SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 333
AN IMPROVED COLOR IMAGE ENCRYPTION ALGORITHM WITH
PIXEL PERMUTATION AND BIT SUBSTITUTION
Lini Abraham1
, Neenu Daniel2
1
M Tech Student, Computer Science and Engineering (CSE), Viswajyothi College of Engineering and Technology,
Vazhakulam, Kerala, India, linirt33@gmail.com
2
Assistant Professor, Computer Science and Engineering (CSE), Viswajyothi College of Engineering and Technology,
Vazhakulam, Kerala, India, neenudaniel@email.com
Abstract
Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the
main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This
paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique
is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on
the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating
the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation
analysis, analysis of NPCR and UACI values etc.
Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm,
chaos.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Information security plays a significant role in all fields,
especially those related to confidential business or military
affairs. Keeping data from being accessed by unauthorized
users and from being corrupted is called data security.
Encryption is a very important security mechanism. It works
by scrambling the information into unreadable information
and then uses a key to unscramble it for reading. Encryption
on image or video objects has its own requirements due to
the intrinsic characters of images such as bulk data capacity
and high redundancy. Traditional symmetric encryption
algorithms are generally not suitable for image encryption
due to their slow speed in real-time processing and some
other issues such as in handling various data formatting. A
variety of chaos-based digital image encryption algorithms
have been suggested. Usually chaos based encryption
algorithms uses small key spaces. The theory of chaos has
been widely used for image encryption because of its
excellent cryptography characteristics and intrinsic features
of image. Various algorithms provide different degrees of
security and it is based on how hard they are to break. If the
cost required to break an algorithm is greater than the value
of the encrypted data then the algorithm probably
considered to be safe. Modern high quality image encryption
methods have several flaws and are subjected to extensive
attacks by expert cryptanalyst. Thorough study and analysis
between these techniques are needed to measure the
performance and to choose the better one for the intended
application. For certain applications speed of encryption
may be the prime concern and for some other cases the
security will be important.
There are three kinds of encryption techniques namely
substitution, transposition or permutation and techniques
that include both transposition and substitution. Substitution
schemes change the pixel values while permutation schemes
just shuffle the pixel values based on the algorithm. In some
cases both the methods are combined to improve security.
[3] Is an introduction about chaos based image encryption.
Chaos theory has proved to be an excellent alternative to
provide a fast, simple, and reliable image encryption scheme
that has a high enough degree of security. The method in [8]
is chaos based using bit level permutation. Permutation at
the bit level not only changes the position of the pixel but
also alters its value. In [9] a novel image encryption method
based on total shuffling scheme is illustrated. In [10]
combinations of two logistic maps are used for improving
the security of encryption. Encryption in [11] uses multiple
chaotic systems. But each of these methods has some
security issues. The algorithm in [12] combines the diffusion
and confusion operations and uses the spatial-temporal
chaotic system for generating the key. But this is time
consuming. As the key space increases the security of the
algorithm also get improved. Here this proposed scheme is
applied on a chaos based secure image encryption algorithm
based on Rubik’s cube principle in [1]. It is an image
encryption algorithm based on Rubik’s cube principle. From
[2] it is evident that this algorithm performs well as
compared to the technique in [12] in time period and other
results are also comparable.
Differential and cryptographic attacks are major concerns in
data transmission. Even thorough some of the chaos based
image encryption techniques resist these types of attacks to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 334
some extent; more protecting solutions are needed for further improvement. Replay attack is one of the major
security outbreaks. It can be defined as a network attack in
which a genuine data transmission is maliciously repeated or
delayed. It can be done by the originator or by an advisory.
The common measures for this type of attacks are session
tokens, one time passwords, combination of nonce and
MAC and timestamps. The content in [4] describes the
replay attack. [5] and [6] proposes some methods to prevent
such attacks. In [7], Denning proposed a method for
preventing replay attack with the help of timestamps. These
methods are usually used for preventing replay attack in
normal data transmission. The proposed system is all about
to prevent the replay attack on digital image transmission
with the help of timestamps. The technique based on grey
scale images is proposed in [14]. In [14] only permutation
mechanism is used for encrypting the grey scale image. But
the proposed system improves the security of that algorithm
by adding a bit substitution technique in [15] for encrypting
color images.
