Skip to main content

Image Encryption Technique for Improvement of Image Security

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 696))

Abstract

The speedy progress of imaging and communication technologies has remolded pictures into a widespread knowledge kind, like military documents, official correspondence, personal medical data and government documents which are communicated in the form of pictures. Hence, a quick and safe cryptosystem is needed for prime resolution pictures. During this work, associate degree encoding technique is bestowed for securing pictures supported by Arnold cat map and chaotic maps. The system uses Arnold cat map for bit and component level rearrangements on plain and secret pictures, whereas chaotic map generates secret pictures and definite parameters for the permutations. The safety analysis is completed for various samples to examine the strength of projected rule against differential attack, brute force attack, and statistical attacks. Improvement in randomness is an advantage of the proposed system. The system is highly sensitive to the encryption key and initial conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Brindha Murugan, Ammasai Gounden, Nanjappa Gounder, “Image encryption scheme based on block based confusion and multiple levels of diffusion”, IET Computer Vision, Volume: 10, Pages: 593–602, Year: 2016.

    Google Scholar 

  2. Seyed Hossein Kamali, Maysam Hedayati, Reza Shakerian, Mohsen Rahmani, “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption”, 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), Vol. 1, pages 141–145, Year: 2010.

    Google Scholar 

  3. Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy, “On the Security of Permutation-Only Image Encryption Schemes”, IEEE transactions on information forensics and security, vol. 11, no. 2, Pages 235–245, Year: February 2016.

    Google Scholar 

  4. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, “Image Encryption Using Affine Transform and XOR Operation”, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, Pages: 309–312, Year: 2011.

    Google Scholar 

  5. Ameena Marshnil N, Binish MC, “Image Encryption Based On Diffusion Process and Multiple Chaotic Map”, 2014 International Conference on Power Signals Control and Computations (EPSCICON), Pages: 1–7, Year: 2014.

    Google Scholar 

  6. Ali Soleymani, Md Jan Nordin, Elankovan Sundararajan, “A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map”, Hindawi Publishing Corporation Scientific World Journal volume 2014, Article ID 536930, 21 pages, Year: 2014.

    Google Scholar 

  7. Adrian-Viorel Diaconu, Gabriel Lana, “A New Bit Level Image Permutation Image Encryption Algorithm”, 2016 International Conference on Communications (COMM), Pages: 411–416, Year 2016.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanket Pandurang Devade .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Devade, S.P., Metkar, S.P. (2018). Image Encryption Technique for Improvement of Image Security. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_56

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7386-1_56

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7385-4

  • Online ISBN: 978-981-10-7386-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics