the 64 bit key which is passed through a randomness function to generate subkeys. The number of times shifting operations are performed depends on the round number as shown in Table 1. The randomness function introduces a degree of unpredictability in the encryption process. a random bit position is selected within the key, encompassing all 64 bits, and is designated for modification. Subsequently, the chosen bit is toggled or "flipped" using the flip_bit function, which essentially inverts its value. This seemingly minor alteration is instrumental in bolstering the algorithm's resistance against attacks and enhancing its avalanche effect. Table -1: Key generation shifting operation During each round, a random bit of key is replaced by a random value from the ‘char_list’ using the flip-bit function. Introducing randomness into the key ensures that even if an attacker has some knowledge of the key expansion process, they cannot easily predict the exact subkeys used in each round, thereby bolstering the overall security of the cryptographic system. 3.2 Encryption scheme The input image is loaded and represented as a grayscale image, with pixel values ranging from 0 to 255. The dimensions of the image are determined by rows and columns. The image is divided into 64-pixel blocks. It is done by first converting the 2D image matrix into a 1D list by iterating through rows and columns of the image. This is done to allow the processing of image pixel by pixel. If the total number of pixels is not evenly divisible by 64, it calculates how many additional pixels are needed to create complete 64-pixel blocks and stores this in extra_pixel. It appends the required number of zero pixels to the end of the 1D list to ensure that the image can be divided evenly into 64-pixel blocks. These zero pixels are used to pad the image. It then iterates through the 1D list and extracts consecutive blocks of 64 pixels, storing each block as a sublist in the input_blocks list. Each block is processed separately during encryption and decryption. The encryption function takes image blocks, which is a list of 64 integers representing 8x8 pixel values of an image block, and a key, which is a 64-character string used as the encryption key. The input block of 64 pixels is further sliced down to sub-blocks of 8 pixels each It initializes an empty list input_blocks to hold the 8 sub-blocks of the input image block. These sub-blocks are 8 pixels each and Key generation shifting Rounds Shift 2,5,9,13 2 char circular left shift Other 1 char circular left shift
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 721 are created by slicing the input_value list into 8 equal parts. The image blocks go through 16 rounds of encryption, where for each round: The function iterates through the 8 sub-blocks in input_blocks. For each sub-block as in Fig 3. , a custom encryption function is called which works for each pixel value. The result of this function call is a new 8-pixel sub- block, which overwrites the original sub-block in input_blocks. Fig 2. Proposed Encryption Rounds scheme At the core of the algorithm, there are two pairs of essential functions: OwnEncrypt and OwnDecrypt. These functions are responsible for performing encryption and decryption on 8-character input blocks, employing the provided encryption key. After each round up of the OwnEncrypt function until the 15th round, it performs a left shift operation on the input_blocks. This left shift operation is a data manipulation step that is common in block ciphers to introduce diffusion. The custom function combines two types of ciphers, namely additive and multiplicative, to transform the input pixels. The 8-character key is divided into two parts, key1 and key2 containing 4 characters each. Similarly, the 8- character input value is separated into two parts, input1 and input2, with input1 representing the first 4 characters and input2 representing the last 4 characters. Fig 3. Proposed Pixel Encryption scheme The first part of input and key goes through an additive cipher in which each character in key1 at the corresponding position is converted into an index value using char_list. The index value obtained is used in the subsequent operation. The character in input is subjected to an addition operation with index value . The result is taken modulo 256, ensuring that the value remains within the byte range. Fig 4 . Proposed OwnEncrypt scheme The second part of input and key goes through a multiplicative cipher. Similar to the additive cipher, the character in key2 at the corresponding position is converted into an index value using char_list. This index value is used to access a prime number from ‘prime_list’. The prime number retrieved from prime_list is used for