The remaining of this paper is organized as follows. Section
2 describes the proposed system. The overview of the
algorithm is presented and detailed explanation of DNA bit
substitution technique is also given. In section 3 the new
image encryption technique is compared with the Rubik’s
cube technique and the result for the same is also presented.
The results of images with distinct and various sizes are
evaluated and discussed. The last section describes the
conclusions and further discussions.
Fig -1 Overview of the proposed system
2. PROPOSED SYSTEM
The proposed system is an enhancement to the Rubik’s cube
based technique in color image. The overview of the system
is given in Fig -1. First the timestamp is taken and added
with the shared key value. Then two random keys are
generated for permuting the pixel values of the image using
Rubik’s cube principle in [1]. Then a substitution technique
based on DNA sequences are employed which is described
in [15]. Then KBRP (Key Based Random Permutation) [13]
is used to hide the time-stamp in the encrypted image. That
will form the cipher image.
During decryption, first the time-stamp is extracted from the
encrypted image by using the shared secret key. The
difference between the extracted time and the current time is
taken. If that difference is within the threshold then the
decryption is performed otherwise it is rejected. For
performing the decryption, the time-stamp is appended with
the key and the two random numbers are generated. The
decryption is then performed to get the original image.
Before performing these operations the system time should
be synchronized.
Every module except the DNA substitution is already
explained in [14]. In that proposal only permutation of
pixels in the image was used. But if we are adding a
substitution along with that image the security will get
improved. In this paper a bit substitution method based on
DNA sequences is proposed based on [15]. The detailed
explanation about DNA sequence substitution is given
below.
Appending key and timestamp
Key
Generating two random keys for
encryption with the modified key
Encryption of the image using Rubik’s
cube principle and DNA substitution
Hiding the timestamp on the encrypted
image
Extracting the timestamp from
encrypted image and checking replay
attack
Appending key and the timestamp
Decrypting the image using Rubik’s
cube principle and DNA reverse
substitution
Generating two random keys for
decryption with the help of modified
key
Key
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 335
2.1 Chaotic DNA Substitution
The proposed substitution method is a chaotic DNA
transformation. Here two rules or steps are involved. They
are: -
 Binary coding rule
 Complementary rule
The binary coding rule transforms letters A, C, G and T into
binary codes and vice versa. In this particular method the
following binary encoding is adopted. A=00, C=01, G=10,
T=11. That means A is coded as "00", C as "01" etc. Then
each pixel value in the encryption is transformed to binary
using the DNA encoding.
In complementary rule, each letter x is assigned to a
complement denoted C(x). Here the C(x) represents the
complement of x. For getting a clear picture, consider an
example, for the following complementary transformation:
(AT)(TC)(CG)(GA), the conclusion is that C(A) = T, C(T) =
C, C(C) = G and C(G) = A. There are six allowable
complementary transformations, they are: -
(AT)(TC)(CG)(GA)
(AT)(TG)(GC)(CA)
(AC)(CT)(TG)(GA)
(AC)(CG)(GT)(TA)
(AG)(GT)(TC)(CA)
(AG)(GC)(CT)(TA).
The perturbed chaotic value used to control the substitution
process is transformed to binary format (8 bits). Each pixel
is represented by 8 bits (4 pairs). For example consider the
pixel value "222" which is represented as 11 01 11 10. A
random value is generated for each pixel on the image using
PWLCM (Piecewise Linear Chaotic Map). The equation for
PWLCM is given by: -
Where p is the positive control parameter and the chaotic
values x(i),i = 1,2,...,n, are real values and belong to the
intervals (0, 0.5) and (0, 1) respectively. The initial values p
and x(0) are calculated from the modified key value. The
output from the chaotic map is represented in 8 bits. For
each pixel in the plain image a random value in 8 bits is
generated and the pixel value is represented in 4 pairs as
explained above.
From the random value generated for a pixel, the most
significant 3 bits are used to select one of the six
transformations given above. And that transformation rule is
used for that particular pixel value. The transformation
number can be calculated by the following equation: -
Remaining 5 bits are used to compute the number of
iterations the complementary transformation is to be applied
on each pair of bits. Here the complementary rule is applied
only on 3 pairs, the right most pair is not used because of the
chances of changes during the time-stamp hiding. In other
words the fourth and fifth bits of the random number are
used to generate how many times it(1), the complementary
transformation is applied to the first two bits of the pixel
value in process. The fifth and sixth random bits are used to
determine number of the complementary rounds of it(2) for
the second pair of bits. The sixth and seventh bits are used
for the third pair of the value in process. The extraction of
this number of iterations on 1st
, 2nd
and 3rd
pair of pixel
values are given by: -
For example, consider the previous example "222" as the
pixel value. It can be represented as 11 01 11 10. Now take
the first pair of bits "11". The binary coding rule is given as
A=00, C=01, G=10, T=11. From the generated chaotic value
the most significant 3 bits can be used to find out the
sequence number. Suppose that the sequence number for
that particular pixel is 5. So the 5th complementary rule is
(AG)(GT)(TC)(CA).
If it(1) = 2, then the number of iterations for the first pair is
2. Here the first pair "11" means T from the binary coding
rule. In first iteration C(T) = C( from fifth sequence). The
value of C is "01" as per the binary coding rule. First T
("11") is replaced with C ("01"). In the second iteration
C(C) = A. So "01" is replaced by "00". This is performed for
the remaining two pairs and again they are combined
together to get the cipher value. For each pixel this is
repeated. So for each one the sequence selected and the
number of iterations is different.
3. RESULTS AND DISCUSSIONS
The Fig -2 shows an example for the encryption and
decryption using the proposed method. The test image
selected is AIR plane. The experiments are done on
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 336
256×256 images with 128 bit key. We can see that the
original and the decrypted images are same and the
encrypted image is random. For performing the analysis the
parameters like NPCR (Number of pixel change
rate), UACI (Unified average changing intensity), entropy,
correlation coefficient and PSNR (Pixel to noise ratio) are
evaluated. The definitions and detailed explanations of these
parameters are given in [16].
Fig -2 Example using improved scheme
Some of the evaluation results for the improved scheme are
given in Table -1. The NPCR is 99.6246 and the UACI is
34.7988 for a 256×256 AIR plane color image. The NPCR
should be high as possible for an enhanced technique. The
UACI should be around 33%. We can see that the
correlation coefficients are also low. The time for encryption
and decryption will vary from system to system. The time
required for overall process is below one minute. The PSNR
value between original and decrypted image is infinity. This
means that the pixel values in original and the encrypted
images are distinct.
Table -1 Results of simulation on color image
Parameter Improved technique
NPCR
99.6246
UACI
34.7988
Entropy
7.9970
Horizontal correlation
-0.0347
Vertical correlation
0.0015
Diagonal correlation
-0.0022
PSNR
Infinity
Now the results by the application of the new scheme in
different 256×256 color images are given in Table -2. Here
the test images are Lena, Baboon and Pepper. As it includes
the effect of the time-stamp which varies by time, a little
variation in the results is possible. It is because of the reason
that on each times the timestamp varies. From the table we
can see optimal results.
Table -2 Results for different images having same size
Parameter AIR
plane
Lena Baboon Pepper
NPCR 99.6038 99.6048 99.6099 99.6068
UACI 34.7276 31.0178 29.1335 31.9751
Entropy 7.9973 7.9975 7.9973 7.9971
Horizontal
correlation
-0.0057 -0.1290 0.0013 -0.0030
Vertical
correlation
0.0037 -0.0026 0.3152 0.7563
Diagonal
correlation
0.1035 0.0041 -0.0016 0.2527
PSNR Infinity Infinity Infinity Infinity
Next the Rubik’s cube technique and the improved scheme
is applied on variable sized test images. The results of this
comparison are plotted as graphs in Fig -3 and Fig -4.
In Fig -3 the NPCR values are compared. Higher NPCR
values are desired for ideal encryption schemes. This will
indicate the percentage of different pixels between two
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 337
images. The red line shows the improved scheme and the
blue line is the Rubik’s cube based technique.
The Fig -4 shows the comparison of entropy values. It is an
important concept for analyzing an encryption scheme.
Entropy gives an idea about self-information. From the
results it is evident that the improved method is comparable
with the Rubik’s cube technique and provides more security.
Fig -3 Comparison of NPCR values
Fig -4 Comparison of UACI values
CONCLUSIONS
Chaos based encryption algorithms are employed nowadays
because of their better security and performance aspects.
Each of the image encryption techniques has its own
advantages. Identification of the suitable algorithm for a
particular application depends on the prerequisites of that
application. The technique using Rubik’s cube principle has
a large key space and its implementation is quite simple.
Later the security of the Rubik’s cube technique has
improved by adding time-stamp and chaotic DNA
substitution. The time-stamp is appended with the original
key. So the time-stamp is specially added to produce
different cipher texts by applying same key on same plain
text. Also it can be used to check the replay attack. But it is
under the assumption that the system time is synchronized.
In basic Rubik’s cube based approach bit substitution is not
used. So a chaotic bit substitution method based on DNA
sequences is added for improving the security. The
comparison results and assessments have done and
presented. From that the efficiency of the improved
approach is evident. The experimental result shows that the
improved scheme performs well in color images. New
techniques and modifications can be added on to the
proposed system for making excellent multimedia
applications.
REFERENCES
[1] Khaled Loukhaoukha, Jean-Yves Chouinard, and
Abdellah Berdai, “A Secure Image Encryption
Algorithm Based on Rubik’s Cube Principle”,
Department of Electrical and Computer
Engineering, 2011.
[2] Lini Abraham, Neenu Daniel, “Secure image
encryption algorithms: A review”, IJSTR, 2013.
[3] Yaobin Mao and Guanrong Chen, “Chaos-Based
Image Encryption”, in Hand- book of geometric
computing, Springer,2005.
[4] Li Gong and Paul Syverson, “Fail-stop protocols:
An approach to designing secure protocols”, In 5th
International Working Conference on De- pendable
Computing for Critical Applicaitons, pages 44–55,
September 1995.
[5] Sreekanth Malladi, Jim Alves-Foss, Robert B.
Heckendorn, “On Preventing Replay Attacks on
Security Protocols”.
[6] T. Aura “Strategies against replay attacks”, In
Proceedings of the 10th IEEE Computer Society
Foundations Workshop, pages 59 – 68, Rockport,
MA, June 1997. IEEE Computer Society Press.
[7] D. Denning and G. Sacco, “Timestamps in key
distribution protocols”. Communications of the
ACM, 24(8):553–536, August 1981.
[8] Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, Hai
Yu, “A chaos-based symmetric image encryption
scheme using a bit-level permutation”, Information
Sciences 181 1171–1186 Elsevier, 2010.
[9] G. Zhang and Q. Liu, “A novel image encryption
method based on total shuffling scheme”, Optics
Communications, vol. 284, no. 12, pp. 2775–2780,
2011.
[10]Ismail1, Mohammed Amin, Hossam Diab, “ A
Digital Image Encryption Algorithm Based A
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 338
Composition Of Two Chaotic Logistic Maps”,
Proc. 27th IEEE Int’l Conf. Signal Processing., pp.
733-739,2011.
[11]H.Alsafasfeh, and, A.A.Arfoa, Image encryption
based on the general approach for multiple
chaotic system, Journal of Signal and Information
Processing 2, 238- 244, 2011.
[12]Yong Wanga, Kwok-Wo Wong, XiaofengLiaoc,
Guanrong Chen, “A new chaos- based fast image
encryption algorithm”, in Applied Soft Computing,
Elsevier, 2011.
[13]Shakir M. Hussain1 and Naim M. Ajlouni, “Key
Based Random Permutation”, Journal of Computer
Science 2 (5): 419-421, 2006.
[14]Lini Abraham, Neenu Daniel, “Enhancing the
Security of Image Encryption Algorithms by
Adding Timestamp”, IJARET, Vol. 1, Issue VIII,
Sep. 2013.
[15]Abir Awad and Ali Miri, “A New Image
Encryption Algorithm Based on a Chaotic DNA
Substitution Method” in , Communications (ICC)
on IEEE, p. 1011-1015, June 2012.
[16]Jawad Ahmad and Fawad Ahmed, “Efficiency
Analysis and Security Evalu- ation of Image
Encryption Schemes”, in International Journal of
Video and Image Processing and Network Security,
IJVIPNS-IJENS, Vol:12 No.04, 2010.

More Related Content

What's hot

An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
eSAT Journals
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
eSAT Publishing House
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
AnsabArshad
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
eSAT Publishing House
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
ijcsit
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
eSAT Journals
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
Alexander Decker
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
Papitha Velumani
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
 

What's hot (17)

An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
C010511420
C010511420C010511420
C010511420
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Image Security
Image SecurityImage Security
Image Security
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 

Similar to An improved color image encryption algorithm with pixel permutation and bit substitution

IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
IRJET Journal
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
sipij
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
eSAT Publishing House
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 

Similar to An improved color image encryption algorithm with pixel permutation and bit substitution (20)

IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 

An improved color image encryption algorithm with pixel permutation and bit substitution

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 333 AN IMPROVED COLOR IMAGE ENCRYPTION ALGORITHM WITH PIXEL PERMUTATION AND BIT SUBSTITUTION Lini Abraham1 , Neenu Daniel2 1 M Tech Student, Computer Science and Engineering (CSE), Viswajyothi College of Engineering and Technology, Vazhakulam, Kerala, India, linirt33@gmail.com 2 Assistant Professor, Computer Science and Engineering (CSE), Viswajyothi College of Engineering and Technology, Vazhakulam, Kerala, India, neenudaniel@email.com Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Information security plays a significant role in all fields, especially those related to confidential business or military affairs. Keeping data from being accessed by unauthorized users and from being corrupted is called data security. Encryption is a very important security mechanism. It works by scrambling the information into unreadable information and then uses a key to unscramble it for reading. Encryption on image or video objects has its own requirements due to the intrinsic characters of images such as bulk data capacity and high redundancy. Traditional symmetric encryption algorithms are generally not suitable for image encryption due to their slow speed in real-time processing and some other issues such as in handling various data formatting. A variety of chaos-based digital image encryption algorithms have been suggested. Usually chaos based encryption algorithms uses small key spaces. The theory of chaos has been widely used for image encryption because of its excellent cryptography characteristics and intrinsic features of image. Various algorithms provide different degrees of security and it is based on how hard they are to break. If the cost required to break an algorithm is greater than the value of the encrypted data then the algorithm probably considered to be safe. Modern high quality image encryption methods have several flaws and are subjected to extensive attacks by expert cryptanalyst. Thorough study and analysis between these techniques are needed to measure the performance and to choose the better one for the intended application. For certain applications speed of encryption may be the prime concern and for some other cases the security will be important. There are three kinds of encryption techniques namely substitution, transposition or permutation and techniques that include both transposition and substitution. Substitution schemes change the pixel values while permutation schemes just shuffle the pixel values based on the algorithm. In some cases both the methods are combined to improve security. [3] Is an introduction about chaos based image encryption. Chaos theory has proved to be an excellent alternative to provide a fast, simple, and reliable image encryption scheme that has a high enough degree of security. The method in [8] is chaos based using bit level permutation. Permutation at the bit level not only changes the position of the pixel but also alters its value. In [9] a novel image encryption method based on total shuffling scheme is illustrated. In [10] combinations of two logistic maps are used for improving the security of encryption. Encryption in [11] uses multiple chaotic systems. But each of these methods has some security issues. The algorithm in [12] combines the diffusion and confusion operations and uses the spatial-temporal chaotic system for generating the key. But this is time consuming. As the key space increases the security of the algorithm also get improved. Here this proposed scheme is applied on a chaos based secure image encryption algorithm based on Rubik’s cube principle in [1]. It is an image encryption algorithm based on Rubik’s cube principle. From [2] it is evident that this algorithm performs well as compared to the technique in [12] in time period and other results are also comparable. Differential and cryptographic attacks are major concerns in data transmission. Even thorough some of the chaos based image encryption techniques resist these types of attacks to
