Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Image Encryption using Block Permutation and XOR Operation

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
T. Sivakumar, K. Gayathri Devi

T Sivakumar and Gayathri K Devi. Image Encryption using Block Permutation and XOR Operation. International Journal of Computer Applications 160(9):33-36, February 2017. BibTeX

	author = {T. Sivakumar and K. Gayathri Devi},
	title = {Image Encryption using Block Permutation and XOR Operation},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {9},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {33-36},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2017912981},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Now a days, in every communication channel there is a necessity of transmission of messages securely from sender to the authentic receiver. In recent years, for different information transfer systems, a number of data encryption techniques has been evolved. Several encryption approaches based on permutation have been proposed by various researchers. In this paper, for encrypting images, permutation and XOR operation with a key matrix which together fulfill the purpose of cipher is proposed. First the image is divided into blocks which are then shuffled among themselves using random numbers. Lagged Fibonacci Generator (LFG) is used to generate random numbers and further the random numbers are used as key stream for XOR operation. The proposed encryption method is simple and ensures the security of the encrypted images.


  1. William Stallings, “Cryptography and Network Security Principles and Practices”, Prentice Hall, New Delhi, 2015.
  2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, New York, 2010.
  3. Mohammad Ali BaniYounes and AmanJantan, “Image encryption using block-based transformation algorithm”, IAENG International Journal of Computer Science, Vol 35, No.1, 2008.
  4. Sesha Pallavi Indrakanti and Avadhani P.S, “Permutation based image encryption technique”, International Journal of Computer Applications, Vol. 28, No.8, 2011.
  5. Chinmaya Kumar Nayak, Anuja Kumar Acharya and Satyabrata Das, “Image encryption using an enhanced block based transformation algorithm”, International Journal of Research and Reviews in Computer Science, Vol. 2, No.2, 2011.
  6. Panduranga H.T and Naveen Kumar S.K, “Hybrid approach for image encryption using scan pattern and carrier images”, International Journal on Computer Science and Engineering, vol. 2, No. 2, pp. 297-300, 2010.
  7. A. Mitra, Y.V. subba Rao and S.R.M. Prasanna, “A new image encryption approach using combinational permutation techniques”, International Journal of Electrical and Computer Engineering, Vol.1, No.2, pp. 127-131, 2006.
  8. G. A. Sathish kumar and K. Bhoopathy Bagan, “A novel image encryption algorithm using pixel shuffling and base-64 encoding based chaotic block cipher”, WSEAS Transactions on computers, Vol. 10, No. 6, pp. 169-178, 2011.
  9. C. K. Huang, C.W. Liao, S.L. Hsu and Y.C. Jeng, “Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system”, Telecommunication Systems, Vol.52, No.2, pp. 563-57, 2011.
  10. Qian Mao, Chin-Chen Chang and Hsiao-Ling Wu, “An image encryption scheme based on concatenated torus automorphisms ”, KSII Transactions on Internet and Information Systems, Vol. 7, No. 6,pp. 1492-1511, 2013.
  11. Qiang Zhang, Xianglian Xue and Xiaopeng Wei, “A novel image encryption algorithm based on DNA subsequence operation’’, The Scientific World Journal, Vol. 2012, Article ID 286741, 2012.
  12. Manju Rani and Sudesh Kumar, “Analysis on different parameters of encryption algorithms for information security”, International Journal of Advanced research in Computer Science and Software Engineering”, Vol. 5, No. 8, 2015.
  13. B. Nagarajan and P.Manju, “Secure image encryption algorithm based on genetic operators”, International Journal on Engineering Technology and Sciences, Vol. 3, No. 5, 2016.
  14. G.A Sathishkumar, K. Bhoopathy and R. Sriraam, “Image encryption based on diffusion and multiple chaotic maps”, International Journal of Network security and its Applications, Vol. 3, pp. 181-194, 2011.
  15. T.Sivakumar, and Dr.R.Venkatesan, “A Novel Framework for Image Encryption using Karhunen-Loeve Transform”, International Journal of Computer Applications (ISSN 0975-8887), 1- 6, Volume 54– No.2, September 2012.
  16. T.Sivakumar, and R.Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, wseas transactions on computers, Vol 12, Issue. 11, p.p. 407-418, November 2013.


Cryptography, image encryption, Lagged Fibonacci Generator (LFG), Random number