scholarly journals Vigenere Followed by Multiple Bit-Level Permutations to Encrypt a Color Image

Author(s):  
Abdellatif Jarjar

The largest part of the image encryption algorithms operates on the pixel as a central element by implementing diffusion confusion and eventually a permutation. On the other side, a permutation applied at the bit level changes not only the pixel value, but also its location within the image. In this work, we will propose a new technology of medical and color image encryption, based on chaotic permutations acting at the bit level, and a diffusion confusion ensured by an application of the method of Vigenere largely improved and adapted to the subject. Simulations performed on a large number of images of different sizes and formats ensure that our method is not subject to any known attacks.

2019 ◽  
Vol 29 (09) ◽  
pp. 1950115 ◽  
Author(s):  
Guangfeng Cheng ◽  
Chunhua Wang ◽  
Hua Chen

In recent years, scholars studied and proposed some secure color image encryption algorithms. However, the majority of the published algorithms encrypted red, green and blue (called [Formula: see text], [Formula: see text], [Formula: see text] for short) components independently. In the paper, we propose a color image encryption scheme based on hyperchaotic system and permutation-diffusion architecture. The encryption algorithm utilizes a block permutation which is realized by mixing [Formula: see text], [Formula: see text], [Formula: see text] components to strengthen the dependence of each component. Besides, it can reduce time consumption. Then, the key streams generated by the hyperchaotic system are exploited to diffuse the pixels, the three components affect each other again. And in the diffusion process, we can get two totally different encrypted images even though we change the last pixel because the [Formula: see text] component is diffused in reverse order. The experimental results reveal that our algorithm possesses better abilities of resisting statistical attacks and differential attacks, larger key space, closer information entropy to 8, and faster encryption speed compared with other chaos-based color image encryption algorithms.


2012 ◽  
Vol 182-183 ◽  
pp. 1839-1843
Author(s):  
Xian Zhe Luo ◽  
Nan Run Zhou ◽  
Qing Min Zhao ◽  
Jian Hua Wu

Based on the theory that a color image can be decomposed into three primary components and each one can be seen as a gray image, we propose a color image encryption method with multiple-order discrete fractional cosine transform (MODFrCT), which is a kind of encryption with the secrecy of pixel value and pixel position simultaneously. The complex number mode that has a real part and an imaginary one is used in this encryption method to save the transmission channel. Human vision is more sensitive to the Y component than to other two components in YCbCr color space and this color format is used for encrypting the color image. Chaos is introduced to scramble the image phases both in spatial and transformation domains. The numerical simulations demonstrate the validity and efficiency of this scheme and the robustness of the method against occlusion attack is examined.


2021 ◽  
Vol 11 (5) ◽  
pp. 605-613
Author(s):  
Mohamed Jarjar ◽  
Said Hraoui ◽  
Said Najah ◽  
Khalid Zenkouar

This document traces the development of a new cryptosystem using two circuits ensured by a deep Vigenere classical technique improvement. This new technique employs several dynamic substitutions matrices attached to chaotic replacement functions; whose construction will be detailed. The first round will start by modifying the seed pixels based on the initial values calculated from the original image, and will be infected through the chaotic map used to overcome the uniform image problem, followed by the injection of Vigenere technology improvements. The output vector will be subdivided into three sized blocks for future application of deeply improved genetic mutations to better adapt to medicine and color image encryption. The second round will increase the complexity of the attack and improve the installed systems. Simulations performed on a large number of images of different sizes and formats ensure that our approach is not exposed to known attacks.


2018 ◽  
Vol 3 (9) ◽  
pp. 1-5
Author(s):  
Rupa Rajoriya ◽  
Kailash Patidar ◽  
Sudeesh Chouhan

Author(s):  
Mohammad Rasmi AL-Mousa ◽  
Fadi Al-salameen ◽  
Khaled Eisa Alqawasmi

<p class="Affiliation">Recently, the security of digital images becomes an important issue with the rapid growth of digital communication and multimedia application. Recent cryptography algorithms are providing essential techniques to protect information and multimedia data. However, those algorithms are usually suffering from the problem of time-consuming. Encryption algorithms have been growth quickly and many image encryption methods have been used to protect information and multimedia data from unauthorized access. This research presents effective technique for image encryption which employs Red, Green and Blue (RGB) components of the RGB color image. The proposed technique utilizes matrix multiplication and inverse matrices for encryption-decryption purpose. Moreover, the effectiveness of the proposed encryption-decryption techniques lay on minimizing the encryption-decryption time and the square error between the original and the decrypted image.  The evaluations of the proposed technique were done using many images with different sizes, while the ex perimental results show that the improved encryption technique time are greatly reduced compared with “RGB Color Image Encryption-Decryption Using Gray Image” method.  The proposed technique has a high confidentiality level through using confusion diffusion sequentially with a square matrix key and two vectors keys. However, those keys are generated randomly and make the process of hacking the image very difficult.</p>


2011 ◽  
Vol 5 (3) ◽  
pp. 1-15
Author(s):  
Himani Agrawal ◽  
◽  
Monisha Sharma ◽  

2021 ◽  
Vol 104 (1) ◽  
pp. 003685042110033
Author(s):  
Javad Mostafaee ◽  
Saleh Mobayen ◽  
Behrouz Vaseghi ◽  
Mohammad Vahedi ◽  
Afef Fekih

This paper proposes a novel exponential hyper–chaotic system with complex dynamic behaviors. It also analyzes the chaotic attractor, bifurcation diagram, equilibrium points, Poincare map, Kaplan–Yorke dimension, and Lyapunov exponent behaviors. A fast terminal sliding mode control scheme is then designed to ensure the fast synchronization and stability of the new exponential hyper–chaotic system. Stability analysis was performed using the Lyapunov stability theory. One of the main features of the proposed controller is the finite time stability of the terminal sliding surface designed with high–order power function of error and derivative of error. The approach was implemented for image cryptosystem. Color image encryption was carried out to confirm the performance of the new hyper–chaotic system. For image encryption, the DNA encryption-based RGB algorithm was used. Performance assessment of the proposed approach confirmed the ability of the proposed hyper–chaotic system to increase the security of image encryption.


Sign in / Sign up

Export Citation Format

Share Document