CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation

by Umashankar Pandey, Manish Manoria, Jainendra Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 1
Year of Publication: 2012
Authors: Umashankar Pandey, Manish Manoria, Jainendra Jain
10.5120/5655-7543

Umashankar Pandey, Manish Manoria, Jainendra Jain . A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation. International Journal of Computer Applications. 42, 1 ( March 2012), 9-15. DOI=10.5120/5655-7543

@article{ 10.5120/5655-7543,
author = { Umashankar Pandey, Manish Manoria, Jainendra Jain },
title = { A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 1 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number1/5655-7543/ },
doi = { 10.5120/5655-7543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:21.615170+05:30
%A Umashankar Pandey
%A Manish Manoria
%A Jainendra Jain
%T A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 1
%P 9-15
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present brutal competitive world, security is prime factor to transmit confidential data over the internet. Cryptographic algorithms play very important role in providing the data security against the various attacks. The specific characteristics of image, like high transmission rate with limited bandwidth, correlation among pixels, redundancy and requirement of high storage capacity makes traditional algorithms unsuitable for image encryption. To cross these boundaries for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security is always a big challenge for researchers. This paper proposes an algorithm based on block based image transformation using perfect shuffle operation followed by new encryption algorithm. In this paper we compare the generated results with available algorithms like AES, RC6 and BFS on the basis of two parameters entropy and correlation.

References
  1. D. Coppersmith, "The data encryption standard(DES) and its strength against attacks," IBM Journal of Research and Development, pp. 243 -250, May1994.
  2. J. Daemen, and V. Rijmen, "Rijndael: The advanced encryption standard," Dr. Dobb's Journal, pp. 137-139, Mar. 2001.
  3. N. E. Fishawy, "Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms," International Journal of Network Security, pp. 241-251, Nov. 2007.
  4. Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005.
  5. K. Naik, "Software implementation strategies for power-conscious systems," Mobile Networks and Applications, vol. 6, pp. 291-305, 2001.
  6. P. Ruangchaijatupon, and P. Krishnamurthy, "En- cryption and power consumption in wireless LANs-N," The Third IEEE Workshop on Wireless LANs, pp. 148-152, Newton, Massachusetts, Sep. 27-28,2001.
  7. B. Schneier, The Blowfish Encryption Algorithm, Retrieved Oct. 25, 2008. (http://www. schneier. com/blowfish. html).
  8. W. Stallings, Cryptography and Network Security, Prentice Hall, pp. 58-309, 4th Ed, 2005.
  9. S. Z. S. Idrus, and S. A. Aljunid, "Performance analysis of encryption algorithms text length size on web browsers," IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 1, pp. 20-25, Jan. 2008.
  10. Nawal El-Fishawy and Osama M. Abu Zaid "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms" published in International Journal of Network Security, Vol. 5, No. 3, PP. 241–251, Nov. 2007.
  11. Mohammad Ali Bani Younes and Aman Jantan "Image Encryption Using Block-Based Transformation Algorithm" IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03 Advance online publication: 19 February 2008.
  12. ZHANG Yun-peng, ZHAI Zheng-jun, LIU Wei, NIE Xuan, CAO Shui-ping and DAI Wei-di "Digital Image Encryption Algorithm Based on Chaos and Improved DES" published in Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009.
  13. Alireza Jolfaei and Abdolrasoul Mirghadri "Survey: Image Encryption Using Salsa20" published in IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 5, September 2010 ISSN (Online): 1694-0814.
  14. Abir AWAD "A New Chaos-Based Cryptosystem for Secure Transmitted Images" published in IEEE TRANSACTIONS ON Computers 2011.
  15. Wenping Guo "A New Digital Image Scrambling Encryption Algorithm Based on Chaotic Sequence" published in IEEE Conferences 2011.
  16. Ling Li, Weinan Wang and Jinjie Li "A Novel Image Encryption Algorithm Based on High-dimensional Compound Chaotic Systems" published in IEEE Conferences 2011.
  17. Panduranga H T and Naveen kumar S K " Hybrid Approach to Transmit a Secrete Image" published in IEEE Conferences 2011
  18. B. Subramanyan, Vivek. M. Chhabria and T. G. Sankar babu"Image Encryption Based On AES Key Expansion" published in Second IEEE International Conference on Emerging Applications of Information Technology 2011 .
  19. Zhang Yong "Image Encryption with Logistic Map and Cheat Image" published in IEEE Conferences 2011.
  20. Qian Li and Yang Wang "The Performance Analysis of Image Encryption Algorithm Based on Chaotic System" published in IEEE International Conference on Electronic & Mechanical Engineering and Information Technology 12-14 august 2011.
  21. Schneider, T. D, Information theory primer with an appendix on logarithms, National Cancer Institute, 14 April 2007.
  22. Paul A. J, P. Mythili and K. Paulose Jacob"Matrix based Cryptographic Procedure for Efficient Image Encryption" published in IEEE Conferences 2011.
  23. Sun Xin, Yi Kaixiang, Sun Youxian. New Image Encryption Algorithm Based on Chaos System [J]. Journal of Computer-AidedDesign & Computer Graphics, 2002, 14 (2): 136-139.
  24. Wikipedia (www. wikipedia. org).
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Image Encryption Image Entropy Image Correlation Confusion And Diffusion