Open Access Open Access  Restricted Access Subscription or Fee Access

An Image Encryption Decryption Method Using Secret Based Transformation Matrix

Dr.M. Mohamed Sathik, A. Kalai Selvi

Abstract


Due to the unlimited growth of Internet and communication technologies, the extensive use of images in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education has become unavoidable. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, integrity as well as the authenticity of images has become a major concern. This paper proposes a new encryption and decryption algorithm based on transformation matrix. According to this, there are two levels of process. In the first level the block matrix of size 3 x 3 is constructed using the secret key. In the second level, the zone of size 6 x 6 is constructed from the block matrix. The two levels are repeated to get the transformation matrix and is used for encryption purpose. The experimental results are compared with various image encryption algorithms.

Keywords


Block, Encryption, Transformation Matrix, Zone.

Full Text:

PDF

References


DingWei, QiDongxu: Digital image transform, information hiding and camoufiage technique. Journal of computers. 1998 21: 838 – 843, September, 1998.

A. Shamir , How to share a secret. Communication of the ACM 22 1979) : 612-613.

M. Naor, Visual Cryptography. In Proceeding of - Eurocrypt ’94, (1994) 441 – 449.

[Cao Zhenfu: A threshold key escrow based on public key cryptosystem. Science in China (Series E ) , 200144: 441 – 448 , April, 2001.

Shannon, C.E.: Communication Theory of secrecy systems. Bell System Technical Journal. 1994 28: 656 – 715, April, 1994.

Bidhudendra Acharya, Sarat Kumar Patra and Ganapati Panda “ A Novel Cryptosystem Using Matrix Transformation”, Proceedings of SPIT-IEEE Colloquium & International Conference Vol 4, pp. 92 – 95, 2008.

Bidhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra and Saroj Kumar Panigrahy. “Novel Methods of Generating Self Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security (CSS Journals ). Vol 1, Issue. (1), pp. 14 – 21, 2007.

A.Mitra, Y.V.Subba Rao and S.R.M.Prasanna. A New Image Encryption Approach using combinational Permutation Techniques, International Journal of Computer Science , vol.1, no.2, 2006.

Socek, S Li, S.S. Magliveras and B Furht, Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption, IEEE/ CreateNet Secure Communication, pp. 406-408, September 2005.

R.Ramasamy et al, A New Algorithm for Encryption and Decryption for field Applications, Computer Standards and Interfaces, 2008.

H.J. Gao, Y.S. Zhang, S.Y. Liang,et al,”A new Chaotic algorithm for Image Encryption”, Chaos, Solutions and Fractals, 2006, vol. 29, pp. 393-399.

C Jeyamala, B. Subramanyan, G.S.Raman “A real time Image encryption Technique based on Discrete Logarithms” L.M. Patnaik and Venugopal K.R. (Eds) , ICIP-2010, pages 437 – 446.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.