Digital Image Encryption Technique using Block Based Scrambling and Substitution

α
Punita Kumari
Punita Kumari
σ
Kalpana Jain
Kalpana Jain
α to σ Maharana Pratap University of Agriculture and Technology Maharana Pratap University of Agriculture and Technology

Send Message

To: Author

Digital Image Encryption Technique using Block Based Scrambling and Substitution

Article Fingerprint

ReserarchID

CSTGVZRRY0

Digital Image Encryption Technique using Block Based Scrambling and Substitution Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

A novel non-chaos based digital image encryption technique using a combination of diffusion and substitution process has been presented. A secret key of 128 bit sizes is used in the algorithm. In the diffusion (permutation) method, image is divided into different dynamic blocks which are key dependent. Further, each block is made to pass through eight rounds of permutation process. In this process, a zigzag mechanism is used to scramble the block pixels within the block. Then the resultant image i.e. the partially encrypted image is divided into various key based dynamic sub-images. Pixels of the sub-images are replaced with another pixel values within the block when each of the sub-images are passed through the substitution process. The substitution process comprises of four rounds. The proposed scheme is then compared with the standard AES algorithm. Investigation outcome shows that the proposed design methodology is efficient, fast and secure.

References

17 Cites in Article
  1. P Fips (1994). Security requirements for cryptographic modules.
  2. P Fips (2001). Security Requirements for Cryptographic Modules.
  3. W Diffie,M Hellman (1976). New directions in cryptography.
  4. J Daemen,V Rijmen (1991). The design of {Rijndael}:{AES}---the {Advanced.
  5. V Rijmen,J Daemen (2001). Advanced encryption standard.
  6. M Zeghid,M Machhout,L Khriji,A Baganne,R Tourki (2007). A modified AES based algorithm for image encryption.
  7. B Subramanyan,Vivek Chhabria,T Babu (2011). Image Encryption Based on AES Key Expansion.
  8. F Pub (1999). Data Encryption Standard (DES).
  9. J Lai,S Liang,D Cui (2010). A Novel Image Encryption Algorithm Based on Fractional Fourier Transform and Chaotic System.
  10. Z Yu,Z Zhe,Y Haibing,P Wenjie,Z Yunpeng (2010). A chaos-based image encryption algorithm using wavelet transform.
  11. Hassan Noura,Safwan El Assad,Calin Vladeanu (2010). Design of a fast and robust chaos-based crypto-system for image encryption.
  12. K Narendra,Pareek (2012). Design and analysis of a novel digital Image encryption scheme.
  13. Abdelfatah Yahya,Ayman Abdalla (2008). A Shuffle Image-Encryption Algorithm.
  14. J Zhao,W Guo,R Ye (2014). A Chaos-based Image Encryption Scheme Using Permutation Substitution Architecture.
  15. A Jolfaei,X Wu,V Muthukkumarasamy (2016). On the Security of Permutation-Only Image Encryption Schemes.
  16. C Shannon (1948). A mathematical theory of communication.
  17. C Shannon (1949). Communication Theory of Secrecy Systems.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Punita Kumari. 2017. \u201cDigital Image Encryption Technique using Block Based Scrambling and Substitution\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 17 (GJCST Volume 17 Issue F1): .

Download Citation

Issue Cover
GJCST Volume 17 Issue F1
Pg. 43- 50
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-F Classification: B.4.2, H.2.8
Version of record

v1.2

Issue date

April 4, 2017

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 6912
Total Downloads: 1781
2026 Trends
Related Research

Published Article

A novel non-chaos based digital image encryption technique using a combination of diffusion and substitution process has been presented. A secret key of 128 bit sizes is used in the algorithm. In the diffusion (permutation) method, image is divided into different dynamic blocks which are key dependent. Further, each block is made to pass through eight rounds of permutation process. In this process, a zigzag mechanism is used to scramble the block pixels within the block. Then the resultant image i.e. the partially encrypted image is divided into various key based dynamic sub-images. Pixels of the sub-images are replaced with another pixel values within the block when each of the sub-images are passed through the substitution process. The substitution process comprises of four rounds. The proposed scheme is then compared with the standard AES algorithm. Investigation outcome shows that the proposed design methodology is efficient, fast and secure.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Digital Image Encryption Technique using Block Based Scrambling and Substitution

Punita Kumari
Punita Kumari Maharana Pratap University of Agriculture and Technology
Kalpana Jain
Kalpana Jain Maharana Pratap University of Agriculture and Technology

Research Journals