CFP last date
20 January 2025
Reseach Article

An Image Encryption Technique based on Concatenating Images of Same Dimensions

by Mohit Kumar, Akshat Agrawal, Ankit Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 14
Year of Publication: 2014
Authors: Mohit Kumar, Akshat Agrawal, Ankit Garg
10.5120/17253-7595

Mohit Kumar, Akshat Agrawal, Ankit Garg . An Image Encryption Technique based on Concatenating Images of Same Dimensions. International Journal of Computer Applications. 98, 14 ( July 2014), 30-34. DOI=10.5120/17253-7595

@article{ 10.5120/17253-7595,
author = { Mohit Kumar, Akshat Agrawal, Ankit Garg },
title = { An Image Encryption Technique based on Concatenating Images of Same Dimensions },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 14 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number14/17253-7595/ },
doi = { 10.5120/17253-7595 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:59.115919+05:30
%A Mohit Kumar
%A Akshat Agrawal
%A Ankit Garg
%T An Image Encryption Technique based on Concatenating Images of Same Dimensions
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 14
%P 30-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Images are widely used in many areas for various purposes. Some images may have confidential information, so security of secrete images is a major issue. Various image encryption algorithms provide security to images. However, traditional encryption techniques encode one image at a time, which leads to weak security in the encrypted image due to small size of the image. In this paper, an image encryption technique is imparted that concatenate four images of the same dimension into one and then produce single encrypted image. In result, encrypted image is more secure due to the large size. This encrypted image has high entropy and low correlation coefficient, so this encrypted image is more difficult to understand compared to four separated images.

References
  1. W. Stallings, Cryptography and Network Security principles and practices, 3rd ed. , Pearson Education, 2003.
  2. H. EI-din H. Ahmed, M. K Hamdy, and O. S. Farag Allah, "Encryption quality analysis of the RC5 block cipher algorithm for digital images," Optical Engineering, Vol. 45, Issue 10107003,2006
  3. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar, Partha Pratim Sarkar "Image Encryption Using Affine Transform and XOR Operation" 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011), 21-22 July 2011, pages : 309-312.
  4. Shujiang Xu, Yinglong Wang, Jizhi Wang, Yucui Guo, "A Fast Image Encryption Scheme Based on a Nonlinear Chaotic Map", 2010 2nd International Conference on Signal Processing Systems (ICSPS), 5-7 July 2010, pages: v2-326-v2-330.
  5. Mohit Kumar, Akshat Aggarwal and Ankit Garg, "A Review on Various Digital Image Encryption Techniques and Security Criteria", International Journal of Computer Applications, Volume-96, no-13, 17 June, 2014, pages:19-26.
  6. Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, "A Secure Image Encryption Algorithm Based on Rubik's Cube Principle", Journal of Electrical and Computer Engineering, Volume 2012 (2012), Article ID 173931, 13 pages.
  7. Shujiang Xu, Yinglong Wang, Jizhi Wang, Yucui Guo, "A Fast Image Encryption Scheme Based on a Nonlinear Chaotic Map", 2010 2nd International Conference on Signal Processing Systems (ICSPS), 5-7 July 2010, pages: v2-326-v2-330.
Index Terms

Computer Science
Information Sciences

Keywords

Correlation coefficient concatenation entropy histogram and image