Image Encryption using Curved Scrambling and Diffusion

نویسندگان

  • Neha Dwivedi
  • Rishi Kumar Gupta
  • Shafali Agarwal
چکیده

In the recent world, designing of a secure cryptosystem is prime focused area for the researchers. This paper emphasizes on the image encryption/decryption technique using a key derived from a plain image. In the proposed algorithm, encryption key is derived by applying new curved scrambling method to the RGB layers of a plain image. In next step, a temporary cipher image is obtained by modulo arithmetic using encryption key. To enhance security level, execute additional diffusion method to reset the pixel values within the given block and finally generate a cipher image. The described algorithm achieves a larger key space, good statistical property and effective resistance to the brute force attack thus provides highly secure cryptosystem for the real world applications. Keyword Image encryption and decryption, curved scrambling, diffusion, security

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

A Novel Digital Image Encryption Scheme Based on Spatial-chaos

In order to improve the security of digital image transmission process, and accelerate the rate of information transfer, a novel spatial-chaos-based self-adapting image encryption scheme is proposed in this paper. Firstly, to obtain corresponding scrambling image, the spatial location of pixels of a revised digital image is shuffled by using extended 2D cat map. Then, two-dimensional pseudo-ran...

متن کامل

Information technology Image encryption algorithm based on chaotic mapping and Chinese remainder theorem

When the image data are regularly changed, existing image encryption algorithm is easy to be decrypted. In order to improve the security of encryption algorithm, this paper proposes an image encryption algorithm based on chaotic mapping and Chinese remainder theorem. The encryption algorithm is divided into pixel scrambling and image diffusion. Firstly, the Chebyshev mapping is used to generate...

متن کامل

A symmetric image cipher using wave perturbations

Inspired by the natural ripple-like phenomenon that distorts a reflection on a water surface, this paper introduces a new symmetric image cipher using wave perturbations to shuffle images in an n dimensional (n D) space. Its strong diffusion and confusion properties are ensured by pseudo-random wavefronts and additional salts and peppers bits. Extensive simulations and comparisons demonstrate t...

متن کامل

Image Encryption Based on 2-D Zaslavskii Chaotic Map and Pseudo Hadmard Transform

Recently, several chaotic based image encryption schemes have been proposed, each of them has its own strengths and limitations more or less in terms of security level and computational speed. In this paper, a novel approach for image encryption based on a 2-D Zaslavskii map and Pseudo Hadmard transform is proposed. The encryption process is composed of two stages, i.e. permutation and diffusio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017