A secure symmetric image encryption based on linear geometry

Transmission of image as secret over unreliable communication media is the demanding need of the day. But some intrinsic features like bulk data size, correlation among pixels are not properly addressed by conventional encryption algorithms such as DES, Triple-DES, RSA etc. To address the deficiency of conventional encryption algorithms, we propose a symmetric encryption technique based on linear geometry. Though the basic idea is block ciphering (size of each block is 4 bytes), here we have introduced the fundamental concept of linear geometry for ciphering. The ciphered bytes are again shuffled among N positions (N is size of secret file in bytes). The scheme is basically combination of substitution as well as transposition techniques, which provides better protection for secret image. It may be mentioned that there is no change in size after encryption. The proposed image encryption algorithm is described in detail along with its security analysis, such as key sensitivity analysis, statistical analysis, and differential analysis. Comparisons in terms of correlation between the secret and encrypted images, number of pixels change rate and unified average changing intensity are also presented. The present algorithm has been tested using different images to establish that the technique is quite robust and has a great potential to meet the security needs for digital images.

[1]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[2]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[3]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[4]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[5]  M. El Henawy,et al.  On Wavelets Applications in Image Compression , 2003, Egypt. Comput. Sci. J..

[6]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[7]  P. V. Oorschot Overview of Cryptography , .

[8]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[9]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[10]  Chee Kheong Siew,et al.  A New Encryption Algorithm for High Throughput Multimedia , 2002 .

[11]  Roberto Rinaldo,et al.  Video over IP using standard-compatible multiple description coding: An IETF proposal , 2006 .

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Ian F. Blake,et al.  An Overview of Cryptography , 2013 .

[14]  Kai Wang,et al.  On the security of 3D Cat map based symmetric image encryption scheme , 2005 .

[15]  Yang Shuangyuan,et al.  An asymmetric image encryption based on matrix transformation , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[16]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[17]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[18]  Ralph Howard,et al.  Data encryption standard , 1987 .

[19]  Prasanta K. Panigrahi,et al.  Wavelets: Applications to image compression-II , 2005 .