Hybrid International Data Encryption Algorithm for Digital Image Encryption

Author(s):  
Anupkumar M. Bongale ◽  
Kishore Bhamidipati ◽  
Arunkumar M. Bongale ◽  
Satish Kumar
2010 ◽  
Vol 40-41 ◽  
pp. 537-542
Author(s):  
Zong Ying Li

In order to improve the capability of scrambling encryption and anti-aggressive, we extended the two-dimensional Arnold transformation to three-dimensional, and designed one kind of new diffusion equation of the digital image pixel gray value, then introduced a novel digital image encryption algorithm based on them. The large number of simulation results and analysis have both shown that the proposed scheme is a very effective encryption algorithm.


2019 ◽  
Vol 13 ◽  
pp. 174830261985347 ◽  
Author(s):  
Zhijuan Deng ◽  
Shaojun Zhong

In this article, we introduced a digital image encryption algorithm based on the chaotic mapping designed by Xiong et al. In their paper, the authors theoretically analyzed the algorithm and pointed out that the algorithm did not need to have the prior knowledge of the orbital distribution and one can select any chaotic model. In this way, the algorithm greatly expanded the cryptographic space and greatly reduced the number of iterations of the mapping. Since the algorithm has many characteristics, for instance, it is sensitive to the secret key, its key space is big, the pixel is well distributed after being encrypted, etc., the security of the encrypted images can be assured effectively. However, since the algorithm applied the image scrambling for encryption, and did not take the chosen-plaintext attacks into consideration, the algorithm is relatively weak in resisting the chosen-plaintext attacks. Therefore, we put forward a kind of image replacement method based on chaos, which can resist the chosen-plaintext attacks. And the experimental simulation proves that this algorithm not only has many characteristics, for instance, it is sensitive to the secret key, its key space is big, the pixel is well distributed after being encrypted, etc., but also can resist the chosen-plaintext attacks effectively. In the meanwhile, the algorithm is very sensitive to the small changes of the plaintexts, and its encrypted images will completely lose the features of the original ones.


2020 ◽  
Vol 64 (4) ◽  
pp. 40413-1-40413-8
Author(s):  
Zhuang-hao Si ◽  
Wei Wei ◽  
Bi-song Li ◽  
Wei-jie Feng

Abstract To explore the DNA image encryption method based on the Logistic‐sine system and the fractional-order chaos stability theory, a fractional-order fuzzy differential equation is first introduced to construct a chaotic synchronization system. Then the green, blue, and red primary color matrix is established to design new DNA image encryption, and the encryption process is explained. Next, a data encryption algorithm and an advanced encryption algorithm are introduced to perform simulation experiments on the MATLAB 2014 software platform. It is found that the images encrypted by the new algorithm all exhibit striped snowflakes, and after decryption, it is almost the same as the original image. The histogram of the image encrypted by the new algorithm is flat, which is very different from the original image histogram. The average pixel change rate of the image encrypted by the new algorithm is 99.6267%, and the average change intensity reaches 33.5183%. The average information entropy of the image encrypted by the new algorithm is 7.9624, which is close to the upper limit of 8. The calculation time and occupied space of the new algorithm are less than those of the data encryption algorithm and the advanced encryption algorithm. This result shows that the DNA image encryption algorithm based on the Logistic‐sine system and the fractional-order chaos stability theory has excellent performance and can provide a certain theoretical basis for research in the field of digital image encryption.


2014 ◽  
Vol 686 ◽  
pp. 381-387
Author(s):  
Wen Jie Sun

Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.


Sign in / Sign up

Export Citation Format

Share Document