We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Permutation based Image Encryption Technique

by Sesha Pallavi Indrakanti, P.S.Avadhani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 8
Year of Publication: 2011
Authors: Sesha Pallavi Indrakanti, P.S.Avadhani
10.5120/3404-4748

Sesha Pallavi Indrakanti, P.S.Avadhani . Permutation based Image Encryption Technique. International Journal of Computer Applications. 28, 8 ( August 2011), 45-47. DOI=10.5120/3404-4748

@article{ 10.5120/3404-4748,
author = { Sesha Pallavi Indrakanti, P.S.Avadhani },
title = { Permutation based Image Encryption Technique },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 8 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 45-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number8/3404-4748/ },
doi = { 10.5120/3404-4748 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:17.178112+05:30
%A Sesha Pallavi Indrakanti
%A P.S.Avadhani
%T Permutation based Image Encryption Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 8
%P 45-47
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the quality of the image. The values used in the encryption process are preserved in the form of a 64 bit key and sent to the receivers. The receivers jointly use the key and the shares to see the secret.

References
  1. Chin-Chen Chang, Min-Shian Hwang, Tung-ShouChen, “A new encryption algorithm for image cryptosystems”, The Journal of Systems and Software, 2001, 83-91
  2. M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS’02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vision Systems, 2002.
  3. I. Ozturk, I.Sogukpinar, "Analysis and comparison of image encryption algorithm", Journal of transactions on engineering computing and technology, December, vol. 3, 2004, p.38.
  4. A. Mitra, , Y V. Subba Rao, and S. R. M. Prasanna, "A new image encryption approach using combinational permutation techniques," Journal of computer Science, vol. 1, no. 1, p.127, 2006.
  5. Li. Shujun, Li. Chengqing, C. Guanrong, Dan Zhang., and ikolaos,G., Bourbakis, "A general cryptanalysis of permutation-only multimedia encryption algorithms," 2004, http://eprint.iacr. Org/2004/374.pdf
  6. Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, Feb 2008.
  7. Mohammad Ali Bani Younes and Aman Jantan “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption”, IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.4, April 2008 191.
  8. M. Sharma and M. K. Kowar, “Image Encryption Techniques Using Chaotic Schemes: a Review,” International Journal of Engineering Science and Technology, vol. 2, no. 6, pp. 2359–2363, 2010
  9. Z. H. Guan, F. Huang, and W. Guan, “Chaos-Based Image Encryption Algorithm,” Physics Letter A, vol. 346, pp. 153-157, 2005.
  10. Ismail Amr Ismail, Mohammed Amin, and Hossam Diab, “A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps,” International Journal of Network Security, Vol.11, No.1, PP.1{10, July 2010
  11. Alireza Jolfaei and Abdolrasoul Mirghadri,” Survey: Image Encryption Using Salsa20,” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 5, September 2010 pg 213-220
  12. A. Jolfaei and A. Mirghadri, “A New Approach to Measure Quality of Image Encryption,” International Journal of Computer and Network Security, vol. 2, no. 8, pp. 38–44, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Decryption Security Permutation