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 722 multiplicative operation with character of input and the result is taken modulo 256 to ensure the value remains within the byte range. The results of both the additive and multiplicative ciphers go through p4 permutation. P4 Permutation technique reorder bits within a 4-bit input shuffling the bits in a defined manner. After completing all 16 rounds of encryption, the function flattens the encrypted pixel values into a 64-element list. 4. RESULT To assess the algorithm's ability to obscure patterns and relationships between the original grayscale image and its encrypted counterpart, we conducted an avalanche effect analysis. The results are summarized in Table 2. Table -2: Avalanche Effect Percentage Comparison Average Avalanche Effect Percentage J. R. Paragas,A. M. Sison &R. P. Medina(2019) [9] 55.34% Proposed Algorithm 98.48% The finding underscores the algorithm's remarkable capability to obscure any discernible patterns or relationships between the original image and its encrypted counterpart. These results underscore the remarkable capability of our algorithm to obscure any discernible patterns or relationships between the original grayscale image and its encrypted counterpart. Even minor adjustments in the input image or encryption key result in substantial modifications in the encrypted image, making it highly resistant to unauthorized decryption attempts. (A) (B) Fig 5. (A) Original Image and its corresponding histogram. (B) Encrypted Image and its corresponding histogram. Assessing the impact of cryptographic operations on image quality and pixel distribution is paramount. Histogram analysis plays a pivotal role in this evaluation, providing insights into how encryption processes affect the distribution of pixel intensities within a grayscale image. A well-encrypted image should ideally exhibit a uniform distribution with regards to pixel intensities, obscuring any discernible patterns or recognizable features. Table -3: Correlation Coefficient on Leena image A correlation value that is close to zero indicates a weak to nonexistent linear relationship. This is normally what you want to achieve when encrypting images. It shows that the pixel values have been altered during the encryption process in a way that makes them seem unrelated to the original image, which is a desired characteristic for secure image encryption. The exceptional decryption accuracy and strong avalanche effect observed in our algorithm position it as a viable solution for secure image encryption and decryption. Our algorithm's 100% decryption accuracy assures users that their data will remain intact during transmission and storage, reducing the risk of information loss or Leena Image Horizontal Vertical Diagonal Original Image 0.9698 0.9843 0.9551 Encrypted Image 0.1366 0.3789 0.0490
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 723 corruption. The significant avalanche effect indicates the algorithm's resilience to attacks that attempt to manipulate input data or keys, adding an extra layer of security. This feature enhances the algorithm's suitability for scenarios where adversaries may attempt to breach the encryption. In conclusion, our algorithm excels in terms of both security and efficiency, making it a strong candidate for safeguarding sensitive image data across various applications. 5. CONCLUSIONS In conclusion, our proposed algorithm excels in terms of both security and efficiency, making it a strong candidate for safeguarding sensitive image data across various applications. The histogram analysis of the encrypted image further supports the effectiveness of our encryption algorithm. A flat histogram that is in stark contrast to the fluctuating histogram of the original image confirms that our encryption algorithm produces cryptographic images with a very uniform distribution of pixel values. The algorithm's remarkable capability to obscure patterns, uniform pixel intensity distribution, and weak correlation with the original image underline its effectiveness in secure image encryption. As data security continues to be of paramount importance in the modern digital landscape, our algorithm provides a reliable means to protect the confidentiality and integrity of grayscale images. Its strong avalanche effect and decryption accuracy reassure users that their data will remain secure, even in the face of evolving cyber threats. The proposed algorithm can further be extended to RGB images. REFERENCES [1] Panigrahy, S.K., Acharya, B. and Jena, D., 2008. Image encryption using self-invertible key matrix of hill cipher algorithm. [2] Acharya, B., Panigrahy, S.K., Patra, S.K. and Panda, G., 2009. Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1), pp.663-667. [3] Singh, L.D. and Singh, K.M., 2015. Image encryption using elliptic curve cryptography. Procedia Computer Science, 54, pp.472-481. [4] Jolfaei, A. and Mirghadri, A., 2011. Image encryption using chaos and block cipher. Computer and Information Science, 4(1), pp.172-185. [5] Akkasaligar, P.T. and Biradar, S., 2020. Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective, 29(2), pp.91-101. [6] Krikor, L., Baba, S., Arif, T. and Shaaban, Z., 2009. Image encryption using DCT and stream cipher. European Journal of Scientific Research, 32(1), pp.47-57. [7] A. B. Mohamed, G. Zaibi and A. Kachouri, "Implementation of RC5 and RC6 block ciphers on digital images," Eighth International Multi-Conference on Systems, Signals & Devices, Sousse, Tunisia, 2011, pp. 1-6, doi: 10.1109/SSD.2011.5767447. [8] S. Sangewar and S. Gugulothu, "Securing Images using Encryption & Decryption," 2023 8th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2023, pp. 480-486, doi: 10.1109/ICCES57224.2023.10192684. [9] J. R. Paragas, A. M. Sison and R. P. Medina, "An Improved Hill Cipher Algorithm using CBC and Hexadecimal S-Box," 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 2019, pp. 77-81, doi: 10.1109/ECICE47484.2019.8942717.
Download now