Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Image Encryption using Pseudo Random Number Generators

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 20
Year of Publication: 2013
Arihant Kr. Banthia
Namita Tiwari

Arihant Kr. Banthia and Namita Tiwari. Article: Image Encryption using Pseudo Random Number Generators. International Journal of Computer Applications 67(20):1-8, April 2013. Full text available. BibTeX

	author = {Arihant Kr. Banthia and Namita Tiwari},
	title = {Article: Image Encryption using Pseudo Random Number Generators},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {20},
	pages = {1-8},
	month = {April},
	note = {Full text available}


Image encryption is conversion of image to a distorted form so that it can be secured from unauthorized users. This paper implements and investigates two methods for image encryption. First technique is encryption of image by linear congruential generator. Random numbers are generated by Linear congruential generator. These numbers are used as index for shuffling of rows, columns and pixels of an image. Second technique uses logistic maps to generate random number sequences. These random numbers are used as index for shuffling of rows, columns and pixels of an image. Finally we have analyzed two methods on basis of image quality parameters.


  • Syscom Laboratory, Ecole Nationale d'Ingénieurs de Tunis,Tunisia,"Security analysis of image cryptosystems only or partially based on a chaotic permutation", The Journal of Systems and Software 85(2012) 2133– 2144.
  • G. A. Sathishkumar, Srinivas Ramachandran, Dr. K. Bhoopathy Bagan "Image Encryption Using Random Pixel Permutation by Chaotic Mapping" 2012 IEEE Symposium on Computers & Informatics, 2012.
  • Bin Wang, Xiaopeng Wei, Qiang Zhang," Cryptanalysis of an image cryptosystem based on logistic map", Optik xxx (2012) xxx–xxx
  • Mohammad Ali Bani Younes and Arnan Jantan ," Image Encryption Using Block-Based transformation Algorithm", IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
  • Vibha Tiwari, P. P. Bansod and Abhay Kumar, "Performance Evaluation of Various Compression Techniques on Medical Images", International journal of advanced electronics & communication systems, Issue 2 Volume 1 May 2012.
  • Jiankun Hu, Fengling Han, "A pixel-based scrambling scheme for digital medical images protection" Journal of Network and Computer Applications 32 (2009) 788–794.
  • Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah ," An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption", Informatica 31 (2007) 121–129.
  • Koredianto Usman, Hiroshi Juzojil IsaoNakajimal, Soegijardjo Soegidjoko, Mohamad Ramdhani Toshihiro Hori, SeijiIgi "Medical image encryption based on pixel arrangement and random permutation for transmission security" 1-4244-0942-X/07/ 2007IEEE.
  • Akhavan, A. Samsudin, A. Akhshani, "A symmetric image encryption scheme based on combination of nonlinear chaotic maps" Journal of the Franklin Institute 348 (2011) 1797 – 1813.
  • Chang C, Hwang M, Chen T, "A new encryption algorithm for image cryptosystems. "JSyst Software;58:83–91, science, vol. 809, Springer, Berlin; 1993. p. 71–82, 2001.