Computer & Communication Engineering

A Novel Image Encryption Technique Based on Inter Block Difference

Expand
  • (Department of EECE, Gandhi Institute of Technology and Management, Hyderabad 502329, Telangana, India)

Online published: 2021-06-06

Abstract

Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner.

Cite this article

THAMANAM Srinivasa Rao , NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K . A Novel Image Encryption Technique Based on Inter Block Difference[J]. Journal of Shanghai Jiaotong University(Science), 2021 , 26(4) : 488 -493 . DOI: 10.1007/s12204-021-2318-0

References

[1] EL ABBADI N K, MOHAMAD A, ABDULHAMEED M. Image encryption based on singular value decomposition [J]. Journal of Computer Science,2014, 10(7): 1222-1230.
[2] NASKAR P K, CHAUDHURI A, CHAUDHURI A. A secure symmetric image encryption based on linear geometry [C]//2014 Applications and Innovations in Mobile Computing. Kolkata, India: IEEE, 2014: 67-74.
[3] YE R S, ZENG S J, LUN P Q, et al. An image encryption scheme based on bit circular shift and bidirectional diffusion [J]. International Journal of Information Technology and Computer Science, 2014, 6(1):82-92.
[4] KR NASKAR P, CHAUDHURI A. A secure symmetric image encryption based on bit-wise operation [J].International Journal of Image, Graphics and Signal Processing, 2014, 6(2): 30-38.
[5] CHEN J X, ZHU Z L, LIU Z J, et al. A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J]. Optics Express,2014, 22(6): 7349-7361.
[6] ALGHAMDI A S, ULLAH H. A secure Iris image encryption technique using bio-chaotic algorithm [J]. International Journal of Computer and Network Security,2010, 2(4): 78-84.
[7] ALGHAMDI A S, ULLAH H, MAHMUD M, et al. Bio-chaotic stream cipher-based Iris image encryption [C]//2009 International Conference on Computational Science and Engineering. Vancouver, BC, Canada:IEEE, 2009: 739-744.
[8] SUN Y Y, CHEN L N, XU R D, et al. An image encryption algorithm utilizing Julia sets and Hilbert curves[J]. PLoS One, 2014, 9(1): e84655.
[9] ARUL MURUGAN C, KARTHIGAIKUMAR P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms[J]. Mobile Networks and Applications, 2018.https://doi.org/10.1007/s11036-018-1058-3 (published online).
[10] DAWAHDEH Z E, YAAKOB S N, RAZIF BIN OTHMAN R. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].Journal of King Saud University-Computer and Information Sciences, 2018, 30(3): 349-355.
[11] YASSER I, KHALIFA F, MOHAMED M A, et al. A new image encryption scheme based on hybrid chaotic maps [J]. Complexity, 2020, 2020: 1-23.
[12] ES-SABRY M, EL AKKAD N, MERRAS M, et al. A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators[J]. Soft Computing, 2020, 24(5): 3829-3848.

Outlines

/