Image Encryption Based on Partitioning and Rearranged Pixels Position
DOI:
https://doi.org/10.25212/lfu.qzj.2.2.31الكلمات المفتاحية:
Data protection, Image encryption, Image Decryption, Random number , LFSR.الملخص
Protect important information transmitted via the channels of communication it's one of the important area. Today, especially with the increasing use of the Internet in the process of transferring this information you had to find ways to protect this information for fear of being captured by unauthorized people to look at it. The image and what it contains is one of the fore mentioned knowledge that should be protected. In our paper a new method is suggested for protecting information of colored image by rearranging the distribution of image pixels. This way depends on the image partition into four equal parts where each data stored in a 1-D array, then the data of these parts are re-arranged through random numbers generated by using LFSR to produce a new (2-D) array combines the data of the four-part. Finally, the new array is converted to another color space YCbCR and the result will be representing the stego image.
التنزيلات
المراجع
J. Shah, and Dr. V. Saxena “Performance Study on Image Encryption Schemes" , IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011, p 349- 355
V. V. Divya, S. K. Sudha, and V. R. Resmy "Simple and Secure Image Encryption", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 2012, p 286- 289
R. Pakshwar, V. K. Trivedi, and V. Richhariya " A Survey On Different Image Encryption and Decryption Techniques", IJCSIT International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, p 113 – 116
K. D. Patel, and S. Belani " Image Encryption Using Different Techniques: A Review ", International Journal of Emerging Technology and Advanced Engineering , Volume 1, Issue 1, November 2011, p 30-34
M. A. B. Younes, and A. Jantan "Image Encryption Using Block-Based Transformation Algorithm", IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03, (Advance online publication: 19 February 2008
Y. Rajput and A K. Gulve " An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher", International Journal of Computer Applications, Volume 83 – No 13, December 2013, p 4-8.
A. Gupta, N. Tiwari, M. Chawla and M. Shandilya " An Image Encryption using Block based Transformation and Bit Rotation Technique", International Journal of Computer Applications, Volume 98– No.6, July 2014, p 30-32.
S. P. Nichat, and Prof. Mrs. S. S. Sikchi " Image Encryption using Hybrid Genetic Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013, p 427- 431.
T. Sivakumar, and R. Venkatesan " Image Encryption Based on Pixel Shuffling and Random Key Stream", International Journal of Computer and Information Technology, Volume 03 – Issue 06, November 2014, p 1468- 1476.
G. A. Sathishkumar and K. B. Bagan, “A novel image encryption algorithm using pixel shuffling and BASE 64 encoding based chaotic block cipher, WSEAS Transactions on Computers, Vol. 10, No. 6, pp169-178, 2011.
K. Loukhaoukha, J.Y. Chouinard, and A. Berdai, “A secure image encryption algorithm based on Rubik's cube principle”, Journal of Electrical and Computer Engineering, Vol. 20, No. 12, pp113, 2011.
C. K. Huang, C. W. Liao, S. L. Hsu, and Y. C. Jeng, “Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system”, Telecommunication Systems, Vol. 52, pp563– 571, 2013.
التنزيلات
منشور
كيفية الاقتباس
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2017 Jamila H. Al-A’meri, Salah T. Allaw, May M. Abbas
هذا العمل مرخص بموجب Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission