Abstract
Privacy of information is an important issue in modern era of information technology to manage handling of sensitive information over networks efficiently. It is seen that individual use of inversion and circular shifting while encryption of images does not provide adequate security and weaknesses remain can be exploited by interceptors. In this paper, we propose an improved encryption scheme which utilizes both inversion and shifting in specific manner. We use pseudo random number sequences to perform inversion and circular shifting in a random manner for transforming image pixels. Simulation results show that encrypted images obtained are quite unintelligible and pixels distributed uniformly. Also, proposed encryption method is error propagating, follows avalanche criteria, has large key space and provides higher information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Stephen, G.W.: Digital Modulation and Coding. Prentice Hall (1996)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)
Ratan, R., Veni Madhavan, C.E.: Steganography based information security. IETE Technical Review 19, 213–219 (2002)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1996)
Schneier, B.: Applied Cryptography. John Wiley and Sons Inc., NY (1996)
Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2003)
Bourbakis, N.G., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recognition 25(6), 567–581 (1992)
Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using scan patterns. Pattern Recognition 37(4), 725–737 (2004)
Mitra, A., Subba Rao, Y.V., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. International Journal of Computer Science 19(2), 127–131 (2006)
Schwartz, C.: A new graphical method for encryption of computer data. Journal of Cryptologia 15(1), 43–46 (1991)
Yen, J.C., Guo, J.I.: A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)
Fu, C., Zhu, Z.: A chaotic encryption scheme based on circular bit shift method. In: Proceedings of International Conference for Young Computer Scientists, pp. 3057–3061. IEEE Computer Society (2008)
Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Journal of Image and Vision Computing 26(6), 843–850 (2008)
Chin, Y.C., Wang, P.C., Hwang, J.J.: Cryptanalysis on Schwartz graphical encryption method. Journal of Cryptologia 17(3), 301–304 (1993)
Ratan, R., Saxena, P.K.: An algorithm for the restoration of distorted text documents. In: Proceedings of International Conference on Computational Linguistics, Speech and Document Processing (ICCLSDP 1998), pp. A38–A43 (1998)
Ratan, R.: Key Independent Decryption of Graphically Encrypted Images. In: Chen, H., Chau, M., Li, S.-h., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 88–97. Springer, Heidelberg (2010)
Ratan, R.: Key Independent Retrieval of Chaotic Encrypted Images. In: Chaudhury, S., Mitra, S., Murthy, C.A., Sastry, P.S., Pal, S.K. (eds.) PReMI 2009. LNCS, vol. 5909, pp. 483–488. Springer, Heidelberg (2009)
Li, S., Zheng, X.: On the security of an image encryption method. In: Proceedings of IEEE International Conference on Image Processing, pp. II-925–II-928 (2002)
Yen, J.C., Guo, J.I.: A new chaotic key based design for image encryption and decryption. In: Proceedings of IEEE International Symposium Circuits and Systems, vol. 4, pp. 49–52 (2000)
Kohda, T., Tsuneda, A.: Statistics of chaotic binary sequences. Journal IEEE Trans. Information Theory 43(1), 104–112 (1997)
Long, M., Li, T.: A chaos based data encryption algorithm for image/video. In: Proceedings of International Conference on Multimedia and Information Technology, pp. 172–175 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer India Pvt. Ltd.
About this paper
Cite this paper
Ratan, R. (2012). Securing Images Using Inversion and Shifting. In: Deep, K., Nagar, A., Pant, M., Bansal, J. (eds) Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Advances in Intelligent and Soft Computing, vol 131. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0491-6_38
Download citation
DOI: https://doi.org/10.1007/978-81-322-0491-6_38
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-0490-9
Online ISBN: 978-81-322-0491-6
eBook Packages: EngineeringEngineering (R0)