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 334 some extent; more protecting solutions are needed for further improvement. Replay attack is one of the major security outbreaks. It can be defined as a network attack in which a genuine data transmission is maliciously repeated or delayed. It can be done by the originator or by an advisory. The common measures for this type of attacks are session tokens, one time passwords, combination of nonce and MAC and timestamps. The content in [4] describes the replay attack. [5] and [6] proposes some methods to prevent such attacks. In [7], Denning proposed a method for preventing replay attack with the help of timestamps. These methods are usually used for preventing replay attack in normal data transmission. The proposed system is all about to prevent the replay attack on digital image transmission with the help of timestamps. The technique based on grey scale images is proposed in [14]. In [14] only permutation mechanism is used for encrypting the grey scale image. But the proposed system improves the security of that algorithm by adding a bit substitution technique in [15] for encrypting color images. The remaining of this paper is organized as follows. Section 2 describes the proposed system. The overview of the algorithm is presented and detailed explanation of DNA bit substitution technique is also given. In section 3 the new image encryption technique is compared with the Rubik’s cube technique and the result for the same is also presented. The results of images with distinct and various sizes are evaluated and discussed. The last section describes the conclusions and further discussions. Fig -1 Overview of the proposed system 2. PROPOSED SYSTEM The proposed system is an enhancement to the Rubik’s cube based technique in color image. The overview of the system is given in Fig -1. First the timestamp is taken and added with the shared key value. Then two random keys are generated for permuting the pixel values of the image using Rubik’s cube principle in [1]. Then a substitution technique based on DNA sequences are employed which is described in [15]. Then KBRP (Key Based Random Permutation) [13] is used to hide the time-stamp in the encrypted image. That will form the cipher image. During decryption, first the time-stamp is extracted from the encrypted image by using the shared secret key. The difference between the extracted time and the current time is taken. If that difference is within the threshold then the decryption is performed otherwise it is rejected. For performing the decryption, the time-stamp is appended with the key and the two random numbers are generated. The decryption is then performed to get the original image. Before performing these operations the system time should be synchronized. Every module except the DNA substitution is already explained in [14]. In that proposal only permutation of pixels in the image was used. But if we are adding a substitution along with that image the security will get improved. In this paper a bit substitution method based on DNA sequences is proposed based on [15]. The detailed explanation about DNA sequence substitution is given below. Appending key and timestamp Key Generating two random keys for encryption with the modified key Encryption of the image using Rubik’s cube principle and DNA substitution Hiding the timestamp on the encrypted image Extracting the timestamp from encrypted image and checking replay attack Appending key and the timestamp Decrypting the image using Rubik’s cube principle and DNA reverse substitution Generating two random keys for decryption with the help of modified key Key
