Image Encryption based on Pixel Permutation and Generation of True Random Numbers

IJCSEC Front Page

Abstract:
The rapid growth of internet allows large multimedia files to be easily stored and transmitted. The multimedia data plays a major role in medical imaging, telemedicine, military and satellite communications. It is important to protect the multimedia data from unauthorized disclosure during the transmission. Traditional cryptosystems, such as AES, DES, and IDEA provides security for text encryption but are not ideal for image encryption. Image encryption methods based on bit permutation, pixel permutation, and block transformations are introduced by various researchers in the literature. An image encryption method for permuting the pixels based on Knight Travel path and True Random Numbers is proposed in this paper. The Knight travel is a pattern in which the path of a knight around a chess board without revisiting any particular node is taken and it is used as a SCAN pattern. When this pattern is applied to an image, the obtained image will be a scrambled image. The random key stream is the one which consists of random values used in image encryption for XOR operation. The audio file is considered as key which has a range of amplitude values producing the random key stream. The scrambled image is further XORed with the random key stream to get highly encrypted image.

Keywords: image, keystream, knight, pixels, permutation, random numbers generator

References:

  1. A. Mitra, Y. V. SubbaRao and S. R. M. Prasanna, “A New Image Encryption Approach Using Combinational Permutation Techniques”,International Journal of Electrical and Computer Engineering, Vol.01, No.02, 2006.
  2. Ben Hill, Knight’s Tours Kevin Tostado December 18, 2004.http://faculty.olin.edu/~sadams/DM/ktpaper.pdf , accessed on July 23, 2013.
  3. G. Nagaraju and T. V. Hyma Lakshmi, “Image Encryption using Secret-Key images and SCAN Patterns”, International Journal in Advances in Computer, Electronic, Vol.02, 2012.
  4. Jawad Ahmad andFawad Ahmed, “Efficiency Analysis and SecurityEvaluation of Image Encryption Schemes”,International Journal of Video & Image Processing and Network Security, Vol.12, No.04, 2012.
  5. Panduranga H.T and Naveen Kumar S.K, “Hybrid Approach for Image Encryption using SCAN Patterns and Carrier Images”, International Journal on Computer Science and Engineering, Vol. 02, No. 02, 2010.
  6. Roger Morrison, “Design of a True Random Number Generator using Audio Input”, Journal of Cryptology, Vol.01, No.01, 2001.
  7. S.S.Maniccam and N.G. Bourbakis, “Image and Video Encryption using SCAN patterns”,Journal of Pattern Recognition, 725 – 737, 2004.
  8. Varsha Bhatt and Gajendra Singh Chandel,“Implementation of New Advanced Image Encryption Algorithm to Enhance Security of Multimedia Component”, International Journal of Advanced Technology & Engineering Research, Vol 2, Issue 4, 2012.
  9. KhaledLoukhaoukha, Jean-Yves Chouinard, and AbdellahBerdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, 2011, pp. pp.1-13.
  10. G.A Sathishkumar, K.Bhoopathy and R.Sriraam, “Image Encryption Based on Diffusion and Multiple Chaotic Maps”, International Journal of Network Security & its Applications, Vol.3, No.2, 2011, pp. 181-194.
  11. William Stallings, “Cryptography and Network Security: Principles and Practice”,Pearson Education, New Delhi, 2011.