CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Image Encryption using Pseudo Random Number Generators

by Arihant Kr. Banthia, Namita Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 20
Year of Publication: 2013
Authors: Arihant Kr. Banthia, Namita Tiwari
10.5120/11508-7226

Arihant Kr. Banthia, Namita Tiwari . Image Encryption using Pseudo Random Number Generators. International Journal of Computer Applications. 67, 20 ( April 2013), 1-8. DOI=10.5120/11508-7226

@article{ 10.5120/11508-7226,
author = { Arihant Kr. Banthia, Namita Tiwari },
title = { Image Encryption using Pseudo Random Number Generators },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 20 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number20/11508-7226/ },
doi = { 10.5120/11508-7226 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:36.816199+05:30
%A Arihant Kr. Banthia
%A Namita Tiwari
%T Image Encryption using Pseudo Random Number Generators
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 20
%P 1-8
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image encryption is conversion of image to a distorted form so that it can be secured from unauthorized users. This paper implements and investigates two methods for image encryption. First technique is encryption of image by linear congruential generator. Random numbers are generated by Linear congruential generator. These numbers are used as index for shuffling of rows, columns and pixels of an image. Second technique uses logistic maps to generate random number sequences. These random numbers are used as index for shuffling of rows, columns and pixels of an image. Finally we have analyzed two methods on basis of image quality parameters.

References
  1. Syscom Laboratory, Ecole Nationale d'Ingénieurs de Tunis,Tunisia,"Security analysis of image cryptosystems only or partially based on a chaotic permutation", The Journal of Systems and Software 85(2012) 2133– 2144.
  2. G. A. Sathishkumar, Srinivas Ramachandran, Dr. K. Bhoopathy Bagan "Image Encryption Using Random Pixel Permutation by Chaotic Mapping" 2012 IEEE Symposium on Computers & Informatics, 2012.
  3. Bin Wang, Xiaopeng Wei, Qiang Zhang," Cryptanalysis of an image cryptosystem based on logistic map", Optik xxx (2012) xxx–xxx
  4. Mohammad Ali Bani Younes and Arnan Jantan ," Image Encryption Using Block-Based transformation Algorithm", IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
  5. Vibha Tiwari, P. P. Bansod and Abhay Kumar, "Performance Evaluation of Various Compression Techniques on Medical Images", International journal of advanced electronics & communication systems, Issue 2 Volume 1 May 2012.
  6. Jiankun Hu, Fengling Han, "A pixel-based scrambling scheme for digital medical images protection" Journal of Network and Computer Applications 32 (2009) 788–794.
  7. Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah ," An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption", Informatica 31 (2007) 121–129.
  8. Koredianto Usman, Hiroshi Juzojil IsaoNakajimal, Soegijardjo Soegidjoko, Mohamad Ramdhani Toshihiro Hori, SeijiIgi "Medical image encryption based on pixel arrangement and random permutation for transmission security" 1-4244-0942-X/07/ 2007IEEE.
  9. Akhavan, A. Samsudin, A. Akhshani, "A symmetric image encryption scheme based on combination of nonlinear chaotic maps" Journal of the Franklin Institute 348 (2011) 1797 – 1813.
  10. Chang C, Hwang M, Chen T, "A new encryption algorithm for image cryptosystems. "JSyst Software;58:83–91, science, vol. 809, Springer, Berlin; 1993. p. 71–82, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Logistic map Linear congruential generator