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 335 2.1 Chaotic DNA Substitution The proposed substitution method is a chaotic DNA transformation. Here two rules or steps are involved. They are: -  Binary coding rule  Complementary rule The binary coding rule transforms letters A, C, G and T into binary codes and vice versa. In this particular method the following binary encoding is adopted. A=00, C=01, G=10, T=11. That means A is coded as "00", C as "01" etc. Then each pixel value in the encryption is transformed to binary using the DNA encoding. In complementary rule, each letter x is assigned to a complement denoted C(x). Here the C(x) represents the complement of x. For getting a clear picture, consider an example, for the following complementary transformation: (AT)(TC)(CG)(GA), the conclusion is that C(A) = T, C(T) = C, C(C) = G and C(G) = A. There are six allowable complementary transformations, they are: - (AT)(TC)(CG)(GA) (AT)(TG)(GC)(CA) (AC)(CT)(TG)(GA) (AC)(CG)(GT)(TA) (AG)(GT)(TC)(CA) (AG)(GC)(CT)(TA). The perturbed chaotic value used to control the substitution process is transformed to binary format (8 bits). Each pixel is represented by 8 bits (4 pairs). For example consider the pixel value "222" which is represented as 11 01 11 10. A random value is generated for each pixel on the image using PWLCM (Piecewise Linear Chaotic Map). The equation for PWLCM is given by: - Where p is the positive control parameter and the chaotic values x(i),i = 1,2,...,n, are real values and belong to the intervals (0, 0.5) and (0, 1) respectively. The initial values p and x(0) are calculated from the modified key value. The output from the chaotic map is represented in 8 bits. For each pixel in the plain image a random value in 8 bits is generated and the pixel value is represented in 4 pairs as explained above. From the random value generated for a pixel, the most significant 3 bits are used to select one of the six transformations given above. And that transformation rule is used for that particular pixel value. The transformation number can be calculated by the following equation: - Remaining 5 bits are used to compute the number of iterations the complementary transformation is to be applied on each pair of bits. Here the complementary rule is applied only on 3 pairs, the right most pair is not used because of the chances of changes during the time-stamp hiding. In other words the fourth and fifth bits of the random number are used to generate how many times it(1), the complementary transformation is applied to the first two bits of the pixel value in process. The fifth and sixth random bits are used to determine number of the complementary rounds of it(2) for the second pair of bits. The sixth and seventh bits are used for the third pair of the value in process. The extraction of this number of iterations on 1st , 2nd and 3rd pair of pixel values are given by: - For example, consider the previous example "222" as the pixel value. It can be represented as 11 01 11 10. Now take the first pair of bits "11". The binary coding rule is given as A=00, C=01, G=10, T=11. From the generated chaotic value the most significant 3 bits can be used to find out the sequence number. Suppose that the sequence number for that particular pixel is 5. So the 5th complementary rule is (AG)(GT)(TC)(CA). If it(1) = 2, then the number of iterations for the first pair is 2. Here the first pair "11" means T from the binary coding rule. In first iteration C(T) = C( from fifth sequence). The value of C is "01" as per the binary coding rule. First T ("11") is replaced with C ("01"). In the second iteration C(C) = A. So "01" is replaced by "00". This is performed for the remaining two pairs and again they are combined together to get the cipher value. For each pixel this is repeated. So for each one the sequence selected and the number of iterations is different. 3. RESULTS AND DISCUSSIONS The Fig -2 shows an example for the encryption and decryption using the proposed method. The test image selected is AIR plane. The experiments are done on
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 336 256×256 images with 128 bit key. We can see that the original and the decrypted images are same and the encrypted image is random. For performing the analysis the parameters like NPCR (Number of pixel change rate), UACI (Unified average changing intensity), entropy, correlation coefficient and PSNR (Pixel to noise ratio) are evaluated. The definitions and detailed explanations of these parameters are given in [16]. Fig -2 Example using improved scheme Some of the evaluation results for the improved scheme are given in Table -1. The NPCR is 99.6246 and the UACI is 34.7988 for a 256×256 AIR plane color image. The NPCR should be high as possible for an enhanced technique. The UACI should be around 33%. We can see that the correlation coefficients are also low. The time for encryption and decryption will vary from system to system. The time required for overall process is below one minute. The PSNR value between original and decrypted image is infinity. This means that the pixel values in original and the encrypted images are distinct. Table -1 Results of simulation on color image Parameter Improved technique NPCR 99.6246 UACI 34.7988 Entropy 7.9970 Horizontal correlation -0.0347 Vertical correlation 0.0015 Diagonal correlation -0.0022 PSNR Infinity Now the results by the application of the new scheme in different 256×256 color images are given in Table -2. Here the test images are Lena, Baboon and Pepper. As it includes the effect of the time-stamp which varies by time, a little variation in the results is possible. It is because of the reason that on each times the timestamp varies. From the table we can see optimal results. Table -2 Results for different images having same size Parameter AIR plane Lena Baboon Pepper NPCR 99.6038 99.6048 99.6099 99.6068 UACI 34.7276 31.0178 29.1335 31.9751 Entropy 7.9973 7.9975 7.9973 7.9971 Horizontal correlation -0.0057 -0.1290 0.0013 -0.0030 Vertical correlation 0.0037 -0.0026 0.3152 0.7563 Diagonal correlation 0.1035 0.0041 -0.0016 0.2527 PSNR Infinity Infinity Infinity Infinity Next the Rubik’s cube technique and the improved scheme is applied on variable sized test images. The results of this comparison are plotted as graphs in Fig -3 and Fig -4. In Fig -3 the NPCR values are compared. Higher NPCR values are desired for ideal encryption schemes. This will indicate the percentage of different pixels between two
