Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices

Author(s): Showkat Ahmad Bhat* and Amandeep Singh

Volume 10, Issue 2, 2020

Page: [123 - 142] Pages: 20

DOI: 10.2174/2210327909666190408094102

Price: $65

conference banner
Abstract

Background & Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies.

Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption and permutation powers. The main strength of the proposed algorithm lies in the large key spaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different key spaces at multiple stages of the algorithm.

Results & Conclusion: Finally, the effectiveness and the security analysis results shows that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks.

Keywords: Image decryption, arnold function, image encryption, LTE, NPCR (Number of Pixel Change Rate), symmetric key, techniques, UACI (Unified Average Changing Intensity).

Graphical Abstract

[1]
Raniprima S, Hidayat B, Andini N. Digital image steganography with encryption based on Rubik’s cube principle. Control, Electronics, Renewable Energy and Communications (ICCEREC), 2016.International Conference on IEEE.
[http://dx.doi.org/10.1109/ICCEREC.2016.7814972]
[2]
Govinda K, Prasanna S. A generic image cryptography based on Rubik’s cube. Soft-Computing and Networks Security (ICSNS) 2015.International Conference on IEEE.
[http://dx.doi.org/10.1109/ICSNS.2015.7292383]
[3]
Loukhaoukha K, Chouinard J-Y, Berdai A. A secure image encryption algorithm based on Rubik’s cube principle. J Electr Comput Eng 2012; 2012: 7.
[http://dx.doi.org/10.1155/2012/173931]
[4]
Wadi SM, Zainal N. Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technology 2013; 11: 51-6.
[http://dx.doi.org/10.1016/j.protcy.2013.12.161]
[5]
Li Y, Wang C, Chen H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 2017; 90: 238-46.
[http://dx.doi.org/10.1016/j.optlaseng.2016.10.020]
[6]
Li M, Liang T, He Y. Arnold transform based image scrambling method. 3rd International Conference on Multimedia Technology.
[7]
Wu L, Zhang J, Deng W, et al. Arnold transformation algorithm and anti-Arnold transformation algorithm. Information Science and Engineering (ICISE) 2009.1st International Conference on IEEE.
[http://dx.doi.org/10.1109/ICISE.2009.347 ]
[8]
Lin KT. Image Encryption Using Arnold Transform Technique and Hartley Transform Domain. Intelligent Information Hiding and Multimedia Signal Processing 2013.Ninth International Conference on IEEE.
[http://dx.doi.org/10.1109/IIH-MSP.2013.30]
[9]
Ebrahim M, Chai WC. Secure Force: A low-complexity cryptographic algorithm for Wireless Sensor Network (WSN). Control System, Computing and Engineering (ICCSCE) 2013.IEEE International Conference on IEEE.
[http://dx.doi.org/10.1109/ICCSCE.2013.6720027]
[10]
Usman M, Abidi SZ, Siddiqui MHS, et al. Implementation of Secure Force (64-bit) on low-cost 8-bit microcontroller. Open Source Systems & Technologies (ICOSST) 2016.International Conference on IEEE.
[http://dx.doi.org/10.1109/ICOSST.2016.7838585]
[11]
Bhat SA, Singh A. Review on Effective Image Communication Models. Aust J Basic Appl Sci 2017; 11(8): 65-79.
[12]
Bhat SA, Singh A. Noise effect analysis on diverse Image data set to procure effective Transmission over LTE. Int J Pure Appl Math 2018; 118(9): 685-96.
[13]
Zhang Q, Liu A, Pan X, et al. CRC code design for list decoding of polar codes. IEEE Commun Lett 2017; 21(6): 1229-32.
[http://dx.doi.org/10.1109/LCOMM.2017.2672539]
[14]
Diaconu A-V, Loukhaoukha K. An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher Math Probl Eng 2013 2013.
[http://dx.doi.org/10.1155/2013/848392]
[15]
Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. IEEE J SEL AREA COMM 2011; 1(2): 31-8.
[16]
Li C, Lin D, Lü J. Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits 2016.arXiv preprint arXiv:1607.01642.
[17]
Hamdnaalla K, Wahaballa A, Wahballa O. Digital image confidentiality depends upon Arnold transformation and rc4 algorithms. International Journal of Video & Image Processing and Network Security 1304 2013.
[18]
Singh J, Lata K, Ashraf J. Image Encryption & Decryption with Symmetric Key Cryptography using MATLAB. International Journal of Current Engineering and Technology 2015; 5(1): 448-51.
[19]
Ionescu VM, Diaconu A-V. Rubik’s cube principle based image encryption algorithm implementation on mobile devices. Electronics, Computers and Artificial Intelligence (ECAI) 2015.7th International Conference on IEEE.
[http://dx.doi.org/10.1109/ECAI.2015.7301247]
[20]
Loukhaoukha K, Nabti M, Zebbiche K. An efficient image encryption algorithm based on blocks permutation and Rubik’s cube principle for iris images. Systems, Signal Processing and their Applications (WoSSPA) 2013.8th International Workshop on IEEE.
[http://dx.doi.org/10.1109/WoSSPA.2013.6602374]
[21]
Zhang L, Tian X, Xia S. A scrambling algorithm of image encryption based on Rubik’s cube rotation and Logistic sequence. Multimedia and Signal Processing (CMSP) 2011. International Conference on IEEE. Vol. 1.
[http://dx.doi.org/10.1109/CMSP.2011.69]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy