Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Encryption Scheme for Color Images using Transpose, Interweaving and Iteration Method

K. Thamodaran, Dr.K. Kuppusamy

Abstract


Many digital services require reliable security in storage and transmission of multimedia contents. Due to the rapid growth of the internet in the digital world today, the security of multimedia contents like digital images has become more important and attracted much attention. An encryption techniques gives protection against illegal duplication and manipulation of multimedia contents. The transposition or permutation of characters in the plaintext is responsible for confusion, and the influence of each bit of the key on each plaintext causes diffusion .The goal of this paper is to create cryptosystem to encrypt color images by shuffling pixel values using transpose, Interweaving and Iteration method on each block. In this method the given Image is divided in to number of blocks based on required size. The image pixel values of the transposed modified plaintext are rearranged by transposition of the binary bits belonging to the neighboring rows and columns in each iteration. The decimal values of modified interweaved matrix is multiplied with key matrix to yield cipher text of the image. This method gives strong cipher of the image, whose key length is significantly large.

Keywords


Image Encryption, Interweaving, Inverse Interweaving, Modular Arithmetic Inverse.

Full Text:

PDF

References


Shi C., Bhargava B., “A Fast MPEG video encryption algorithm,” Proceedings of the sixth ACM International Multimedia conference, Bristol, U.K., pp. 81-88, 1998.

I.A.Ismail, Mohamed Amin and Hossam Diab, “An effective Image Encryption Scheme based on Chaotic Logistic Maps”, International Journal of Soft Computing 2 (2),2007,Medwell Journals, 285-291 pp.

H. Cheng, L. Xiaobo, Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48 (8), 2439–2451, 2000.

L.M. Marvel, G.G. Boncelet, C.T. Retter, Spread spectrum image steganography, IEEE Trans. Image Process, 8 (8), 1075–1083, 1999.

Feng Huang,Yong Feng and Xinhuo Yu, “ A Symmetric Image Encryption scheme based on a simple novel Two-dimensional Map,” International Journal of Innovative Computing, Information and Control,, vol. 3, no. 6(b), pp. 1593-1602, 2007.

Sinha and K. Singh, “A Technique for Image Encryption using Digital Signature,” OpticsCommunications, vol. 218, pp.229-234, 2003.

Mitra A., Subba Rao Y. V. and Prasanna R. M., “A New Image Encryption Approach using Combinational Permutation Techniques,” International Journal of Computer Science ,vol.1, no. 1, pp. 127-131, 2006.

Behrouz A.Forouzan , “Cryptography and Network Security ” ,TMH, 2010.

Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah , “Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems”, International Journal of Information Technology 3:4, 2007, pp245-250.

Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer science,35:1,IJCS_35_1_03.

V. U. K. Sastry, and N.Ravi Shankar, “Modifed hill cipher for a large block of plaintext with interlacing and iteration," Journal of Computer Science, vol.4, no. 1, pp. 15-20, Science Publications, 2008.

V.Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, “A Modified Hill Cipher Involving Interweaving and Iteration”, International Journal of Network Security, Vol.10, No.3, PP.210– 215, May 2010.

Bibhudendra Acharya, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption by Novel Cryptosystem Using Matrix Transformation” , IEEE computer society ,2008, First International Conference on Emerging Trends in Engineering and Technology. pp 77-81.

Kamlesh Gupta, Sanjay Silakari , “Choase Based Image Encryption Using Block -Based Transformation Algorithm “,(IJCNS) International Journal of Computer and Network Security,Vol. 1, No. 3, December 2009,19-23 pp.

V. U. K. Sastry , S. Udaya Kumar and A. Vinaya Babu, “A Large Block Cipher Using Modular Arithmetic Inverse of a Key Matrix and Mixing of the Key Matrix and the Plaintext”, Journal of Computer Science 2 (9): 698-703, 2006 ISSN 1549-3636,698-703 pp.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.