Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

A Comparative study on Cryptographic Image Scrambling

, ,

DOI: http://dx.doi.org/10.15439/2017R47

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 261268 ()

Full text

Abstract. In the last few decades, a numerous numberof image encryption algorithm has been proposed based onscrambling. Scrambling is the most crucial part of confusion-diffusion based encryption techniques. In the current scenario,the scrambling techniques are used without knowing the cryp-tographic effect, quality and computational complexity. Hence,an comparative study on scrambling techniques (permutation) isrequired. In this paper, a comparative study has been done ondifferent scrambling techniques like matrix transformation, bitplane scrambling, 2D mapping and key based row and columnsshifting techniques. To determine the quality and efficiency ofthe scrambling techniques, correlation, entropy, computationalcomplexity have been considered. From the test results it wasfound that matrix based image scrambling applied on ArnoldTransform was the best among the considered techniques in termsof correlation.

References

  1. Nidaa AbdulMohsin Abbas. Image encryption based on independent component analysis and arnolds cat map. Egyptian Informatics Journal, 17(1):139 – 146, 2016.
  2. S. M. H. Alwahbani and E. B. M. Bashier. Speech scrambling based on chaotic maps and one time pad. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on, pages 128–133, Aug 2013.
  3. Chong Fu, Bin bin Lin, Yu sheng Miao, Xiao Liu, and Jun jie Chen. A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications, 284(23):5415 – 5423, 2011.
  4. A. Jolfaei, X. W. Wu, and V. Muthukkumarasamy. On the security of permutation-only image encryption schemes. IEEE Transactions on Information Forensics and Security, 11(2):235–246, Feb 2016.
  5. Xiongjun Li. A generalized matrix-based scrambling transformation and its properties. In Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, pages 1429–1434, Nov 2008.
  6. Yueping Li, Chunhua Wang, and Hua Chen. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering, 90:238 – 246, 2017.
  7. Wenhao Liu, Kehui Sun, and Congxu Zhu. A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84:26 – 36, 2016.
  8. Bhaskar Mondal, Anirban Bhowmick, Tanupriya Choudhury, and Tarni Mandal. A key agreement scheme for smart cards using biometrics. In IEEE International Conference on Computing Communication and Automation (ICCCA-2016), volume 1, pages 1–5. Galgotias University, UP, India, 2016.
  9. Bhaskar Mondal and Tarni Mandal. A secret shearing algorithm based on lsb substitution. International Journal of Computer Applications, 92(4):31–35, April 2014. Full text available.
  10. Bhaskar Mondal and Tarni Mandal. A light weight secure image encryption scheme based on chaos & dna computing. Journal of King Saud University - Computer and Information Sciences, pages –, 2016.
  11. Bhaskar Mondal and Tarni Mandal. A nobel chaos based secure image encryption algorithm. International Journal of Applied Engineering Research, (5):120–3127, 2016.
  12. Bhaskar Mondal, Tarni Mandal, T. Choudhury, and D.A. Khan. Use of a light weight secure image encryption scheme based on chaos and dna computing. Int. J. Advanced Intelligence Paradigms, 2017.
  13. Bhaskar Mondal, Tarni Mandal, Sunil Kumar Singh, and Krishana Mohan Acharjee. A novel (k, n) secret key sharing scheme based on linear equations. International Journal of Engineering Research Technology (IJERT), 2(10):1679–1682, 2013.
  14. Bhaskar Mondal, Akash Priyadarshi, and D. Hariharan. An improved cryptography scheme for secure image communication. International Journal of Computer Applications, 67(18):23–27, April 2013.
  15. Bhaskar Mondal and Sunil Kumar Singh. A highly secure steganography scheme for secure communication. International Conference of Computation and Communication Advancement (IC3A)-2013, pages 92–96, Jan 2013.
  16. Bhaskar Mondal, Nishith Sinha, and Tarni Mandal. A secure image encryption algorithm using lfsr and rc4 key stream generator. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pages 227–237. Springer India, 2015.
  17. Zahra Parvin, Hadi Seyedarabi, and Mousa Shamsi. A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications, 75(17):10631–10648, 2016.
  18. Prashan Premaratne and Malin Premaratne. Key-based scrambling for secure image communication. In De-Shuang Huang, Phalguni Gupta, Xiang Zhang, and Prashan Premaratne, editors, Emerging Intelligent Computing Technology and Applications, volume 304 of Communications in Computer and Information Science, pages 259–263. Springer Berlin Heidelberg, 2012.
  19. B. Radu, D. A. Cristina, P. Iustin, and F. Cristina. A new fast chaos-based image scrambling algorithm. In Communications (COMM), 2014 10th International Conference on, pages 1–4, May 2014.
  20. Z. Wang, S. Lv, J. Feng, and Y. Sheng. A digital image watermarking algorithm based on chaos and fresnel transform. In Intelligent Human- Machine Systems and Cybernetics (IHMSC), 2012 4th International Conference on, volume 2, pages 144–148, Aug 2012.
  21. Jun xin Chen, Zhi liang Zhu, Chong Fu, Hai Yu, and Li bo Zhang. An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering, 67:191 – 204, 2015.
  22. Wang Yanling. Image scrambling method based on chaotic sequences and mapping. In Education Technology and Computer Science, 2009. ETCS ’09. First International Workshop on, volume 3, pages 453–457, March 2009.
  23. Erdem Yavuz, Rifat Yazc, Mustafa Cem Kasapba, and Ezgi Yama. A chaos-based image encryption algorithm with simple logical functions. Computers Electrical Engineering, 54:471 – 483, 2016.
  24. J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security, 9(1):39–50, Jan 2014.
  25. Ri-Gui Zhou, Ya-Juan Sun, and Ping Fan. Quantum image gray-code and bit-plane scrambling. Quantum Information Processing, 14(5):1717–1734, 2015.
  26. Y. Zhou, K. Panetta, S. Agaian, and C. L. P. Chen. (n, k, p)-gray code for image systems. IEEE Transactions on Cybernetics, 43(2):515–529, April 2013.
  27. Yicong Zhou, Karen Panetta, Sos Agaian, and C.L. Philip Chen. Image encryption using p-fibonacci transform and decomposition. Optics Communications, 285(5):594 – 608, 2012.
  28. Jiancheng Zou, R. K. Ward, and Dongxu Qi. A new digital image scrambling method based on fibonacci numbers. In Circuits and Systems, 2004. ISCAS ’04. Proceedings of the 2004 International Symposium on, volume 3, pages III–965–8 Vol.3, May 2004.