CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Image Encryption Approach using Pixel and Position Manipulation Technique

Published on February 2013 by Panduranga H T, Naveen Kumar S K
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 6
February 2013
Authors: Panduranga H T, Naveen Kumar S K
8323f658-7de0-4282-a6a1-92a8196dd403

Panduranga H T, Naveen Kumar S K . An Image Encryption Approach using Pixel and Position Manipulation Technique. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 6 (February 2013), 29-33.

@article{
author = { Panduranga H T, Naveen Kumar S K },
title = { An Image Encryption Approach using Pixel and Position Manipulation Technique },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 6 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 29-33 },
numpages = 5,
url = { /proceedings/icrtitcs2012/number6/10289-1395/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Panduranga H T
%A Naveen Kumar S K
%T An Image Encryption Approach using Pixel and Position Manipulation Technique
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 6
%P 29-33
%D 2013
%I International Journal of Computer Applications
Abstract

Information security is very important task in the field of information and communication technology. Encryption is one way to secure information. In this paper we present combined concept of pixel and position manipulation technique for image encryption. The proposed technique involves three stages. In first stage pixel position manipulation is done by using pixel shuffling block where index value of each row is rearranged in bit-reversed order so that the positions of rows are manipulated. Similarly index value of each column is rearranged in bit-reversed order, which leads to manipulation of columns. This position manipulated image is used as input to the pixel manipulation block in second stage, where each pixel is rearranged in reverse order. In third stage, this scrambled image is again undergone pixel value manipulation by using bit-rotation concept leading to encrypted image. This proposed combined concept is implemented for different images using MATLAB. Decryption involves the reverse process of encryption.

References
  1. S S Maniccam and N G Bourbakis, "Image and video encryption using scan patterns", Pattern Recognition, 2004, vol. 37, pp 725-737.
  2. S. R. M. Prasanna et. el. , "An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images," IJCS, 2006, vol. 1, No 2, pp. 132-137.
  3. Mitra et. el. , " A New Image Encryption Approach using Combinational Permutation Techniques," IJCS, 2006, vol. 1, No 2, pp. 127-131.
  4. Panduranga H T, Naveenkumar S K, "A novel image encryption method using 4 out of 8 code", proc. CommV'09, pp460-462, 2009.
  5. Panduranga H T, Naveenkumar S K, "An Image Encryption Approach using Bit-Reversal Method", proc. NCIMP, pp181-183, 2010.
  6. Bibhudendra Acharya, Girija Sankar Rath, Sarat KumarPatra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21
Index Terms

Computer Science
Information Sciences

Keywords

Pixel Manipulation Position Manipulation Bit-reversal Bit-rotate Encryption