CFP last date
20 January 2025
Reseach Article

Image Encryption using Block Permutation and XOR Operation

by T. Sivakumar, K. Gayathri Devi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 9
Year of Publication: 2017
Authors: T. Sivakumar, K. Gayathri Devi
10.5120/ijca2017912981

T. Sivakumar, K. Gayathri Devi . Image Encryption using Block Permutation and XOR Operation. International Journal of Computer Applications. 160, 9 ( Feb 2017), 33-36. DOI=10.5120/ijca2017912981

@article{ 10.5120/ijca2017912981,
author = { T. Sivakumar, K. Gayathri Devi },
title = { Image Encryption using Block Permutation and XOR Operation },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 9 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number9/27104-2017912981/ },
doi = { 10.5120/ijca2017912981 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:17.604820+05:30
%A T. Sivakumar
%A K. Gayathri Devi
%T Image Encryption using Block Permutation and XOR Operation
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 9
%P 33-36
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, in every communication channel there is a necessity of transmission of messages securely from sender to the authentic receiver. In recent years, for different information transfer systems, a number of data encryption techniques has been evolved. Several encryption approaches based on permutation have been proposed by various researchers. In this paper, for encrypting images, permutation and XOR operation with a key matrix which together fulfill the purpose of cipher is proposed. First the image is divided into blocks which are then shuffled among themselves using random numbers. Lagged Fibonacci Generator (LFG) is used to generate random numbers and further the random numbers are used as key stream for XOR operation. The proposed encryption method is simple and ensures the security of the encrypted images.

References
  1. William Stallings, “Cryptography and Network Security Principles and Practices”, Prentice Hall, New Delhi, 2015.
  2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, New York, 2010.
  3. Mohammad Ali BaniYounes and AmanJantan, “Image encryption using block-based transformation algorithm”, IAENG International Journal of Computer Science, Vol 35, No.1, 2008.
  4. Sesha Pallavi Indrakanti and Avadhani P.S, “Permutation based image encryption technique”, International Journal of Computer Applications, Vol. 28, No.8, 2011.
  5. Chinmaya Kumar Nayak, Anuja Kumar Acharya and Satyabrata Das, “Image encryption using an enhanced block based transformation algorithm”, International Journal of Research and Reviews in Computer Science, Vol. 2, No.2, 2011.
  6. Panduranga H.T and Naveen Kumar S.K, “Hybrid approach for image encryption using scan pattern and carrier images”, International Journal on Computer Science and Engineering, vol. 2, No. 2, pp. 297-300, 2010.
  7. A. Mitra, Y.V. subba Rao and S.R.M. Prasanna, “A new image encryption approach using combinational permutation techniques”, International Journal of Electrical and Computer Engineering, Vol.1, No.2, pp. 127-131, 2006.
  8. G. A. Sathish kumar and K. Bhoopathy Bagan, “A novel image encryption algorithm using pixel shuffling and base-64 encoding based chaotic block cipher”, WSEAS Transactions on computers, Vol. 10, No. 6, pp. 169-178, 2011.
  9. C. K. Huang, C.W. Liao, S.L. Hsu and Y.C. Jeng, “Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system”, Telecommunication Systems, Vol.52, No.2, pp. 563-57, 2011.
  10. Qian Mao, Chin-Chen Chang and Hsiao-Ling Wu, “An image encryption scheme based on concatenated torus automorphisms ”, KSII Transactions on Internet and Information Systems, Vol. 7, No. 6,pp. 1492-1511, 2013.
  11. Qiang Zhang, Xianglian Xue and Xiaopeng Wei, “A novel image encryption algorithm based on DNA subsequence operation’’, The Scientific World Journal, Vol. 2012, Article ID 286741, 2012.
  12. Manju Rani and Sudesh Kumar, “Analysis on different parameters of encryption algorithms for information security”, International Journal of Advanced research in Computer Science and Software Engineering”, Vol. 5, No. 8, 2015.
  13. B. Nagarajan and P.Manju, “Secure image encryption algorithm based on genetic operators”, International Journal on Engineering Technology and Sciences, Vol. 3, No. 5, 2016.
  14. G.A Sathishkumar, K. Bhoopathy and R. Sriraam, “Image encryption based on diffusion and multiple chaotic maps”, International Journal of Network security and its Applications, Vol. 3, pp. 181-194, 2011.
  15. T.Sivakumar, and Dr.R.Venkatesan, “A Novel Framework for Image Encryption using Karhunen-Loeve Transform”, International Journal of Computer Applications (ISSN 0975-8887), p.no 1- 6, Volume 54– No.2, September 2012.
  16. T.Sivakumar, and R.Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, wseas transactions on computers, Vol 12, Issue. 11, p.p. 407-418, November 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography image encryption Lagged Fibonacci Generator (LFG) Random number