A symmetric image cipher using wave perturbations

نویسندگان

  • Yue Wu
  • Yicong Zhou
  • Sos S. Agaian
  • Joseph P. Noonan
چکیده

Inspired by the natural ripple-like phenomenon that distorts a reflection on a water surface, this paper introduces a new symmetric image cipher using wave perturbations to shuffle images in an n dimensional (n D) space. Its strong diffusion and confusion properties are ensured by pseudo-random wavefronts and additional salts and peppers bits. Extensive simulations and comparisons demonstrate that the proposed image cipher outperforms several existing bit-level scrambling methods with respect to the encryption quality and computation complexity. & 2014 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

A Noval Security Mechanism for Image Authentication and Copyright Protection

Encryption and watermarking are two primary and complementary technologies for protecting multimedia content. In this paper, we present a hybrid image protection scheme to establish a robust content-based authentication by using novel cryptosystem based on matrix transformation for generation of encryption key and copyright protection by using SVD based watermarking system. This paper suggests ...

متن کامل

A Secure Symmetric Image Encryption Based on Bit-wise Operation

This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides addition...

متن کامل

Image Encryption Algorithm Based on a Chaotic Iterative Process

The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is vi...

متن کامل

Symmetric Key Cryptography on Images in AES Algorithm and Hiding Data Losslessly

Reversible (lossless) data embedding (hiding) has drawn lots of interest recently. Being reversible, the original cover content can be completely restored. This paper proposes a novel reversible data hiding scheme with a lower computational complexity and can be used in applications where both the image and the hidden information is highly confidential. It consists of three phases –AES image en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Signal Processing

دوره 102  شماره 

صفحات  -

تاریخ انتشار 2014