Abstract
Encapsulation of information using mathematical barrier for forbidding malicious access is a traditional approach from past to modern era of information technology. Recent advancement in security field is not restricted to the traditional symmetric and asymmetric cryptography; rather, immense security algorithms were proposed in the recent past, from which biometric-based security, steganography, visual cryptography, etc. gained prominent focus within research communities. In this paper, we have proposed a robust cryptographic scheme to original message. First, each message byte, the ASCII characters ranging from Space (ASCII-32) to Tilde (ASCII-126), is represented as object using flat texture in a binary image which is decorated as n by n geometrical-shaped object in images of size N × N. Create a chaotic arrangement pattern by using the prime number encrypted by Advanced Encryption Standard (AES). The sub-images are shuffled and united as rows and columns to form a host covert or cipher image which looks like a grid-structured image where each sub-grid represents the coded information. The performance of the proposed method has been analyzed with empirical examples.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
H. Freeman, Computer processing of line drawing images, ACM Computer Surveys 6 (1974) 57–59.
S. Islam, M. R. Modi, P. Gupta, Edge-based image steganography, EURASIP Journal on Information Security, (2014) 2014, 8.
Yicong Zhou, Weijia Cao, C.L. Philip Chen, “Image encryption using binary bitplane”, Signal Processing, Vol. 100, pp. 197–207, Jul. 2014.
Chin-Chen Chang, Tai-Xing Yu, “Cryptanalysis of an encryption scheme for binary images”, Pattern Recognition Letters, Vol. 23, no. 14, pp. 1847–1852, Dec. 2002.
Yong-Ying Wang, Yu-Rong Wang, Yong Wang, Hui-Juan Li, Wen-Jia Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology”, Optics and Lasers in Engineering, Vol. 45, no. 7, pp. 761–765, Jul. 2007.
KuangTsan Lin, “Digital information encrypted in an image using binary encoding”, Optics Communications, Vol. 281, no. 13, pp. 3447–3453. Jul. 2008.
Chengqing Li, Kwok-Tung Lo, “Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks”, Signal Processing, Vol. 91, no. 4, pp. 949–954, Apr. 2011.
Huijuan Yang and Alex C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving” IEEE Transactions on Multimedia Vol. 9, no. 3, pp. 475–486, Apr. 2007.
Chung-ChuanWange, Ya-Fen Changd, Chin-Chen Changc, Jinn-Ke Jana, Chia-Chen Linb, “A high capacity data hiding scheme for binary images based on block patterns”, Journal of Systems and Software, Vol. 93, pp. 152–162, Jul. 2014.
Ki-Hyun Jung, Kee-Young Yoo, “Data hiding method in binary images based on block masking for key authentication”, Information Sciences, Vol. 277, pp. 188–196, Sep. 2014.
NIST “Advanced Encryption Standard (AES)”, Federal Information Processing Standards Publication 197. 2001.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Barik, R.C., Changder, S., Sahu, S.S. (2017). Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard. In: Behera, H., Mohapatra, D. (eds) Computational Intelligence in Data Mining. Advances in Intelligent Systems and Computing, vol 556. Springer, Singapore. https://doi.org/10.1007/978-981-10-3874-7_42
Download citation
DOI: https://doi.org/10.1007/978-981-10-3874-7_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3873-0
Online ISBN: 978-981-10-3874-7
eBook Packages: EngineeringEngineering (R0)