Securing Images Using Inversion and Shifting

Privacy of information is an important issue in modern era of information technology to manage handling of sensitive information over networks efficiently. It is seen that individual use of inversion and circular shifting while encryption of images does not provide adequate security and weaknesses remain can be exploited by interceptors. In this paper, we propose an improved encryption scheme which utilizes both inversion and shifting in specific manner. We use pseudo random number sequences to perform inversion and circular shifting in a random manner for transforming image pixels. Simulation results show that encrypted images obtained are quite unintelligible and pixels distributed uniformly. Also, proposed encryption method is error propagating, follows avalanche criteria, has large key space and provides higher information security.

[1]  Charles Schwartz A New Graphical Method for Encryption of Computer Data , 1991, Cryptologia.

[2]  Shujun Li,et al.  On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.

[3]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[4]  Xiaojun Tong,et al.  Image encryption with compound chaotic sequence cipher shifting dynamically , 2008, Image Vis. Comput..

[5]  Ram Ratan,et al.  Key Independent Retrieval of Chaotic Encrypted Images , 2009, PReMI.

[6]  Ram Ratan Key Independent Decryption of Graphically Encrypted Images , 2010, PAISI.

[7]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[8]  Stephen G. Wilson,et al.  Digital Modulation and Coding , 1995 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Jiun-In Guo,et al.  A new image encryption algorithm and its VLSI architecture , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[11]  William Stallings,et al.  Cryptography and network security , 1998 .

[12]  T. Kohda,et al.  Statistics of chaotic binary sequences , 1997, IEEE Trans. Inf. Theory.

[13]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[14]  Min Long,et al.  A Chaos-Based Data Encryption Algorithm for Image/Video , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[15]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[16]  Yuan-Chung Chin,et al.  Cryptanalysis on Schwartz Graphical Encryption Method , 1993, Cryptologia.

[17]  Zhiliang Zhu,et al.  A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[18]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[19]  C. E. Veni Madhavan,et al.  Steganography based Information Security , 2002 .