A Novel Method for Image Encryption

  • Ravi SaharanEmail author
  • Sadanand Yadav
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 106)


In general, playfair cipher support 5 × 5 matrix is used to generate a key matrix for encryption, which supports only 25 uppercase alphabets. To succeed in dealing with this drawback, various extended playfair cipher techniques are used. Here, a new cryptographic method of image encryption is proposed, which contains two stages to make it secure. In the first stage, we, first, performed the rotation operation, and then, we apply diffusion operation (XOR) on two consecutive pixels. Then, the extended playfair cipher (EPC) technique along with secret key is used. Here in EPC, we use 16 × 16 key matrixes which give us better result as compare to other playfair cipher technique. The proposed encryption technique is implemented on images for evaluation of security aspects and performance analysis on the basis of key size analysis, key sensitivity analysis and statistical analysis.


Playfair cipher XOR Rotation (flip left to right) Extended playfair cipher (EPC) Encryption Decryption 


  1. 1.
    Rajput, A.S., Mishra, N., Sharma, S.: Towards the growth of image encryption and authentication schemes. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 454–459. IEEE, Aug 2013Google Scholar
  2. 2.
    Kumar, M., Aggarwal, A., Garg, A.: A Review on various digital image encryption techniques and security criteria. Int. J. Comput. Appl. 96(13) (2014)Google Scholar
  3. 3.
    Stallings, W.: Cryptography and Network Security: principles and practices. Pearson Education India (2006)Google Scholar
  4. 4.
    Patel, K.D., Belani, S.: Image encryption using different techniques: a review. Int. J. Emerg. Technol. Adv. Eng. 1(1), 30–34 (2011)Google Scholar
  5. 5.
    Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: 2006 IEEE Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’06), pp. 61–66. IEEE, Dec 2006Google Scholar
  6. 6.
    Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing (ICSIP), pp. 102–107. IEEE Jan 2014Google Scholar
  7. 7.
    Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipherl. J. Theor. Appl. Inf. Technol. 120–122 (2010)Google Scholar
  8. 8.
    Al-Husainy, M.A.F.: A novel encryption method for image security. Int. J. Secur. Appl. 6(1) (2012)Google Scholar
  9. 9.
    Bibhudendra, A.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1(1), 14–21 (2006)Google Scholar
  10. 10.
    Acharya, B., Panigrahy, S.K., Patra, S.K., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. (2009)Google Scholar
  11. 11.
    Panigrahy, S.K., Acharya, B., Jena, D.: Image encryption using self-invertible key matrix of hill cipher algorithm. In: International Conference on Advances in Computing (2008)Google Scholar
  12. 12.
    Chand, N., Bhattacharyya, S.: A Novel Approach for Encryption of Text Messages Using PLAY-FAIR Cipher 6 by 6 Matrix with Four Iteration Steps. Int. J. Eng. Sci. Innov. Technol. 3, 2319–5967Google Scholar
  13. 13.
    Srivastava, S.S., Gupta, N.: A novel approach to security using extended playfair cipher. Int. J. Comput. Appl. pp. 0975–8887 (2011)Google Scholar
  14. 14.
    Hans, S., Johari, R., &Gautam, V.: An extended Playfair Cipher using rotation and random swap patterns. In: 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 157–160. IEEE, Sept. 2014Google Scholar
  15. 15.
    Basu, S., Ray, U.K.: Modified Playfair Cipher using Rectangular Matrix. In: IJCA, pp. 0975–8887 (2012)Google Scholar
  16. 16.
    Iqbal, Z., Gupta, B., Gola, K.K., Gupta, P.: Enhanced the security of playfair technique using excess 3 code (XS3) and ceasar cipher. Int. J. Comput. Appl. 103(13) (2014)Google Scholar
  17. 17.
  18. 18.
    Nithin, N., Bongale, A.M., Hegde, G.P.: Image Encryption Based on FEAL Algorithm (2013)Google Scholar
  19. 19.
    Dey, S.: SD-EI: a cryptographic technique to encrypt images. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 28–32. IEEE June 2012Google Scholar
  20. 20.
    Goyal, P., Sharma, G., Kushwah, S.S.: Network Security: A Survey Paper on Playfair Cipher and its Variants. Int. J. Urban Des. Ubiquitous Comput. 3(1), 9 (2015)CrossRefGoogle Scholar
  21. 21.
    Dhenakaran, S.S., Ilayaraja, M.: Extension of Playfair Cipher using 16 × 16 Matrix. Int. J. Comput. Appl. 48(7) (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Central University of RajasthanAjmerIndia

Personalised recommendations