CFP last date
20 May 2024
Reseach Article

A Novel Image Encryption Method with Z-Order Curve and Random Number

by T.sivakumar, R.venkatesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 12
Year of Publication: 2014
Authors: T.sivakumar, R.venkatesan
10.5120/18126-9198

T.sivakumar, R.venkatesan . A Novel Image Encryption Method with Z-Order Curve and Random Number. International Journal of Computer Applications. 103, 12 ( October 2014), 17-25. DOI=10.5120/18126-9198

@article{ 10.5120/18126-9198,
author = { T.sivakumar, R.venkatesan },
title = { A Novel Image Encryption Method with Z-Order Curve and Random Number },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 12 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number12/18126-9198/ },
doi = { 10.5120/18126-9198 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:58.859588+05:30
%A T.sivakumar
%A R.venkatesan
%T A Novel Image Encryption Method with Z-Order Curve and Random Number
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 12
%P 17-25
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security has become an important issue for data storage and transmission due to growth of communication development and exchange of sensitive information through Internet. The services like confidentiality, integrity, and digital signature are required to protect data against unauthorized modification and misuse by anti social elements. Image encryption is widely used in multimedia, medical imaging, telemedicine and military communications to provide confidentiality service. A novel and simple image encryption method using Z-Order (ZO) curve based scan pattern and random number is proposed in this paper. The proposed method resists the statistical and differential attacks. The method provides optimal entropy value and assures security from the additive noise and cropping attacks.

References
  1. Adrian Viorel Diaconu and Khaled Loukhaoukha, "An improved secure image encryption algorithm based on Rubik's cube principle and digital chaotic cipher", Mathematical Problems in Engineering, Article ID 848392, vol. 2013, 2013, pp. 1-10.
  2. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 2010.
  3. Avi Dixit, Pratik Dhruve and Dahale Bhagwan "Image encryption using permutation and rotational XOR technique", Computer Science & Information Technology, vol. 2, no. 3, 2012, pp. 01-09.
  4. C. E Shannon, "A mathematical theory of communications", Bell Systems Technical Journal, vol. 27, no. 3, 1948, pp. 379-423.
  5. C. K. Huang and H. H. Nien, "Multi chaotic systems based pixel shuffle for image encryption", Optics Communications-Elsevier, vol. 282, no. 11, 2009, pp. 2123-2127.
  6. C. K. Huang, C. W. Liao, S. L. Hsu and Y. C. Jeng, "Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system", Telecommunication Systems – Springer, vol. 52, no. 2, 2013, pp 563-571.
  7. G. A Sathishkumar, K. Bhoopathy and R. Sriraam, "Image encryption based on diffusion and multiple chaotic maps", International Journal of Network Security & its Applications, vol. 3, no. 2, 2011, pp. 181-194.
  8. G. A. Sathishkumar and K. Bhoopathy Bagan, "A novel image encryption algorithm using pixel shuffling and Base-64 encoding based chaotic block cipher", WSEAS Transactions on Computers, vol. 10, no. 6, 2011, pp. 169-178.
  9. G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps", Chaos, Solutions and Fractals, vol. 21, no. 3, 2004, pp. 749–761.
  10. Haojiang Gao, Yisheng Zhang, Shuyun Liang and Dequn Li, "A new chaotic algorithm for image encryption", Elsevier Science Direct, vol. 29, no. 2, 2006, pp. 393-399.
  11. Hongjun Liu, Xingyuan Wang, and Abdurahman kadir, "Image encryption using DNA complementary rule and chaotic maps", Applied Soft Computing - Elsevier, vol. 12, no. 5, 2012, pp. 1457-1466.
  12. Jawad Ahmad and Fawad Ahmed, "Efficiency analysis and security evaluation of image encryption schemes", International Journal of Video & Image Processing and Network Security, vol. 12, no. 04, 2012, pp. 18-31.
  13. Kamlesh Gupta and Sanjay Silakari, "New approach for fast color image encryption using chaotic map", Journal of Information Security, vol. 2, 2011, pp. 139-150.
  14. Khaled Loukhaoukha, Jean-Yves Chouinard and Abdellah Berdai, "A secure image encryption algorithm based on Rubik's cube principle", Journal of Electrical and Computer Engineering, Article ID 173931, vol. 2012, 2012, pp. 1-13.
  15. Liang Zhao, Avishek Adhikari, Di Xiao, and Kouichi Sakurai, "On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption", Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 8, 2012, pp. 3303-3327.
  16. Minati Mishra, Priyadarsini Mishra, M. C. Adhikary and Sunit Kumar, "Image Encryption Using Fibonacci-Lucas Transformation", International Journal on Cryptography and Information Security (IJCIS),Vol. 2, No. 3, pp. 131-141, September 2012.
  17. N. G Bourbakis, and C. Alexopoulos, "Picture data encryption using scan patterns", Pattern Recognition, Volume 25, Issue 6, June 1992, Pages 567-581, ISSN 0031-3203.
  18. Narendra K Pareek, Vinod Patidar and Krishan K Sud, "Substitution-diffusion based Image Cipher", International Journal of Network Security & its Applications (IJNSA), Vol. 3, No. 2, pp. 149-160, March 2011.
  19. Nikolaos G. Bourbakis, Chris Alexopoulos, "A fractal-based image processing language: formal modeling", Pattern Recognition, Volume 32, Issue 2, February 1999, Pages 317–338.
  20. P. Vidhya Saraswathi and M. Venkatesulu, "A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal", Journal of Computer Science, vol. 8, no. 9, 2012, pp. 1541-1546.
  21. Qiang Zhang, Xianglian Xue, and Xiaopeng Wei, "A novel image encryption algorithm based on DNA subsequence operation", The Scientific World Journal, vol. 2012, Article ID 286741, 2012, pp. 1-10.
  22. Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, "Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping", International Journal on Cryptography and Information Security (IJCIS),Vol. 2, No. 1, pp. 49-57, March 2012.
  23. Rasul Enayatifar, "Image encryption via logistic map function and heap tree", International Journal of the Physical Sciences, vol. 6, no. 2, 2011, pp. 221-228.
  24. S. S. Maniccam and N. G. Bourbakis, "Image and video encryption using SCAN patterns", Pattern Recognition Society, vol. 37, no. 4, 2004, pp. 725-737.
  25. William Stalling, Cryptography and Network Security – Principles and Practices, Pearson Education, New Delhi, 2013.
  26. Yue Wu, Joseph P. Noonan, and Sos Agaian, "NPCR and UACI randomness tests for image encryption", Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, pp. 31-38.
  27. Z. Lin and H. Wang, "Efficient image encryption using a chaos-based PWL memristor", IETE Technical Review, vol. 27, no. 4, 2010, pp. 318–325.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Scan Pattern Z-Order Curve Random Number