Abstract
In general, playfair cipher support 5 × 5 matrix is used to generate a key matrix for encryption, which supports only 25 uppercase alphabets. To succeed in dealing with this drawback, various extended playfair cipher techniques are used. Here, a new cryptographic method of image encryption is proposed, which contains two stages to make it secure. In the first stage, we, first, performed the rotation operation, and then, we apply diffusion operation (XOR) on two consecutive pixels. Then, the extended playfair cipher (EPC) technique along with secret key is used. Here in EPC, we use 16 × 16 key matrixes which give us better result as compare to other playfair cipher technique. The proposed encryption technique is implemented on images for evaluation of security aspects and performance analysis on the basis of key size analysis, key sensitivity analysis and statistical analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rajput, A.S., Mishra, N., Sharma, S.: Towards the growth of image encryption and authentication schemes. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 454–459. IEEE, Aug 2013
Kumar, M., Aggarwal, A., Garg, A.: A Review on various digital image encryption techniques and security criteria. Int. J. Comput. Appl. 96(13) (2014)
Stallings, W.: Cryptography and Network Security: principles and practices. Pearson Education India (2006)
Patel, K.D., Belani, S.: Image encryption using different techniques: a review. Int. J. Emerg. Technol. Adv. Eng. 1(1), 30–34 (2011)
Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: 2006 IEEE Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’06), pp. 61–66. IEEE, Dec 2006
Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing (ICSIP), pp. 102–107. IEEE Jan 2014
Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipherl. J. Theor. Appl. Inf. Technol. 120–122 (2010)
Al-Husainy, M.A.F.: A novel encryption method for image security. Int. J. Secur. Appl. 6(1) (2012)
Bibhudendra, A.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1(1), 14–21 (2006)
Acharya, B., Panigrahy, S.K., Patra, S.K., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. (2009)
Panigrahy, S.K., Acharya, B., Jena, D.: Image encryption using self-invertible key matrix of hill cipher algorithm. In: International Conference on Advances in Computing (2008)
Chand, N., Bhattacharyya, S.: A Novel Approach for Encryption of Text Messages Using PLAY-FAIR Cipher 6 by 6 Matrix with Four Iteration Steps. Int. J. Eng. Sci. Innov. Technol. 3, 2319–5967
Srivastava, S.S., Gupta, N.: A novel approach to security using extended playfair cipher. Int. J. Comput. Appl. pp. 0975–8887 (2011)
Hans, S., Johari, R., &Gautam, V.: An extended Playfair Cipher using rotation and random swap patterns. In: 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 157–160. IEEE, Sept. 2014
Basu, S., Ray, U.K.: Modified Playfair Cipher using Rectangular Matrix. In: IJCA, pp. 0975–8887 (2012)
Iqbal, Z., Gupta, B., Gola, K.K., Gupta, P.: Enhanced the security of playfair technique using excess 3 code (XS3) and ceasar cipher. Int. J. Comput. Appl. 103(13) (2014)
Nithin, N., Bongale, A.M., Hegde, G.P.: Image Encryption Based on FEAL Algorithm (2013)
Dey, S.: SD-EI: a cryptographic technique to encrypt images. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 28–32. IEEE June 2012
Goyal, P., Sharma, G., Kushwah, S.S.: Network Security: A Survey Paper on Playfair Cipher and its Variants. Int. J. Urban Des. Ubiquitous Comput. 3(1), 9 (2015)
Dhenakaran, S.S., Ilayaraja, M.: Extension of Playfair Cipher using 16 × 16 Matrix. Int. J. Comput. Appl. 48(7) (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saharan, R., Yadav, S. (2019). A Novel Method for Image Encryption. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-13-1742-2_42
Download citation
DOI: https://doi.org/10.1007/978-981-13-1742-2_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1741-5
Online ISBN: 978-981-13-1742-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)