Permutation based Image Encryption Technique

نویسندگان

  • Sesha Pallavi Indrakanti
  • Chin-Chen Chang
  • Min-Shian Hwang
  • S. R. M. Prasanna
  • Mohammad Ali Bani Younes
  • Aman Jantan
  • M. K. Kowar
  • Ismail Amr Ismail
  • Mohammed Amin
  • Alireza Jolfaei
چکیده

Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the quality of the image. The values used in the encryption process are preserved in the form of a 64 bit key and sent to the receivers. The receivers jointly use the key and the shares to see the secret.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Joint Encryption and Watermarking Technique Using Block Cipher and Wavelet

This paper proposes a joint encryption and watermarking technique based on random block permutation and DWT with the motivation to enhance the security of the multimedia content. The original image is sectioned into the blocks and shuffle the blocks using random permutation, In this technique copyright information is concealed into an encrypted image. Based on the results, permutation of blocks...

متن کامل

Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm

7 Abstract: The primary goal of this paper is security management. This will provide authentication of users, and integrity, accuracy and safety of images which is traveling over internet. Moreover, an image-based data requires more effort during encryption and decryption. The Proposed Architecture for encryption and decryption of an image using suitable userdefined key is developed with the sa...

متن کامل

Chaos Based Image Encryption using Expand-Shrink Concept

Received Feb 26, 2014 Revised May 15, 2014 Accepted May 20, 2014 Image information security plays a vital role in computing and communication technologies. This paper describes a new concept of expand and shrink to enhance the strength of chaos based image encryption technique. This method consists of both permutations as well as substitution process for image scrambling and encryption. In perm...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Image Encryption Technique Based on Permutation and Combination

“Combination of Encryption and Decryption for secure communication is an application”. Here I am using Permutation and substitution technique to make our data more secure. It is concerned in hiding the information in secure and robust manner so that the confidentiality of the data remains. This paper also attempts to identify the requirement of good key generation algorithm and its decryption. ...

متن کامل

An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption

Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011