CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Fast Image Encryption based on Random Image Key

by Abdulrahman Dira Khalaf
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 3
Year of Publication: 2016
Authors: Abdulrahman Dira Khalaf
10.5120/ijca2016907884

Abdulrahman Dira Khalaf . Fast Image Encryption based on Random Image Key. International Journal of Computer Applications. 134, 3 ( January 2016), 35-43. DOI=10.5120/ijca2016907884

@article{ 10.5120/ijca2016907884,
author = { Abdulrahman Dira Khalaf },
title = { Fast Image Encryption based on Random Image Key },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 3 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number3/23897-2016907884/ },
doi = { 10.5120/ijca2016907884 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:12.110457+05:30
%A Abdulrahman Dira Khalaf
%T Fast Image Encryption based on Random Image Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 3
%P 35-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet plays an important role in circulating a huge amount of multimedia. An example of this multimedia is the image. To send an image over the network secretly, the sender tries to find encryption algorithm to hide image information. This paper aims at designing an efficient encryption algorithm for color image using random image key generated with minimum time execution for encryption and decryption operations. XOR operation is used here to make more diffusion of the encrypted image to maintain a higher level of security upon transference than it is with the original image.

References
  1. Changgui Shi, Sheng-Yih Wang, Bharat K. Bhargava 1999: "MPEG Video Encryption in Real-time Using Secret Key Cryptography". PDPTA: pp2822-2828.
  2. Wu Y., Noonan J., and Agaian S. 2011: "NPCR and UACI randomness tests for image encryption", Journal of Selected Areas in Telecommunications (JSAT), pp. 31–38.
  3. Pratibha S. Ghode, SEM IV. and Tech M. 2014 "A Keyless approach to Lossless Image Encryption", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No. 5, pp 1459-1467.
  4. Khanzadi H., Eshghi M. and Borujeni S. E. 2013 "Image Encryption Using Random Bit Sequence Based on Chaotic Maps", Arabian Journal for Science and Engineering AJSE, Vol.39, No. 2, pp1039–1047
  5. Mirzaei O., Yaghoobi M. and Irani H. (2012) "A New Image Encryption Method: Parallel Sub-Image Encryption with Hyper Chaos", Nonlinear Dynamics, Vol. 67, No. 1, pp557-566.
  6. Wei X., Guo L., Zhang Q., Zhang J., and Lian S. 2012 "A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system", The Journal of Systems and Software, Vol. 85, No. 2, pp290-299.
  7. Panduranga H. T. and Naveen kumar S. K. 2011 "Hybrid Approach to Transmit a Secrete Image", 2nd National Conference on Emerging Trends and Applications in Computer Science IEEE.
  8. Ibrahim S. I. Abuhaiba and Maaly A. S. Hassan 2011 "Image Encryption Using Differential Evolution Approach In Frequency Domain", Signal & Image Processing An International Journal SIPIJ Vol. 2, No. 1.
  9. Wang X., Zhao J. and Liu H. 2012 "A new image encryption algorithm based on chaos", Elsevier.Vol.285 No.5, pp562–566.
  10. Seyedzade S. M., Atani R. E., and Mirzakuchaki S. 2010 "A Novel Image Encryption Algorithm Based on Hash Function", In 6th Iranian Conference on Machine Vision and Image Processing IEEE.
  11. Min L. and Lu H. 2010 "Design and analysis of a novel chaotic image encryption", 2nd International Conference on Computer Modelling and Simulation, Publication IEEE, pp517-520.
  12. Pall A. K., Biswas G. P. and Mukhopadhyay S. 2010 "Designing of High-Speed Image Cryptosystem Using VQ Generated Codebook and Index Table", International Conference on Recent Trends in Information, Telecommunication and Computing IEEE, pp39-43.
  13. Pang C. 2009 "An Image Encryption Algorithm Based on Discrete Wavelet Transform and Two Dimension Cat Mapping", Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing IEEE, Vol. 2, pp711-714.
  14. Acharya B., Patra S. K., and Panda G. 2008 "Image Encryption by Novel Cryptosystem Using Matrix Transformation", 1st International Conference on Emerging Trends in Engineering and Technology IEEE, pp77-81.
  15. Al-Khassaweneh M. and Aviyent S. 2008 "Image Encryption Scheme Based on Using Least Square Approximation Techniques", International Conference Electro Information Technology IEEE, pp108-111.
  16. Gupta M. et al. 2012 "A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique" International Journal of Computer Applications (IJCA) Vol.57 No.14.
  17. Francia A., Yang M. and Trifas M. 2009 "Applied image processing to multimedia information security", Int. Conf. Image Analysis and Signal Processing IEEE, pp286 - 291
  18. Mursi M. et al. 2014 "Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks", International Journal of Image, Graphics and Signal Processing, pp8-16.
  19. Toufik, B. and Mokhtar N. 2012 "The Wavelet Transform for Image Processing Applications. In: Advances in Wavelet Theory and Their Applications in Engineering, Physics and Technology", Chapter 17, InTech, USA, pp395-422.
  20. Sivakumar T. and Venkatesan R. 2014 "A Novel Approach for Image Encryption Using Dynamic Scan Pattern" International Journal of Computer Science IAENG, Vol. 41, No. 2, pp91-101.
  21. Thakur N, Devi S. 2011 "A new method for color image quality assessment" International Journal Computer Application. Vol. 15, No.2, pp10–17.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Random Key XOR operation.