Secure Image Encryption Algorithm Based on Playfair using Multiple Secret Keys, Scan Pattern and Pix Transformation
Journal: Engineering and Scientific International Journal (Vol.P, No. 1)Publication Date: 2017-01-28
Authors : Bhavya Ahuja;
Page : 32-37
Keywords : Cryptography; Playfair Cipher; Image Encryption; Scan Pattern; AES; Pix Transformation.;
Abstract
Image encryption is a scheme designed to ensure that the image is securely shared between a sender and the intended receiver. Encryption encodes the image so that no adversary can interpret its content. In this paper, an image encryption scheme has been proposed based on the simple monoalphabetic polygraphic substitution cipher – Playfair. The intention is to achieve a completely scrambled encrypted image utilizing the benefits of Playfair's simplicity, security and high throughput. To achieve this, the algorithm additionally incorporates usage of several secure mechanisms which are XOR operation with a key, multiple secret key generation for encryption, scan patterns to select pixel value pairs for encryption and pixel value transformations. The algorithm uses the transformations used in the rounds of AES to generate multiple keys so that there is minimum correlation between the keys used for different blocks attributed to the properties of these transformations. The algorithm has been designed to give good results with all types of images; especially focusing on those with uniform background. The proposed cryptosystem is designed to offer security, simplicity and speed. Measures like histogram analysis and correlation coefficient show that the system is able to produce good encryption results. Also the decrypted image is similar in quality to the original image as shown by the PSNR and SSIM.
Other Latest Articles
- A Techniques for CBIR System Based on Image Annotations and Multimodal feature Set
- Separate Regression-type Estimators (Generalized Class) for the Estimation of Finite Population Mean under Stratified Random Sampling
- Effects of Vaccination against the Tuberculosis Dynamics from Mother to Child: A Deterministic Mathematical Modeling Approach
- Performance Evaluation of Mitigation of SSR Using TCSC and SSSC
- A Comparative Study of Bayesian Procedure in Phenology using NonInformative and Informative Prior under Constant Time Series Model
Last modified: 2017-12-25 01:21:31