A New Image Encryption Approach using Combinational Permutation Techniques
This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.
[1] A. J. Elbirt and C. Paar, "An Instruction-Level Distributed Processor for
Symmetric-Key Cryptography," IEEE Trans. Parallel and distributed
systems, vol. 16, no. 5, pp. 468-480, May 2005.
[2] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE
Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[3] W. Stallings, Cryptography and Network Security. Englewood Cliffs,
NJ: Prentice Hall, 2003.
[4] E. Besdok, "Hiding information in multispectral spatial images," Int. J.
Electron. Commun. (AEU) 59, pp. 15-24, 2005.
[5] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential
Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-
757, Feb. 2005.
[6] Y. Wu, "On the Security of an SVD-Based Ownership Watermarking,"
IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624-627, Aug. 2005.
[7] Y. T. Wu and F. Y. Shih, "An adjusted-purpose digital watermarking
technique," Pattern Recognition 37, pp. 2349-2359, 2004.
[8] A. Masoud and A. H. Tewfik, "Geometric Invariance in Image Watermarking,"
IEEE Trans. Image Processing, vol. 13, no. 2, pp. 145-153,
Feb. 2004.
[9] S. S. Maniccam and N. G. Bourbakis,"Image and video encryption using
scan patterns," Pattern Recognition 37, pp. 725-737, 2004.
[10] P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet
Multimedia Applications," IEEE Trans. Consumer Electronics, vol. 46,
no. 3, pp. 395-403, Aug. 2000.
[11] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling
of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129,
March 2003.
[12] L. T.Wang and E. J. McCluskey, "Linear Feedback Shift Register Design
Using Cyclic Codes," IEEE Trans. Computers, vol. 37, no. 10, pp. 1302-
1306, Oct. 1988.
[13] A. Fuster and L. J. Garcia, "An efficient algorithm to generate binary
sequences for cryptographic purposes," Theoretical Computer Science
259, pp. 679-688, 2001.
[14] S. R. M. Prasanna et. al., "Study of Permutations in the Context of
Speech Privacy," in Proc. ECCAP 2000, Chennai, Jan. 2000, pp. 99-
106.
[1] A. J. Elbirt and C. Paar, "An Instruction-Level Distributed Processor for
Symmetric-Key Cryptography," IEEE Trans. Parallel and distributed
systems, vol. 16, no. 5, pp. 468-480, May 2005.
[2] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE
Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[3] W. Stallings, Cryptography and Network Security. Englewood Cliffs,
NJ: Prentice Hall, 2003.
[4] E. Besdok, "Hiding information in multispectral spatial images," Int. J.
Electron. Commun. (AEU) 59, pp. 15-24, 2005.
[5] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential
Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-
757, Feb. 2005.
[6] Y. Wu, "On the Security of an SVD-Based Ownership Watermarking,"
IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624-627, Aug. 2005.
[7] Y. T. Wu and F. Y. Shih, "An adjusted-purpose digital watermarking
technique," Pattern Recognition 37, pp. 2349-2359, 2004.
[8] A. Masoud and A. H. Tewfik, "Geometric Invariance in Image Watermarking,"
IEEE Trans. Image Processing, vol. 13, no. 2, pp. 145-153,
Feb. 2004.
[9] S. S. Maniccam and N. G. Bourbakis,"Image and video encryption using
scan patterns," Pattern Recognition 37, pp. 725-737, 2004.
[10] P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet
Multimedia Applications," IEEE Trans. Consumer Electronics, vol. 46,
no. 3, pp. 395-403, Aug. 2000.
[11] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling
of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129,
March 2003.
[12] L. T.Wang and E. J. McCluskey, "Linear Feedback Shift Register Design
Using Cyclic Codes," IEEE Trans. Computers, vol. 37, no. 10, pp. 1302-
1306, Oct. 1988.
[13] A. Fuster and L. J. Garcia, "An efficient algorithm to generate binary
sequences for cryptographic purposes," Theoretical Computer Science
259, pp. 679-688, 2001.
[14] S. R. M. Prasanna et. al., "Study of Permutations in the Context of
Speech Privacy," in Proc. ECCAP 2000, Chennai, Jan. 2000, pp. 99-
106.
@article{"International Journal of Information, Control and Computer Sciences:62492", author = "A. Mitra and Y. V. Subba Rao and S. R. M. Prasanna", title = "A New Image Encryption Approach using Combinational Permutation Techniques", abstract = "This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.", keywords = "Encryption, Permutation, Good key, Combinationalpermutation, Pseudo random index generator.", volume = "2", number = "2", pages = "588-5", }