A New Image Encryption Method Based on Knight's Travel Path and True Random Number

Internet is an important part in the daily life of people in many ways, which allows the people in any corner of the world to share all types of information. Image encryption is used to transmit sensitive multimedia information in unsecured networks to provide high degree of confidentiality. In this paper, a new image encryption method is proposed based on novel implementation of pixel scan, utilizing the Knight’s Travel Path, and true random number. The Knight’s travel path is a pattern in which the path of a Knight around a chess board is taken without revisiting any node. This travel path pattern is used to permute the pixel positions of the original image to obtain the scrambled image. The scrambled image is further XORed with the random key numbers to get the cipher image. To change the pixel values of the scrambled image, true random numbers are generated from the amplitude values of a chosen noise audio file. Decryption is performed to confirm the reception of the sent image. The proposed method resists the statistical, differential, and entropy attacks significantly which have been demonstrated with various standard images.

[1]  P. Vidhya Saraswathi,et al.  A Block Cipher Algorithm for Multimedia Content Protection with Random Substitution using Binary Tree Traversal , 2012 .

[2]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[3]  E. Ott Chaos in Dynamical Systems: Contents , 1993 .

[4]  Varsha Bhatt,et al.  IMPLEMENTATION OF NEW ADVANCE IMAGE ENCRYPTION ALGORITHM TO ENHANCE SECURITY OF MULTIMEDIA COMPONENT , 2012 .

[5]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[6]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[7]  T PandurangaH.,et al.  Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images , 2010, ArXiv.

[8]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[9]  Xiaomin Wang,et al.  An image scrambling encryption using chaos-controlled Poker shuffle operation , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[10]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[11]  W. Puech,et al.  Image Encryption and Compression for Medical Image Security , 2008, 2008 First Workshops on Image Processing Theory, Tools and Applications.

[12]  C. K. Huang,et al.  Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system , 2013, Telecommun. Syst..

[13]  N. Sriraam,et al.  Image Encryption Based on Diffusion and Multiple Chaotic Maps , 2011, ArXiv.

[14]  Jean-Yves Chouinard,et al.  A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..

[15]  Jawad Ahmad,et al.  Efficiency Analysis and Security Evaluation of Image Encryption Schemes , 2012 .

[16]  Shao Liping,et al.  Image scrambling algorithm based on random shuffling strategy , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[17]  Paul C. Kocher,et al.  The intel random number generator , 1999 .

[18]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[19]  G. A. Sathishkumar,et al.  A novel image encryption algorithm using pixel shuffling and base 64 encoding based chaotic block cipher (IMPSBEC) , 2011 .

[20]  Hongxia Wang,et al.  Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .

[21]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[22]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[23]  Neha Singla,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2014 .

[24]  Chin-Chen Chang,et al.  An Image Encryption Scheme Based on Concatenated Torus Automorphisms , 2013, KSII Trans. Internet Inf. Syst..