A Symmetric Key-Based Image Encryption Scheme

In this information age, secure transmission and storage of digital image are an important requirement. Due to its better performance, symmetric key algorithms are popularly employed to provide confidentiality of digital information. In this paper, a new symmetric key-based image encryption technique has been introduced. In proposed scheme, firstly, a plain image is divided into blocks of 16 pixels and then each block is permutated by an invertible linear transformation. After that, permutated image pixel values are XOR-ed with expanded key bytes. The scheme is implemented and analyzed against statistical analysis and cryptanalysis. It is shown that proposed scheme is secure and easy for implementation.

[1]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[2]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[3]  Chi-Jeng Chang,et al.  Image observation on the modified ECB operations in Advanced Encryption Standard , 2011, International Conference on Information Society (i-Society 2011).

[4]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[5]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[6]  Sriyankar Acharyya,et al.  Image cryptography: The genetic algorithm approach , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.

[7]  Jalesh Kumar,et al.  Encryption of Images Based on Genetic Algorithm – A New Approach , 2012 .

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Jaydeb Bhaumik,et al.  An AES - based Robust Image Encryption Scheme , 2015 .

[10]  Jaydeb Bhaumik,et al.  TBLT-AES: A Robust Image Encryption Scheme , 2014 .

[11]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[12]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[13]  Saleh Mesbah,et al.  Efficiency and Security of Some Image Encryption Algorithms , 2008 .

[14]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[15]  Dipanwita Roy Chowdhury,et al.  Nmix: An Ideal Candidate for Key Mixing , 2009, SECRYPT.

[16]  Bahaa Eldin,et al.  An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems , 2010 .