A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 50 (2016) no. 3, pp. 241-249.

In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and large-sized key represents the main factors that give the encryption system the required strength and give encrypted data more protection. This paper presents a non-traditional encryption algorithm that uses a large key size (256 bytes) = 2048 bits, to achieve a high degree of protection for the image. First, the algorithm represents the source image as a set of two-dimensional blocks of size 16×16 bytes and the secret key as a two-dimensional block of size 16×16 bytes. Second, transposition and substitution operations are implemented within each block of the image based on the extracted map of overlapped paths from the secret key block. Successive different keys are generated by using another way of implementation of the substitution and transposition operations in the secret key block. The recorded performance results, from the evaluation tests, have been compared with some well-known encryption algorithms and they proved that the proposed algorithm can be used effectively to protect images.

DOI : 10.1051/ita/2016023
Classification : 68U10
Mots clés : Hexadecimal, XOR, transposition, substitution, information security
Fadhil Al-Husainy, Mohammed A. 1

1 Department of Computer Science, Faculty of Information Technology, Middle East University, Amman, Jordan
@article{ITA_2016__50_3_241_0,
     author = {Fadhil Al-Husainy, Mohammed A.},
     title = {A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key},
     journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications},
     pages = {241--249},
     publisher = {EDP-Sciences},
     volume = {50},
     number = {3},
     year = {2016},
     doi = {10.1051/ita/2016023},
     mrnumber = {3582640},
     zbl = {1401.68066},
     language = {en},
     url = {http://archive.numdam.org/articles/10.1051/ita/2016023/}
}
TY  - JOUR
AU  - Fadhil Al-Husainy, Mohammed A.
TI  - A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key
JO  - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
PY  - 2016
SP  - 241
EP  - 249
VL  - 50
IS  - 3
PB  - EDP-Sciences
UR  - http://archive.numdam.org/articles/10.1051/ita/2016023/
DO  - 10.1051/ita/2016023
LA  - en
ID  - ITA_2016__50_3_241_0
ER  - 
%0 Journal Article
%A Fadhil Al-Husainy, Mohammed A.
%T A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key
%J RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
%D 2016
%P 241-249
%V 50
%N 3
%I EDP-Sciences
%U http://archive.numdam.org/articles/10.1051/ita/2016023/
%R 10.1051/ita/2016023
%G en
%F ITA_2016__50_3_241_0
Fadhil Al-Husainy, Mohammed A. A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 50 (2016) no. 3, pp. 241-249. doi : 10.1051/ita/2016023. http://archive.numdam.org/articles/10.1051/ita/2016023/

G.A. Sathish Kumar, K. Bhoopathy Bagan and V. Vivekanand, A Novel Algorithm for Image Encryption by Integrated Pixel Scrambling Plus Diffusion [IISPD] Utilizing Duo Chaos Mapping Applicability in Wireless Systems. Procedia Comput. Sci. 3 (2011) 378–387. | DOI

M.W. Salim and Nasharuddin Zainal, Rapid Encryption Method Based on AES Algorithm for Grey Scale HD Image Encryption. Procedia Tech. 11 (2013) 51–56. | DOI

M. Chaumont, W. Puech and C. Lahanier, Securing Color Information of an Image by Concealing the Color Palette. J. Syst. Softw. 86 (2013) 809–825. | DOI

S. Megha, Reader and S. Kaminee, Image Encryption and Decryption Using Selective Block Encryption Technique. Int. J. Comput. Sci. Eng. Tech. (IJCSET) 5 (2014) 941–946.

M. Al-Husainy, A Novel Encryption Method for Image Security. Int. J. Secur. Appl. 6 (2012) 1–8.

K. Kuppusamy and K. Thamodaran, Optimized Hybrid Security Mechanism for Image Authentication and Security using PSO. Int. J. Netw. Secur. Appl. (IJNSA) 5 (2013) 115–128.

T. Sivakumar and R. Venkatesan, A Novel Image Encryption Approach using Matrix Reordering. WSEAS Trans. Comput. 12 (2013) 407–417.

S. Chunyan and Q. Yulong, A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy 17 (2015) 6954–6968. | DOI | MR

Kr.N. Prabir and C. Atal, A Secure Symmetric Image Encryption Based on Bit-wise Operation. Int. J. Image Graph. Signal Process. 6 (2014) 30–38. | DOI

Y. Yu-Guang, P. Qing-Xiang, S. Si-Jia and X. Peng, Novel Image Encryption based on Quantum Walks. Scientific Rep. 5 (2015) 7784. | DOI

Cité par Sources :