Abstract
A simple, fast, and dynamic image encryption scheme is proposed in this paper based on pixel shuffling. The primary idea applied for the purpose lies in designing of dynamic pseudorandom permutation map using simple divide and conquer method that will introduce diffusion among strongly correlated image pixels. As a result, the visual information content is completely lost. Data encryption is to hide and conceal the information content present in the secret data. Data encryption differs from data hiding, where the prime objective is to conceal the secret data. Using the technique of reversible data encryption, we can get back the original data content out of the encrypted message, without loss of any original information. The decryption process can be applied only at the authentic receiver end. Thus, we can transfer the encrypted data through any communication channel because it has completely lost its resemblance to the original data. Though theoretically it is possible to break such security, it does not appear feasible by any known practical means as it appears as random noise to any unintended recipient. To incorporate second fold of security, some proper data hiding methods can be used to embed the encrypted data. In this paper, we have presented a new visual data encryption technique by randomly shuffling the pixels within the image. The newly formed encrypted image using this technique completely loses the original characteristics. Our experimental results show that the proposed method can achieve the claim.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hazra, T.K., Bhattacharyya, S.: Image encryption by blockwise pixel shuffling using modified Fisher-Yates shuffle and pseudorandom permutations. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, pp. 1–6 (2016). https://doi.org/10.1109/iemcon.2016.7746312
Chowdhury, S.R., Hazra, T.K., Chakroborty, A.K.: Image encryption using pseudo random permutations. Am. J. Adv. Comput. 1(1) (2014). http://dx.doi.org/10.15864/ajac.v1i1.2
Mallik, S., Saha, P., Singha Roy, A., Sinha, R., Hazra, T.K., Chakraborty, A.K.: Image hiding using zigzag and spiral traversal algorithms. Am. J. Adv. Comput. 1(1) (2014)
Hazra, T.K., Chowdhury, S.R., Chakraborty, A.K.: Encrypted image retrieval system: a machine learning approach. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, pp. 1–6 (2016). https://doi.org/10.1109/iemcon.2016.7746351
Hazra, T.K., Anand, A., Shyam, A., Chakraborty, A.K.: A new approach to compressed image steganography using wavelet transform. IOSR J. Comput. Eng. 17(5), 53–59 (2015)
Hazra, T.K., Samanta, R., Mukherjee, N., Chakraborty, A.K.: Hybrid image encryption and steganography using SCAN pattern for secure communication. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, pp. 370–380 (2017). https://doi.org/10.1109/iemecon.2017.8079625
Hazra, T.K., Ghosh, R., Kumar, S., Dutta, S., Chakraborty, A.K.: File encryption using Fisher-Yates shuffle. In: 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, pp. 1–7 (2015). https://doi.org/10.1109/iemcon.2015.7344521
Hazra, T.K., Mahato, A., Mandal, A., Chakraborty, A.K.: A hybrid cryptosystem of image and text files using blowfish and Diffie-Hellman techniques. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, pp. 137–141 (2017). https://doi.org/10.1109/iemecon.2017.8079577
Li, C.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Sig. Process. 118, 203–210 (2016)
Arroyo, D., Li, C., Li, S., Alvarez, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos, Solitons Fractals 41(5), 2613–2616 (2009)
Pisarchik, A.N., Zanin, M.: Image encryption with chaotically coupled chaotic maps. Phys. D 237(20), 2638–2648 (2008)
Chen, G.R., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21, 749–761 (2003)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circ. Syst. Mag. 1(3), 6–21 (2001)
Li, S.J., Zheng, X., Mou, X.Q., Cai, Y.L.: Chaotic encryption scheme for real-time digital video. Real-Time Imag. VI, 149–160 (2002)
Shujun, L., Xuanqin, M., Yuanlong, C.: Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In: Progress in Cryptology—INDOCRYPT 2001, pp. 316–329 (2001)
Ye, R.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Commun. 284(22), 5290–5298 (2011)
Jolfaei, A., Mirghadri, A.: Image encryption using chaos and block cipher. Comput. Inf. Sci. 4(1), 172 (2010)
Hazra, T.K., Kumari, N., Monica, Priya, S., Chakraborty, A.K.: Image encryption and decryption using phase mask over sinusoidal single and cross grating. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, pp. 1–6 (2016). https://doi.org/10.1109/iemcon.2016.7746317
Mustafi, K., Sheikh, N., Hazra, T.K., Mazumder, M., Bhattacharya, I., Chakraborty, A.K.: A novel approach to enhance the security dimension of RSA algorithm using bijective function. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, pp. 1–6 (2016). https://doi.org/10.1109/iemcon.2016.7746304
Sheikh, N.U., Hazra, T.K., Rahman, H., Mustafi, K., Chakraborty, A.K.: Multi-variable bijective mapping for secure encryption and decryption. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, pp. 338–345 (2017). https://doi.org/10.1109/iemecon.2017.8079619
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hazra, T.K., Raj, K., Sumanth Kumar, M., Chattopadhyay, S.P., Chakraborty, A.K. (2019). Image Encryption Using Pseudorandom Permutation. In: Chakraborty, M., Chakrabarti, S., Balas, V., Mandal, J. (eds) Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore. https://doi.org/10.1007/978-981-13-1544-2_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-1544-2_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1543-5
Online ISBN: 978-981-13-1544-2
eBook Packages: EngineeringEngineering (R0)