A New Image Encryption Approach using Combinational Permutation Techniques

This paper proposes a new approach for image encryption using a combination of different permutation techniques. The main idea behind the present work is that an image can be viewed as an arrangement of bits, pixels and blocks. The intelligible information present in an image is due to the correlations among the bits, pixels and blocks in a given arrangement. This perceivable information can be reduced by decreasing the correlation among the bits, pixels and blocks using certain permutation techniques. This paper presents an approach for a random combination of the aforementioned permutations for image encryption. From the results, it is observed that the permutation of bits is effective in significantly reducing the correlation thereby decreasing the perceptual information, whereas the permutation of pixels and blocks are good at producing higher level security compared to bit permutation. A random combination method employing all the three techniques thus is observed to be useful for tactical security applications, where protection is needed only against a casual observer.




References:
[1] A. J. Elbirt and C. Paar, "An Instruction-Level Distributed Processor for
Symmetric-Key Cryptography," IEEE Trans. Parallel and distributed
systems, vol. 16, no. 5, pp. 468-480, May 2005.
[2] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE
Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[3] W. Stallings, Cryptography and Network Security. Englewood Cliffs,
NJ: Prentice Hall, 2003.
[4] E. Besdok, "Hiding information in multispectral spatial images," Int. J.
Electron. Commun. (AEU) 59, pp. 15-24, 2005.
[5] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential
Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-
757, Feb. 2005.
[6] Y. Wu, "On the Security of an SVD-Based Ownership Watermarking,"
IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624-627, Aug. 2005.
[7] Y. T. Wu and F. Y. Shih, "An adjusted-purpose digital watermarking
technique," Pattern Recognition 37, pp. 2349-2359, 2004.
[8] A. Masoud and A. H. Tewfik, "Geometric Invariance in Image Watermarking,"
IEEE Trans. Image Processing, vol. 13, no. 2, pp. 145-153,
Feb. 2004.
[9] S. S. Maniccam and N. G. Bourbakis,"Image and video encryption using
scan patterns," Pattern Recognition 37, pp. 725-737, 2004.
[10] P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet
Multimedia Applications," IEEE Trans. Consumer Electronics, vol. 46,
no. 3, pp. 395-403, Aug. 2000.
[11] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling
of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129,
March 2003.
[12] L. T.Wang and E. J. McCluskey, "Linear Feedback Shift Register Design
Using Cyclic Codes," IEEE Trans. Computers, vol. 37, no. 10, pp. 1302-
1306, Oct. 1988.
[13] A. Fuster and L. J. Garcia, "An efficient algorithm to generate binary
sequences for cryptographic purposes," Theoretical Computer Science
259, pp. 679-688, 2001.
[14] S. R. M. Prasanna et. al., "Study of Permutations in the Context of
Speech Privacy," in Proc. ECCAP 2000, Chennai, Jan. 2000, pp. 99-
106.