A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation

In the present brutal competitive world, security is prime factor to transmit confidential data over the internet. Cryptographic algorithms play very important role in providing the data security against the various attacks. The specific characteristics of image, like high transmission rate with limited bandwidth, correlation among pixels, redundancy and requirement of high storage capacity makes traditional algorithms unsuitable for image encryption. To cross these boundaries for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security is always a big challenge for researchers. This paper proposes an algorithm based on block based image transformation using perfect shuffle operation followed by new encryption algorithm. In this paper we compare the generated results with available algorithms like AES, RC6 and BFS on the basis of two parameters entropy and correlation.

[1]  H T Panduranga,et al.  Hybrid approach to transmit a secrete image , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.

[2]  Wei Liu,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[3]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[4]  Zhang Yong,et al.  Image encryption with logistic map and cheat image , 2011, 2011 3rd International Conference on Computer Research and Development.

[5]  Sagar Naik,et al.  Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..

[6]  Zhang Han,et al.  A new image encryption algorithm based on chaos system , 2003, IEEE International Conference on Robotics, Intelligent Systems and Signal Processing, 2003. Proceedings. 2003.

[7]  Jinjie Li,et al.  A novel image encryption algorithm based on high-dimensional compound chaotic systems , 2011, 2011 International Conference on Multimedia Technology.

[8]  Alireza Jolfaei,et al.  Survey: image encryption using Salsa20 , 2010 .

[9]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[10]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[11]  R. Badlishah Ahmad,et al.  Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .

[12]  P. Mythili,et al.  Matrix based cryptographic procedure for efficient image encryption , 2011, 2011 IEEE Recent Advances in Intelligent Computational Systems.

[13]  William Stallings,et al.  Cryptography and network security , 1998 .

[14]  Sagar Naik,et al.  Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.

[15]  Yang Wang,et al.  The performance analysis of image encryption algorithm based on chaotic system , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[16]  Pedro F. Miret,et al.  Wikipedia , 2008, Monatsschrift für Deutsches Recht.

[17]  Wenping Guo A new digital image scrambling encryption algorithm based on chaotic sequence , 2011, 2011 3rd International Conference on Computer Research and Development.

[18]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[19]  B. Subramanyan,et al.  Image Encryption Based on AES Key Expansion , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[20]  P. Krishnamurthy,et al.  Encryption and Power Consumption in Wireless LANs , 2001 .

[21]  Abir Awad Abir Awad , 2022 .

[22]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .