RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Digital RGB color images are considered as the most widely used data type through the internet, so there is a need for efficient and secure techniques to transmit and protect these digital images and this is a matter of high priority process. Many researchers had developed different techniques to increase the security of image transmission, and most of these techniques suffer from the low speed of the encryption-decryption process. In this paper, a novel technique is proposed that could be used for digital color image encryption-decryption. The performance of this technique is compared with the performance of other techniques and it has shown the advantages of using this technique over other techniques in enhancing the throughput and speed of encryption-decryption process.


  • Keywords

    Digital RGB color Image; Image Segmentation; Private Key; Encryption; Decryption, Speedup; Throughput ; Hacking.

  • References

      [1] Ziad A. Alqadi ,Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, 2010, Optimized True-RGB color Image Processing, World Applied Sciences Journal 8 (10): 1175-1182, ISSN 1818-4952.

      [2] Waheeb, A. and Ziad AlQadi, 2009. Gray image reconstruction. Eur. J. Sci. Res., 27: 167-173.

      [3] Rojo, M.G., G.B. García, C.P. Mateos, J.G. García and M.C. Vicente, 2006. Critical comparison of 31 commercially available digital slide systems in pathology. Int. J. Surg. Pathol., 14: 285-305.

      [4] T.Sivakumar , and R.Venkatesan , A Novel Image Encryption Approach using Matrix Reordering, WSEAS TRANSACTIONS on COMPUTERS, Issue 11, Volume 12, November 2013,pp 407-418.

      [5] Haojiang Gao, Yisheng Zhang, Shuyun Liang and Dequn Li, “A New Chaotic Algorithm for Image Encryption”, Elsevier Science Direct, vol. 29, no. 2, 2006, pp.393-399.

      [6] Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, 2011, pp. pp.1-13.

      [7] Xiaomin Wang, and Jiashu Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, 23-24 April 2008, pp.1-6.

      [8] G. Chen, Y. Mao, and C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons and Fractals, Vol. 21, No. 3, 2004, pp.749–761.

      [9] Guodong Ye, “An Efficient Image Encryption Scheme based on Logistic maps”, International Journal of Pure and Applied Mathematics, Vol.55, No.1,2009, pp. 37-47.

      [10] Han Shuihua and Yang Shuangyuan, “An Asymmetric Image Encryption Based on Matrix Transformation”, ECTI Transactions on Computer and Information Technology, Vol.1, No.2, 2005, pp. pp.126-133.

      [11] Prabhudesai Keval Ketan and Vijayarajan V, “An Amalgam Approach using AES and RC4 Algorithms for Encryption and Decryption”, International Journal of Computer Applications, Vol.54, No.12, 2012, pp.29-36.

      [12] S.A.M Rizvi, Syed Zeeshan Hussain and Neeta Wadhwa, “A Comparative Study of Two Symmetric Encryption Algorithms Across Different Platforms”, International Conference on Security and Management (SAM’11), World Academy of Science, USA, 2011.

      [13] Sanfu Wang, Yuying Zheng and Zhongshe Gao, “A New Image Scrambling Method through Folding Transform”, IEEE International Conference on Computer Application and System Modeling, Taiyuan, 22-24 Oct. 2010, pp.v2-395-399.

      [14] G.A. Sathishkumar and K.Bhoopathy Bagan, “A Novel Image Encryption Algorithm Using Pixel Shuffling and BASE 64 Encoding Based Chaotic Block Cipher, WSEAS Transactions on Computers, Vol.10, No. 6, 2011, pp. 169-178.

      [15] John Justin M, Manimurugan S , “A Survey on Various Encryption Techniques ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

      [16] Ephin M, Judy Ann Joy and N. A. Vasanthi, “ Survey of Chaos based Image Encryption and Decryption Techniques ” , Amrita International Conference of Women in Computing (AICWIC’13) Proceedings published by International Journal of Computer Applications (IJCA).

      [17] Jawahar Thakur, and Nagesh Kumar, “DES, AES, and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol.1, No.2, 2011, pp.6-12.

      [18] Liu Hongjun and Wang Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”, Journal of Computers and Mathematics with Applications (Elsevier), Vol.59, 2010, pp. 3320-3327.

      [19] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, “A Modified AES Based Algorithm for Image Encryption”, World Academy of Science, Engineering and Technology, Vol.3, 2007, pp.526-531.

      [20] S.S. Maniccam, and N.G.Bourbakis “Image and Video Encryption using SCAN Patterns”, The Journal of the Pattern Recognition Society, Vol.37, 2004, pp.725-737.

      [21] Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, Vol.35, No.1, 2008, pp.3-11.




Article ID: 16334
DOI: 10.14419/ijet.v7i3.13.16334

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.