CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Image Encryption based on Random Point Image Slicing and Recursive Application of RGB Value Displacement on Slices

by Amnesh Goel, Nidhi Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 14
Year of Publication: 2012
Authors: Amnesh Goel, Nidhi Chandra
10.5120/4886-7371

Amnesh Goel, Nidhi Chandra . Image Encryption based on Random Point Image Slicing and Recursive Application of RGB Value Displacement on Slices. International Journal of Computer Applications. 39, 14 ( February 2012), 7-10. DOI=10.5120/4886-7371

@article{ 10.5120/4886-7371,
author = { Amnesh Goel, Nidhi Chandra },
title = { Image Encryption based on Random Point Image Slicing and Recursive Application of RGB Value Displacement on Slices },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 14 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number14/4886-7371/ },
doi = { 10.5120/4886-7371 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:26.152176+05:30
%A Amnesh Goel
%A Nidhi Chandra
%T Image Encryption based on Random Point Image Slicing and Recursive Application of RGB Value Displacement on Slices
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 14
%P 7-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The image encryption methods have become very important in the today’s scenario because images are widely used for various purposes and transmission of digital image over network has increased drastically. Handling of images demand more security as they contain confidential information in it and the concept of encryption has been used for years. Here we proposing a new enhancement to the algorithm of image encryption proposed earlier where the image slicing is perform followed by shuffling up those slices. In this research compilation, we derive the point or coordinate from the key value on basis of which we bifurcate the image into 4 parts and the Inter-pixel displacement of RGB attributes are applied to each of this part. Similarly this process is continued with a new point coordinates till the predefined number of iterations are donewhose count is again a value derived from the encryption key.

References
  1. Information available on internet via www at http://uidai.gov.in/index.php?option=com_content&view=article&id=153&Itemid=13.
  2. Information available on internet via www at http://www.expresscomputeronline.com/20070312/technology01.shtml.
  3. Information available on internet via www at http://ewh.ieee.org/r10/bombay/news5/Biometrics.htm.
  4. RashidahKadir, Rosdiana Shahril2 and MohdAizainiMaarof, "A modified image encryption scheme based on 2D chaotic map" 978-1-4244-6235-3/10/$26.00 ©2010 IEEE.
  5. MazleenaSalleh, Subariah Ibrahim & Ismail FauziIsnin, "Image Encryption Algorithm Based On Chaotic Mapping".
  6. Jinping Fan, Yonglin Zhang, "Color image encryption and decryption based on double random phase encoding technique", 978-1-4244-4412-0/09/$25.00 ©2009 IEEE.
  7. Reji Mathews, AmneshGoel, PrachurSaxena&VedPrakash Mishra, "Image Encryption Based on Explosive Inter-pixel Displacement of the RGB Attributes of a PIXEL", Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA. ISBN: 978-988-18210-9-6.
  8. AmneshGoel, Reji Mathews &Nidhi Chandra, "Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices", International Journal of Computer Applications (0975 – 8887), Volume 36– No.3, December 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption RGB Shifting Slicing Shuffling Permutation Random Point