CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Symmetric Encryption Scheme for Colour BMP Images

Published on December 2011 by Narendra K Pareek, Vinod Patidar, Krishan K Sud
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 2
December 2011
Authors: Narendra K Pareek, Vinod Patidar, Krishan K Sud
bfc42323-1604-4c27-8f98-742d54a61665

Narendra K Pareek, Vinod Patidar, Krishan K Sud . A Symmetric Encryption Scheme for Colour BMP Images. Network Security and Cryptography. NSC, 2 (December 2011), 42-46.

@article{
author = { Narendra K Pareek, Vinod Patidar, Krishan K Sud },
title = { A Symmetric Encryption Scheme for Colour BMP Images },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 2 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 42-46 },
numpages = 5,
url = { /specialissues/nsc/number2/4333-spe026t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Narendra K Pareek
%A Vinod Patidar
%A Krishan K Sud
%T A Symmetric Encryption Scheme for Colour BMP Images
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 2
%P 42-46
%D 2011
%I International Journal of Computer Applications
Abstract

In this paper, a new image encryption scheme for colour BMP images using a secret key of 120-bits is proposed. Initially, image is divided into blocks subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key used in algorithm as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete this process. To make cipher more robust, a feedback mechanism is applied by modifying the used secret key after encrypting each block. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.

References
  1. Gao, T., & Chen, Z. (2008). Image encryption based on a new total shuffling algorithm. Chaos, Solitons and Fractals, 38, 213-220.
  2. Younes, M.A.B., & Jantan, A. (2008). An image encryption approach using a combination of permutation technique followed by encryption. International Journal of Computer Science and Network Security, 8, 191-197.
  3. Tong, X., & Cui, M. (2008). Image encryption with compound chaotic sequence cipher shifting dynamically. Image and Vision Computing, 26, 843-850.
  4. Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals, 35, 408-419.
  5. Pareek, N.K., Patidar, Vinod, & Sud, K.K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926-934.
  6. Patidar, Vinod, Pareek, N.K., & Sud, K.K. (2010). Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Communication in Nonlinear Science and Numerical Simulation, 15, 2755-2765.
  7. Yoon, Ji Won, & Kim, Hyoungshick (2010). An image encryption scheme with a pseudorandom permutation based on chaotic maps. Communication in Nonlinear Science and Numerical Simulation, doi:10.1016/j.cnsns.2010. 01.041.
  8. Ismail, Amr Ismail, Mohammed, Amin, & Diab, Hossam (2010). A digital image encryption algorithm based a composition of two chaotic logistic map. International Journal of Network Security, 11(1), 1-10.
  9. Jolfaei, Alireza, & Mirghadri, Abdolrasoul (2011). Image encryption using chaos and block cipher. Computer and Information Science, 4(1), 172-185.
  10. Nayak, C.K., Acharya, A.K., & Das, Satyabrata (2011). Image encryption using an enhanced block based transformation algorithm. International Journal of Research and Review in Computer Science, 2(2), 275-279.
  11. Sathishkumar, G.A., & Bagan, K. Bhoopathy (2011). A novel image encryption algorithm using pixel shuffling Base 64 encoding based chaotic block cipher. WSEAS Transactions on computers, 10(6), 169-178.
  12. Chen, Dongming, & Chang, Yunpeng (2011). A novel image encryption algorithm based on logistic maps. Advances in Information Science and Service Sciences, 3(7), 364-372.
  13. Indrakanti, S.P., & Avadhani, P.S. (2011). Permutation based image encryption technique. International Journal of Computer Applications, 28(8), 45-47.
  14. Musa, M., Schaefer, E., & Wedig, S. (2003). A simplified AES algorithm and its linear and differential cryptanalysis. Cryptologia, 27, 148-177.
  15. Shannon, C.E. (1940). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656-715.
  16. Yue, Wu, Joseph, P. Noonan, & Sos, Agaian (2011). NPCR and UACI randomness tests for image encryption. Journal of Selected Areas in Telecommunications, 31-38.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Substitution Image cipher