CFP last date
20 May 2024
Reseach Article

Virtual Cylindrical View of a Color Image for its Permutation for an Encryption Purpose

by Brahim Nini, Darine Bouteldja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 16 - Number 1
Year of Publication: 2011
Authors: Brahim Nini, Darine Bouteldja
10.5120/1978-2653

Brahim Nini, Darine Bouteldja . Virtual Cylindrical View of a Color Image for its Permutation for an Encryption Purpose. International Journal of Computer Applications. 16, 1 ( February 2011), 11-17. DOI=10.5120/1978-2653

@article{ 10.5120/1978-2653,
author = { Brahim Nini, Darine Bouteldja },
title = { Virtual Cylindrical View of a Color Image for its Permutation for an Encryption Purpose },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 16 },
number = { 1 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume16/number1/1978-2653/ },
doi = { 10.5120/1978-2653 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:03:44.076108+05:30
%A Brahim Nini
%A Darine Bouteldja
%T Virtual Cylindrical View of a Color Image for its Permutation for an Encryption Purpose
%J International Journal of Computer Applications
%@ 0975-8887
%V 16
%N 1
%P 11-17
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a novel algorithm for row and column permutation of pixels for the purpose of image encryption. The algorithm introduces a virtual cylinder surrounding an image and a virtual viewer looking at it but displaced from an original position. The key idea is based on the assumption that the light ray of each pixel to the viewer in her/his original position intersects the cylinder surface at a given point. When the viewer is displaced, the new position on a perpendicular image plane on which the pixel is projected should also have its direction intersecting the cylinder on the same point. As a result, all projected pixels in the new created image are slid from their original positions; but, some of them are delayed because they are piled up or projected out. In order to avoid information loss, these pixels are projected in the created holes of the new image. The consequence of such process is the creation of the expected permutation. Despite its simplicity, the algorithm shows a strong transformation of images for the purpose of their encryption.

References
  1. Li C., Li S., Zhang D., and Chen G. 2004. Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. In Advances in Multimedia Information Processing – PCM 2004 Proceedings, Part III, LNCS, vol. 3333, pp.418-425.
  2. Jianbing Shen, Xiaogang Jin, and Chuan Zhou. 2005. A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation. Y.-S. Ho and H.J. Kim (Eds.): PCM 2005, Part II, LNCS 3768, pp. 270-280.
  3. Zhang Linhua, Liao Xiaofeng, and Wang Xuebing. 2005. An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals 24, pp.759-765.
  4. Sapiee Jamel, Tutut Herawan, and Mustafa Mat Deris. 2010. A Cryptographic Algorithm Based on Hybrid Cubes. ICCSA 2010, Part IV, LNCS 6019, pp. 175-187.
  5. National Institute of Standards (NIST): FIPS Pub 197. Advanced Encryption Standard AES. http://csrc.nist.gov/
  6. Daemen J., and Rijmen V. 2002. The Design of Rijndael: AES – The Advanced Encryption Standard. Springer-Verlag.
  7. Wu S., Zhang Y., and Jing X. 2005. A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi-Column Bi-row Circular Queue. In International Conference on Computer Science and Software Engineering, IEEE, Los Alamitos.
  8. Trenkler, M. 2005. An Algorithm for making Magic Cubes', The Π ME Journal, Vol. 12, No 2, pp.105-106.
  9. Haojiang Gao, Yisheng Zhang, Shuyun Liang, and Dequn Li. 2006. A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals 29, pp.393-399.
  10. Chengqing Li. 2008. On the Security of a Class of Image Encryption Scheme. In Proceedings of 2008 IEEE Int. Symposium on Circuits and Systems, pp. 3290-3293.
Index Terms

Computer Science
Information Sciences

Keywords

Image permutation Image transform nonlinear permutation Key