Image Encryption Based on Pseudo Hadamard Transformation and Gingerbreadman Chaotic Substitution

Author(s):  
S. N. Prajwalasimha ◽  
Sidramappa
Author(s):  
Prajwalasimha S N ◽  
Kavya S R ◽  
Tanaaz Zeba Ahmed

In this paper, Pseudo Hadamard Transformation (PHT) and non-chaotic substitution based image encryption scheme has been proposed. Images are characterized by intrinsic properties such as, strong redundancy and correlation between the adjacent pixels, hence more vulnerable to cyber-attacks. In the proposed technique, the redundancy and correlation have been effectively reduced by pixel position transformation using PHT and pixel value variation using non chaotic substitution, providing two stage security in encryption for images. Fifteen standard test images are considered for experimental analysis. Better average Number of Pixel Changing Rate (NPCR) and Unified Average pixel Changing Intensity (UACI) are obtained for a set of standard test images compared to more popular existing algorithms.


In this article, a Modified Pseudo Hadamard Transformation (MPHT) and non-Chaotic substitution based image encryption scheme has been proposed. Due to intrinsic properties such as, strong redundancy and correlation between the adjacent pixels, images are more vulnerable to cyber-attacks. In the proposed technique, the redundancy and correlation have been effectively reduced by pixel position transformation using MPHT and pixel value variation using non chaotic substitution, providing two stage security in encryption for secrete images. An average 99.6089% of Number of Pixel Changing Rate (NPCR) and 33.4328% of Unified Average pixel Changing Intensity (UACI) are obtained for a set of standard test images compared to more popular existing techniques


Confusion and diffusion are the frequently used embryonics in multimedia (image) encryption systems. Multimedia data protection against cryptanalysis can be effectually fortified by these techniques. Due to inherent properties of images such as high inter-pixel redundancy and bulk data capacity, encryption is performed in two stages: Confusion and Diffusion. In this article, a combined Pseudo Hadamard transformation in the confusion stage and Gingerbreadman chaotic substitution in the diffusion stage are used in the encryption phase of the algorithm. The strong correlation between contiguous elements in the host image is effectually reduced using Pseudo Hadamard transformation and entropy in the cipher image is enhanced using Gingerbreadman chaotic substitution. Secrete key length used in the algorithm is 128 bits, these are the initial conditions for Gingerbreadman chaotic generator. The elements of S-box in the substitution stage are considered from this random sequence generator. Experimental exploration including information entropy, correlation analysis, sensitivity analysis, key space analysis and computational complexity have been performed on set of standard images. Results obtained are better compared to many existing systems.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2020 ◽  
Vol 5 (5) ◽  
pp. 1075-1092
Author(s):  
Bhagyashri Pandurangi R ◽  
Chaitra Bhat ◽  
Meenakshi R. Patil

2017 ◽  
Author(s):  
Jamila H. Al-A’meri ◽  
Salah T. Allawi ◽  
May M. Abbas
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document