A symmetric image cipher using wave perturbations
نویسندگان
چکیده
Inspired by the natural ripple-like phenomenon that distorts a reflection on a water surface, this paper introduces a new symmetric image cipher using wave perturbations to shuffle images in an n dimensional (n D) space. Its strong diffusion and confusion properties are ensured by pseudo-random wavefronts and additional salts and peppers bits. Extensive simulations and comparisons demonstrate that the proposed image cipher outperforms several existing bit-level scrambling methods with respect to the encryption quality and computation complexity. & 2014 Elsevier B.V. All rights reserved.
منابع مشابه
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملA Noval Security Mechanism for Image Authentication and Copyright Protection
Encryption and watermarking are two primary and complementary technologies for protecting multimedia content. In this paper, we present a hybrid image protection scheme to establish a robust content-based authentication by using novel cryptosystem based on matrix transformation for generation of encryption key and copyright protection by using SVD based watermarking system. This paper suggests ...
متن کاملA Secure Symmetric Image Encryption Based on Bit-wise Operation
This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides addition...
متن کاملImage Encryption Algorithm Based on a Chaotic Iterative Process
The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is vi...
متن کاملSymmetric Key Cryptography on Images in AES Algorithm and Hiding Data Losslessly
Reversible (lossless) data embedding (hiding) has drawn lots of interest recently. Being reversible, the original cover content can be completely restored. This paper proposes a novel reversible data hiding scheme with a lower computational complexity and can be used in applications where both the image and the hidden information is highly confidential. It consists of three phases –AES image en...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Signal Processing
دوره 102 شماره
صفحات -
تاریخ انتشار 2014