Skip to main content

Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 556))

Abstract

Encapsulation of information using mathematical barrier for forbidding malicious access is a traditional approach from past to modern era of information technology. Recent advancement in security field is not restricted to the traditional symmetric and asymmetric cryptography; rather, immense security algorithms were proposed in the recent past, from which biometric-based security, steganography, visual cryptography, etc. gained prominent focus within research communities. In this paper, we have proposed a robust cryptographic scheme to original message. First, each message byte, the ASCII characters ranging from Space (ASCII-32) to Tilde (ASCII-126), is represented as object using flat texture in a binary image which is decorated as n by n geometrical-shaped object in images of size N × N. Create a chaotic arrangement pattern by using the prime number encrypted by Advanced Encryption Standard (AES). The sub-images are shuffled and united as rows and columns to form a host covert or cipher image which looks like a grid-structured image where each sub-grid represents the coded information. The performance of the proposed method has been analyzed with empirical examples.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. H. Freeman, Computer processing of line drawing images, ACM Computer Surveys 6 (1974) 57–59.

    Google Scholar 

  2. S. Islam, M. R. Modi, P. Gupta, Edge-based image steganography, EURASIP Journal on Information Security, (2014) 2014, 8.

    Google Scholar 

  3. Yicong Zhou, Weijia Cao, C.L. Philip Chen, “Image encryption using binary bitplane”, Signal Processing, Vol. 100, pp. 197–207, Jul. 2014.

    Google Scholar 

  4. Chin-Chen Chang, Tai-Xing Yu, “Cryptanalysis of an encryption scheme for binary images”, Pattern Recognition Letters, Vol. 23, no. 14, pp. 1847–1852, Dec. 2002.

    Google Scholar 

  5. Yong-Ying Wang, Yu-Rong Wang, Yong Wang, Hui-Juan Li, Wen-Jia Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology”, Optics and Lasers in Engineering, Vol. 45, no. 7, pp. 761–765, Jul. 2007.

    Google Scholar 

  6. KuangTsan Lin, “Digital information encrypted in an image using binary encoding”, Optics Communications, Vol. 281, no. 13, pp. 3447–3453. Jul. 2008.

    Google Scholar 

  7. Chengqing Li, Kwok-Tung Lo, “Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks”, Signal Processing, Vol. 91, no. 4, pp. 949–954, Apr. 2011.

    Google Scholar 

  8. Huijuan Yang and Alex C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving” IEEE Transactions on Multimedia Vol. 9, no. 3, pp. 475–486, Apr. 2007.

    Google Scholar 

  9. Chung-ChuanWange, Ya-Fen Changd, Chin-Chen Changc, Jinn-Ke Jana, Chia-Chen Linb, “A high capacity data hiding scheme for binary images based on block patterns”, Journal of Systems and Software, Vol. 93, pp. 152–162, Jul. 2014.

    Google Scholar 

  10. Ki-Hyun Jung, Kee-Young Yoo, “Data hiding method in binary images based on block masking for key authentication”, Information Sciences, Vol. 277, pp. 188–196, Sep. 2014.

    Google Scholar 

  11. NIST “Advanced Encryption Standard (AES)”, Federal Information Processing Standards Publication 197. 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Chandra Barik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Barik, R.C., Changder, S., Sahu, S.S. (2017). Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard. In: Behera, H., Mohapatra, D. (eds) Computational Intelligence in Data Mining. Advances in Intelligent Systems and Computing, vol 556. Springer, Singapore. https://doi.org/10.1007/978-981-10-3874-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3874-7_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3873-0

  • Online ISBN: 978-981-10-3874-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics