We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Image Symmetric Encryption based on Block Displacement

by Samundra Deep, Sahil Kohli, Javed Ahmed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 15
Year of Publication: 2015
Authors: Samundra Deep, Sahil Kohli, Javed Ahmed
10.5120/19611-1495

Samundra Deep, Sahil Kohli, Javed Ahmed . Image Symmetric Encryption based on Block Displacement. International Journal of Computer Applications. 111, 15 ( February 2015), 1-4. DOI=10.5120/19611-1495

@article{ 10.5120/19611-1495,
author = { Samundra Deep, Sahil Kohli, Javed Ahmed },
title = { Image Symmetric Encryption based on Block Displacement },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 15 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number15/19611-1495/ },
doi = { 10.5120/19611-1495 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:56.451040+05:30
%A Samundra Deep
%A Sahil Kohli
%A Javed Ahmed
%T Image Symmetric Encryption based on Block Displacement
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 15
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main purpose of this work is the management of security. This will allow users authorization and integrity, accuracy and images security circulating on the Internet. Addition to that, more effort is required for an image-based data in the process of encrypting and decrypting the image. Proposed Architecture facilities for encrypting and decrypting an image using the suitable key and is designed to work for the same purpose. In this article we present a strategy for the new permutations based on a combination of different blocks of pixels and the symmetric encryption algorithm newly developed called "Image Symmetric Encryption Based on Block Displacement". The different blocks of the selected image is formed to change the layout of pixels into an image by the interchanging process, and then using the proposed symmetric encryption Algorithm the processed image will be encrypted.

References
  1. Wu, X. , Wong, D. , S. , LI, Q. , "Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion", Symposium International Computer Science and Computational Technology, pp. 310-315, Dec. 2009.
  2. Najmenik, J. , Geisler, W. , S. , "Optimal Eye Movement Strategies in Visual Search", Nature 434(3), pp. 387-391, 2005.
  3. S. Changgui, B. Bharat, "An efficient MPEG video encryption a lgor i thm, " Proc e edings of the symposium on reliable distributed systems, IEEE computer society Press, pp. 381-386, 1998.
  4. Jiun-In Guo, Jui-Cheng Yen, "A new mirror-like image encryption algorithm and its VLSI architecture", Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China, 2001.
  5. Cimato, S. , Santis, A. , D. , Ferrara, A. , L. , Masucci, B. , "Ideal Contrast Visual Cryptography Schemes with Reversing", Information Processing Letters, Vol. 93, No. 4, pp. 199-206, February 2005.
  6. Maniccam, S. , S. , Bourbakis, N. , G. , ?"Lossless image compression and encryption using SCAN?, Pattern Recognition" 34, pp. 1229-1245, 2001.
  7. Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, "A new encription algorithm for image cryptosystems?", The Journal of Systems and Software 58, pp. 83-91, 2001.
  8. Bruce Shnier "Applied Cryptography Second Edition Protocols. Algorithms, and Source, and Source Code in C", John Wiley and Sons, Inc. , 1996.
  9. Aloha Sinha, Kehar Singh, "A technique for image encryption using digital signature", Optics Communications, ARTICLE IN PRESS, pp. 1-6, 2003.
  10. Yang, C. , N. , "New Visual Secrete Sharing Schemes Using Probabilistic Method", Pattern Recognition Letters Vol. 25, No. 4, pp. 481-494, March 2004.
  11. Shyu, S. , J. , "Efficient Visual Secrete Sharing Scheme for Color Images", Pattern Recognition, Vol. 39, No. 5, pp. 866-880, 2006.
  12. B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.
  13. Adhikari, A. , Dutta, T. , K. , Roy, B. , "A New Black and White Visual Cryptographic Scheme for General Access Structures", Progress in Cryptography, Vol. 3348, pp. 399-413, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Security Image Cryptography Algorithm.