Implementation of Block-Based Symmetric Algorithms for Real Image Encryption

Author(s):  
Ritu Shaktawat ◽  
Rajdeep Singh Shaktawat ◽  
Isha Suwalka ◽  
N. Lakshmi
Author(s):  
Eko Hari Rachmawanto ◽  
Ignatius Moses Setiadi De Rosal ◽  
Christy Atika Sari ◽  
Heru Agus Santoso ◽  
Fauzi Adi Rafrastara ◽  
...  

2015 ◽  
Vol 9 (9) ◽  
pp. 105-122 ◽  
Author(s):  
Kamlesh Gupta ◽  
Ranu Gupta ◽  
Rohit Agrawal ◽  
Saba Khan

Author(s):  
Achmad Fanany Onnilita Gaffar ◽  
Rheo Malani ◽  
Arief Bramanto Wicaksono Putra

In principle, the image encryption algorithm produces an encrypted image. The encrypted image is composed of arbitrary patterns that do not provide any clues about the plain image and its cipher key. Ideally, the encrypted image is entirely independent of its plain image. Many functions can be used to achieve this goal. Based on the functions used, image encryption techniques are categorized into: (1) Block-based; (2) Chaotic-based; (3) Transformation-based; (4) Conventional-based; and (5) Miscellaneous based. This study proposes a magic cube puzzle approach to encrypt an 8-bit grayscale image. This approach transforms a plain image into a particular size magic cube puzzle, which is consists of a set of blocks. The magic cube puzzle algorithm will diffuse the pixels of the plain image as in a Rubik’s Cube game, by rotating each block in a particular direction called the transposition orientation. The block’s transposition orientation is used as the key seed, while the generation of the cipher key uses a random permutation of the key seed with a certain key length. Several performance metrics have been used to assess the goals, and the results have been compared to several standard encryption methods. This study showed that the proposed method was better than the other methods, except for entropy metrics. For further studies, modification of the method will be carried out in such a way as to be able to increase its entropy value to very close to 8 and its application to true color images. In essence, the magic cube puzzle approach has a large space for pixel diffusion that is possibly supposed to get bigger as a series of data has transformed into several magic cubes. Then, each magic cube has transposed with a different technique. This proposed approach is expected to add to a wealth of knowledge in the field of data encryption.


Entropy ◽  
2020 ◽  
Vol 22 (1) ◽  
pp. 112 ◽  
Author(s):  
Khushbu Khalid Butt ◽  
Guohui Li ◽  
Sajid Khan ◽  
Sohaib Manzoor

Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of pixels, resulting in similar histograms for the original and permuted images. Bit-level permutation methods, however, have the ability to change the histogram of the image, but are usually not preferred due to their time-consuming nature, which is owed to bit-level computation, unlike that of other permutation techniques. In this paper, we introduce a new image encryption algorithm which uses binary bit-plane scrambling and an SPD diffusion technique for the bit-planes of a plain image, based on a card game trick. Integer values of the hexadecimal key SHA-512 are also used, along with the adaptive block-based modular addition of pixels to encrypt the images. To prove the first-rate encryption performance of our proposed algorithm, security analyses are provided in this paper. Simulations and other results confirmed the robustness of the proposed image encryption algorithm against many well-known attacks; in particular, brute-force attacks, known/chosen plain text attacks, occlusion attacks, differential attacks, and gray value difference attacks, among others.


2016 ◽  
Vol 10 (6) ◽  
pp. 593-602 ◽  
Author(s):  
Brindha Murugan ◽  
Ammasai Gounden Nanjappa Gounder

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 4184-4194 ◽  
Author(s):  
Osama S. Faragallah ◽  
Mohammed A. Alzain ◽  
Hala S. El-Sayed ◽  
Jehad F. Al-Amri ◽  
Walid El-Shafai ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document