We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A New Image Encryption Approach using the Integration of a Shifting Technique and the AES Algorithm

by Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari, Hamida Almangush
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 9
Year of Publication: 2012
Authors: Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari, Hamida Almangush
10.5120/5724-7785

Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari, Hamida Almangush . A New Image Encryption Approach using the Integration of a Shifting Technique and the AES Algorithm. International Journal of Computer Applications. 42, 9 ( March 2012), 38-45. DOI=10.5120/5724-7785

@article{ 10.5120/5724-7785,
author = { Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari, Hamida Almangush },
title = { A New Image Encryption Approach using the Integration of a Shifting Technique and the AES Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 9 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 38-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number9/5724-7785/ },
doi = { 10.5120/5724-7785 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:07.797383+05:30
%A Ahmed Bashir Abugharsa
%A Abd Samad Bin Hasan Basari
%A Hamida Almangush
%T A New Image Encryption Approach using the Integration of a Shifting Technique and the AES Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 9
%P 38-45
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new image encryption technique is proposed based on the integration of shifted image blocks and basic AES, where the shifted algorithm technique is used to divide the image into blocks. Each block consists of number of pixels, and these blocks are shuffled by using a shift technique that moves the rows and columns of the original image in such a way to produce a shifted image. This shifted image is then used as an input image to the AES algorithm to encrypt the pixels of the shifted image. In order to evaluate the performance, the proposed integration technique and AES algorithm were measured through a series of tests. These tests included a histogram analysis, information entropy, correlation analysis, differential analysis. Experimental results showed that the new integration technique has satisfactory security and is more efficient than using the AES algorithm alone without the shifting algorithm which makes it a good technique for the encryption of multimedia data. The results showed that the histogram of an encrypted image produced a uniform distribution, which is very different from the histogram of the plain image, and the correlation among image pixels was significantly decreased by using the integration technique and a higher entropy was achieved.

References
  1. Komal D Patel, S. b. , "image Encryption Using Different Techniques": A Review International Journal Of Emerging Technology And Advanced Engineering, 2011. 1(1): P. 30-34.
  2. H. El-din. H. Ahmed, H. m. k. , O. S. Farag Allah, "encryption Quality Analysis Of The Rc5 Block Cipher Algorithm For Digital Images". Optical Engineering, 2006. 45( 10).
  3. Mohammad Ali Bani Younes, A. j. , "image Encryption Using Block-based Transformation Algorithm ", Iaeng International Journal Of Computer Science,, February 2008. 35, Ijcs_35_1_03(1): P. 15-23.
  4. Belmeguenaï Aïssa, D. n. , Redjimi Mohamed, "image Encryption Using Stream Cipher Algorithm With Nonlinear Filtering Function", In Ieee High Performance Computing And Simulation (hpcs), 2011 International Conference. 2011, Ieee: Istanbul. P. 830 - 835
  5. M. Van Droogenbroeck , R. b. , "techniques For A Selective Encryption Of Uncompressed And Compressed Images". In Acivs'02, Ghent, Belgium. Proceedings Of Advanced Concepts For Intelligent Vision Systems, 2002(2002).
  6. Mohammad Ali Bani Younes, A. j. , "an Image Encryption Approach Using A Combination Of Permutation Technique Followed By Encryption". Ijcsns International Journal Of Computer Science And Network Security, 2008. 8(april 2008): P. 191-197.
  7. S. P. Nana'vati, K. p. p. , "wavelets: Applications To Image Compression-i". Scientific And Engineering Computing, 2004. 9 No 3: P. 7.
  8. B. acharya, S. k. p. , G. panda, "image Encryption Using Advanced Hill Cipher Algorithm", 2009 Journal Of Recent Trends In Engineering (ijrte), 2009. 1: P. 663-667.
  9. Seyedzade, S. m. a. , R. e. ; Mirzakuchaki, S. , "a Novel Image Encryption Algorithm Based On Hash Function", In Machine Vision And Image Processing (mvip), 2010 6th Iranian. 2010, Ieee: Isfahan P. 1 - 6.
  10. Kamali, S. h. s. , R. Hedayati, M. Rahmani, M. , "a New Modified Version Of Advanced Encryption Standard Based Algorithm For Image Encryption", In Electronics And Information Engineering (iceie), 2010 International 2010, Ieee: Kyoto. P. V1-141 - V1-145.
  11. Amitava Nag, J. p. s. , Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar , Partha Pratim Sarkar, "image Encryption Using Affine Transform And Xor Operation", In Signal Processing, Communication, Computing And Networking Technologies (icsccn), 2011 International Conference. 2011, Ieee: Thuckafay P. 309 - 312 .
  12. Sesha Pallavi Indrakanti , P. s. a. , "permutation Based Image Encryption Technique". International Journal Of Computer Applications, 2011. 28(8): P. 45-47.
  13. Rasul Enayatifar, A. h. a. , "image Security Via Genetic Algorithm", In International Conference On Computer And Software Modeling Ipcsit Iacsit, Editor. 2011, Iacsit Press: Singapore. P. 198-203.
  14. Ibrahim S I Abuhaiba, M. a. s. h. , "image Encryption Using Differential Evolution Approach In Frequency Domain". Signal & Image Processing : An International Journal(sipij), 2011. 2, No. 1: P. 51-69.
  15. Shannon, C. e. , "communication Theory Of Secrecy Systems". Bell Syst Tech J. 1949.
  16. Xiao Feng, X. t. , Shaowei Xia, :a Novel Image Encryption Algorithm Based On Fractional Fourier Transform And Magic Cube Rotation", In Ieee 4th International Congress On Image And Signal Processing. 2011, Ieee: China. P. 1008-1011.
  17. A. n. Pisarchik, M. z. , "image Encryption With Chaotically Coupled Chaotic Maps". Physica D. , 2008. Vol. 237, No. 20: P. 2638-2648.
  18. G. Chen, Y. m. , C. Chui, "a Symmetric Image Encryption Scheme Based On 3d Chaotic Cat Maps". Chaos, Solitons & Fractals, 2004. 12: P. 749-761
Index Terms

Computer Science
Information Sciences

Keywords

Image encryption Shuffling AES Shifted Image Image Entropy Block Image Encryption Correlation.