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 337 images. The red line shows the improved scheme and the blue line is the Rubik’s cube based technique. The Fig -4 shows the comparison of entropy values. It is an important concept for analyzing an encryption scheme. Entropy gives an idea about self-information. From the results it is evident that the improved method is comparable with the Rubik’s cube technique and provides more security. Fig -3 Comparison of NPCR values Fig -4 Comparison of UACI values CONCLUSIONS Chaos based encryption algorithms are employed nowadays because of their better security and performance aspects. Each of the image encryption techniques has its own advantages. Identification of the suitable algorithm for a particular application depends on the prerequisites of that application. The technique using Rubik’s cube principle has a large key space and its implementation is quite simple. Later the security of the Rubik’s cube technique has improved by adding time-stamp and chaotic DNA substitution. The time-stamp is appended with the original key. So the time-stamp is specially added to produce different cipher texts by applying same key on same plain text. Also it can be used to check the replay attack. But it is under the assumption that the system time is synchronized. In basic Rubik’s cube based approach bit substitution is not used. So a chaotic bit substitution method based on DNA sequences is added for improving the security. The comparison results and assessments have done and presented. From that the efficiency of the improved approach is evident. The experimental result shows that the improved scheme performs well in color images. New techniques and modifications can be added on to the proposed system for making excellent multimedia applications. REFERENCES [1] Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, “A Secure Image Encryption Algorithm Based on Rubik’s Cube Principle”, Department of Electrical and Computer Engineering, 2011. [2] Lini Abraham, Neenu Daniel, “Secure image encryption algorithms: A review”, IJSTR, 2013. [3] Yaobin Mao and Guanrong Chen, “Chaos-Based Image Encryption”, in Hand- book of geometric computing, Springer,2005. [4] Li Gong and Paul Syverson, “Fail-stop protocols: An approach to designing secure protocols”, In 5th International Working Conference on De- pendable Computing for Critical Applicaitons, pages 44–55, September 1995. [5] Sreekanth Malladi, Jim Alves-Foss, Robert B. Heckendorn, “On Preventing Replay Attacks on Security Protocols”. [6] T. Aura “Strategies against replay attacks”, In Proceedings of the 10th IEEE Computer Society Foundations Workshop, pages 59 – 68, Rockport, MA, June 1997. IEEE Computer Society Press. [7] D. Denning and G. Sacco, “Timestamps in key distribution protocols”. Communications of the ACM, 24(8):553–536, August 1981. [8] Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, Hai Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation”, Information Sciences 181 1171–1186 Elsevier, 2010. [9] G. Zhang and Q. Liu, “A novel image encryption method based on total shuffling scheme”, Optics Communications, vol. 284, no. 12, pp. 2775–2780, 2011. [10]Ismail1, Mohammed Amin, Hossam Diab, “ A Digital Image Encryption Algorithm Based A
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 338 Composition Of Two Chaotic Logistic Maps”, Proc. 27th IEEE Int’l Conf. Signal Processing., pp. 733-739,2011. [11]H.Alsafasfeh, and, A.A.Arfoa, Image encryption based on the general approach for multiple chaotic system, Journal of Signal and Information Processing 2, 238- 244, 2011. [12]Yong Wanga, Kwok-Wo Wong, XiaofengLiaoc, Guanrong Chen, “A new chaos- based fast image encryption algorithm”, in Applied Soft Computing, Elsevier, 2011. [13]Shakir M. Hussain1 and Naim M. Ajlouni, “Key Based Random Permutation”, Journal of Computer Science 2 (5): 419-421, 2006. [14]Lini Abraham, Neenu Daniel, “Enhancing the Security of Image Encryption Algorithms by Adding Timestamp”, IJARET, Vol. 1, Issue VIII, Sep. 2013. [15]Abir Awad and Ali Miri, “A New Image Encryption Algorithm Based on a Chaotic DNA Substitution Method” in , Communications (ICC) on IEEE, p. 1011-1015, June 2012. [16]Jawad Ahmad and Fawad Ahmed, “Efficiency Analysis and Security Evalu- ation of Image Encryption Schemes”, in International Journal of Video and Image Processing and Network Security, IJVIPNS-IJENS, Vol:12 No.04, 2010.