Skip to main content

A Novel Method for Image Encryption

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 106))

  • 719 Accesses

Abstract

In general, playfair cipher support 5 × 5 matrix is used to generate a key matrix for encryption, which supports only 25 uppercase alphabets. To succeed in dealing with this drawback, various extended playfair cipher techniques are used. Here, a new cryptographic method of image encryption is proposed, which contains two stages to make it secure. In the first stage, we, first, performed the rotation operation, and then, we apply diffusion operation (XOR) on two consecutive pixels. Then, the extended playfair cipher (EPC) technique along with secret key is used. Here in EPC, we use 16 × 16 key matrixes which give us better result as compare to other playfair cipher technique. The proposed encryption technique is implemented on images for evaluation of security aspects and performance analysis on the basis of key size analysis, key sensitivity analysis and statistical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rajput, A.S., Mishra, N., Sharma, S.: Towards the growth of image encryption and authentication schemes. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 454–459. IEEE, Aug 2013

    Google Scholar 

  2. Kumar, M., Aggarwal, A., Garg, A.: A Review on various digital image encryption techniques and security criteria. Int. J. Comput. Appl. 96(13) (2014)

    Google Scholar 

  3. Stallings, W.: Cryptography and Network Security: principles and practices. Pearson Education India (2006)

    Google Scholar 

  4. Patel, K.D., Belani, S.: Image encryption using different techniques: a review. Int. J. Emerg. Technol. Adv. Eng. 1(1), 30–34 (2011)

    Google Scholar 

  5. Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: 2006 IEEE Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’06), pp. 61–66. IEEE, Dec 2006

    Google Scholar 

  6. Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing (ICSIP), pp. 102–107. IEEE Jan 2014

    Google Scholar 

  7. Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipherl. J. Theor. Appl. Inf. Technol. 120–122 (2010)

    Google Scholar 

  8. Al-Husainy, M.A.F.: A novel encryption method for image security. Int. J. Secur. Appl. 6(1) (2012)

    Google Scholar 

  9. Bibhudendra, A.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1(1), 14–21 (2006)

    Google Scholar 

  10. Acharya, B., Panigrahy, S.K., Patra, S.K., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. (2009)

    Google Scholar 

  11. Panigrahy, S.K., Acharya, B., Jena, D.: Image encryption using self-invertible key matrix of hill cipher algorithm. In: International Conference on Advances in Computing (2008)

    Google Scholar 

  12. Chand, N., Bhattacharyya, S.: A Novel Approach for Encryption of Text Messages Using PLAY-FAIR Cipher 6 by 6 Matrix with Four Iteration Steps. Int. J. Eng. Sci. Innov. Technol. 3, 2319–5967

    Google Scholar 

  13. Srivastava, S.S., Gupta, N.: A novel approach to security using extended playfair cipher. Int. J. Comput. Appl. pp. 0975–8887 (2011)

    Google Scholar 

  14. Hans, S., Johari, R., &Gautam, V.: An extended Playfair Cipher using rotation and random swap patterns. In: 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 157–160. IEEE, Sept. 2014

    Google Scholar 

  15. Basu, S., Ray, U.K.: Modified Playfair Cipher using Rectangular Matrix. In: IJCA, pp. 0975–8887 (2012)

    Google Scholar 

  16. Iqbal, Z., Gupta, B., Gola, K.K., Gupta, P.: Enhanced the security of playfair technique using excess 3 code (XS3) and ceasar cipher. Int. J. Comput. Appl. 103(13) (2014)

    Google Scholar 

  17. www.mit.edu

  18. Nithin, N., Bongale, A.M., Hegde, G.P.: Image Encryption Based on FEAL Algorithm (2013)

    Google Scholar 

  19. Dey, S.: SD-EI: a cryptographic technique to encrypt images. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 28–32. IEEE June 2012

    Google Scholar 

  20. Goyal, P., Sharma, G., Kushwah, S.S.: Network Security: A Survey Paper on Playfair Cipher and its Variants. Int. J. Urban Des. Ubiquitous Comput. 3(1), 9 (2015)

    Article  Google Scholar 

  21. Dhenakaran, S.S., Ilayaraja, M.: Extension of Playfair Cipher using 16 × 16 Matrix. Int. J. Comput. Appl. 48(7) (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Saharan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saharan, R., Yadav, S. (2019). A Novel Method for Image Encryption. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-13-1742-2_42

Download citation

Publish with us

Policies and ethics