CFP last date
20 May 2024
Reseach Article

Matrix based Substitution and Diffusion Procedure for Fast Image Encryption

by Paul A. J, Lekshmi R. Nair
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 3
Year of Publication: 2013
Authors: Paul A. J, Lekshmi R. Nair
10.5120/13840-1273

Paul A. J, Lekshmi R. Nair . Matrix based Substitution and Diffusion Procedure for Fast Image Encryption. International Journal of Computer Applications. 80, 3 ( October 2013), 16-20. DOI=10.5120/13840-1273

@article{ 10.5120/13840-1273,
author = { Paul A. J, Lekshmi R. Nair },
title = { Matrix based Substitution and Diffusion Procedure for Fast Image Encryption },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 3 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number3/13840-1273/ },
doi = { 10.5120/13840-1273 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:33.691261+05:30
%A Paul A. J
%A Lekshmi R. Nair
%T Matrix based Substitution and Diffusion Procedure for Fast Image Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 3
%P 16-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper an encryption technique using matrix based substitution and diffusion for fast image encoding is discussed. The cryptographic procedure manipulates a two dimensional array (matrix) for substitution and diffusion operations. The procedure facilitates fast conversion of plaintext and images into cipher text and cipher images. The paper describes the encryption procedure, discusses on performance and compares with Advanced Encryption Standard (AES). It is shown that the matrix based substitution and diffusion procedure is capable of encrypting images faster than Advanced Encryption Standard.

References
  1. Ju Young O. H et-al, "A Selective Encryption Algorithm based on AES for Medical Information," Health Informatic Research, Vol 16, No. 1, March 2010, pp. 22–29.
  2. M. Zeghid et-al, "A Modified AES based Algorithm for Image Encryption," World Academy of Science, Engineering and Technology, 27 2007, pp 206 – 210.
  3. Data Encryption Standard : http://csrc. nist. gov/publications/fips/fips 46-3/fips- 46- 3. pdf
  4. Advanced Encryption Standard: http://csrc. nist. gov/publications/fips/fips197/ fips- 197. pdf
  5. Xiaogang Jia et-al, "Image Encryption using IKEDA Map," International Conference on Intelligent Computing and Cognitive Informatics, IEEE Computer Society, pp. 455-458 , (2010)
  6. Jose J. Amador, Robert W. Green, "Symmetric-Key Block Ciphers for Image and Text Cryptography," International Journal of Imaging System Technology, Vol. 15 – pp. 178-188, (2005).
  7. Dragos Trinca, "Sequential and Parallel Cascaded Convolution Encryption with Local Propagation: Toward Future Directions in Cryptography," Proceedings of The third International Conference on Information Technology-New Generations. (ITNG'06), 0-7695-2497- 4 / 2006, IEEE Computer Society, (2006).
  8. Adam J. Elbirt, Christof Paar "An Instruction- Level Distributed Processor for Symmetric-Key Cryptography," IEEE Transactions on Parallel and distributed Systems, Vol. 16, No. 5, May, (2005).
  9. Paul A. J. , Varghese Paul, P. Mythili "Fast Symmetric Cryptography using Key and Data based Masking Operations," International Journal of Computational Intelligence-Research and Applications. Vol. 3, No. 1, January-June 2009, pp 5–10.
  10. Krishnamoorthy G. N, V. Ramaswamy, "Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images," International Journal of Network Security & its Applications, Vol. 1, No. 1, April 2009, pp 28-33.
  11. Paul A. J. , P. Mythili, K. Poulose Jacob, "Matrix based Cryptographic procedure for Efficient Image encryption", Proceedings of International Conference on Recent Advances in Intelligent Computational Systems, RAICS IEEE, Sept - 2011, pp. 173-177.
  12. Paul A. J. , Saju A. , Lekshmi R. Nair, "Data based Transposition to Enhance Data Avalanche and Differential Data Propagation in Advanced Encryption Standard". International Journal of Computer Applications vol. 67 No. 12, April 2013, pp. 6-9.
Index Terms

Computer Science
Information Sciences

Keywords

Ciphertext Decryption Encryption Plaintext Substitution Diffusion Secret key Sub key.