Modified Image Encryption Technique

International Journal of Electronics and Communication Engineering
© 2014 by SSRG - IJECE Journal
Volume 1 Issue 6
Year of Publication : 2014
Authors : Kirti Sapra and Swati Kapoor
pdf
How to Cite?

Kirti Sapra and Swati Kapoor, "Modified Image Encryption Technique," SSRG International Journal of Electronics and Communication Engineering, vol. 1,  no. 6, pp. 21-25, 2014. Crossref, https://doi.org/10.14445/23488549/IJECE-V1I6P108

Abstract:

Protection to the data over the open network is very important. Encryption is one of the ways out to make your data safe and secure. In this paper, the main objective is to present a modified image encryption technique, which does not only makes the image very difficult to retrieve by any other person except the recipient but also reduces the time for encryption. This proposed encryption technique is the combined technique of various methods of encryption such as: RSA algorithm, Bit Rotation method, Ex-Hill Cipher method, Bit Reversal method and Randomization using Permutation. First the pixels value of an image is converted into eight bit binary format. RSA algorithm is chosen to generate the passwords, encrypting key and decrypting key. After this above mentioned methods are applied to encrypt the image. After the generation of new 8 bit value, the binary values are converted back to decimal format and the new pixels values replace the older one.

Keywords:

RSA, Ex- Hill Cipher, Permutation, Bit Rotation and Reversal.

References:

[1] Bharti Ahuja, Rashmi Lodhi, “Differentalgorithm used in Image encryption :A review”, International Journal of computer sciences and engineering Technology, ISSN 2229-3345, Volume 4, No. 7, July 2013.
[2] Ismet Ozturk and Ibrahim Sogukpinaar, “Analysis and Comparison ofImage Encryption Algorithms”, Transaction on engineering, Computerand Technology, 2004, vol.3, pp.38-42. 
[3] Mitra et. el., “A New Image Encryption Approach using CombinationalPermutation Techniques,” IJCS, 2006, vol. 1, No 2, pp.127-131.
[4] Panduranga H T, Naveenkumar S K, “An image encryption approachusing bit-reversal method ”, NCIMP 2010, pp.181-183.
[5] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. “Novel Methods of Generating Self-InvertibleMatrix for Hill Cipher Algorithm”, International Journal of Security, Vol1, Issue 1, 2007, pp.14-21. 
[6] Saroj Kumar Panigrahy, Bibhudendra Acharya, Debasish Jena, “ImageEncryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm”,1st International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008. 
[7] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption Using Advanced Hill CipherAlgorithm”, International Journal of Recent Trends in Engineering, Vol.1, No. 1, May 2009, pp. 663-667. 
[8] Joyshree Nath and Asoke Nath,“Advanced Steganography Algorithm using encrypted secret message”, International Journal of Computer Science and Applications, Vol-2, No. 3, p. 19- 24, Mar (2010). 
[9] Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh and Asoke Nath, “New Steganography algorithm using encrypted secret message”, Proceedings of Worldcomp 2011 held at Las Vegas (USA), 18-21 Jul, 2011. 
[10] Asoke Nath, Saima Ghosh, Meheboob Alam Mallik, ” Symmetric Key Cryptography using Random Key generator”, “Proceedings of International conference on security and management (SAM’10” held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, pp. 239-244 (2010). 
[11] Somdip Dey, “SD-EI: A Cryptographic Technique To Encrypt Images”, Proceedings of “The International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012)”, held at Kuala Lumpur, Malaysia, 2012, pp. 28-32. 
[12] Asoke Nath, Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey, “Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm”, Proceedings of “Information and Communication Technologies (WICT), 2011 “ held at Mumbai, 11th – 14th Dec, 2011, Pages:1175-1180. 
[13]Somdip Dey, “SD-REE: A Cryptographic Method To Exclude Repetition From a Message”, Proceedings of The International Conference on Informatics & Applications (ICIA 2012), Malaysia, pp. 182 – 189. 
[14] Somdip Dey, “SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit- Manipulation to Exclude Repetition from a Message to be Encrypted”, Journal: Computing Research Repository - CoRR, vol. abs/1205.4279, 2012. 
[15] Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal ofComputer Applications 46(20): 46-53, May 2012. Published byFoundation of Computer Science, New York, USA. 
[16] Ali E. Taki El Deen, El-Sayed A. EL-Badawy and Sameh N. Gobran, “Digital Image Encryption Based on RSA algorithm” , IOSR journal of Electronics and Communications (IOSR-JECE) e-ISSN: 2278-2834, p- ISSN: 2278-8735. Volume 9, Issue 1, Ver. IV(Jan 2014), PP 69-73.
[17] Somdip Dey, “ SD-AEI: Advanced encryption techniques forthe images” , 2012 IEEE Second International Conference onDigital Information Processings and Communications(ICDIPC),pp. 69-74