An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images
Abstract
Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.
Keywords:
encryption-decryption times, throughput, speedup, MSE, PSNRDownloads
References
M. J. Aqel, Z. AlQadi, A. A. Abdullah, “RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication”, International Journal of Engineering and Technology, Vol. 7, No. 3.13, pp. 104-107, 2018 DOI: https://doi.org/10.14419/ijet.v7i3.13.16334
J. Thakur, N. Kumar, “DES, AES, and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 2, pp. 6-12, 2011
S. A. M. Rizvi, S. Z. Hussain, N. Wadhwa, “A Comparative Study of Two Symmetric Encryption Algorithms across Different Platforms”, International Conference on Security and Management, World Academy of Science, Las Vegas, USA, July 18-21, 2011
S. Wang, Y. Zheng, Z. Gao, “A New Image Scrambling Method through Folding Transform”, IEEE International Conference on Computer Application and System Modeling, Taiyuan, China, October 22-24, 2010
J. N. Abdel-Jalil, “Performance analysis of color image encryptiondecryption techniques”, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016
G. Ye, “An Efficient Image Encryption Scheme based on Logistic maps”, International Journal of Pure and Applied Mathematics, Vol. 55, No. 1, pp. 37-47, 2009
T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013
H. Gao, Y. Zhang, S. Liang, D. Li, “A New Chaotic Algorithm for Image Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-399, 2006 DOI: https://doi.org/10.1016/j.chaos.2005.08.110
G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749–761, 2004 DOI: https://doi.org/10.1016/j.chaos.2003.12.022
K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, Article ID 173931, pp. pp. 1-13, 2012 DOI: https://doi.org/10.1155/2012/173931
X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008
Downloads
How to Cite
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.