Abstract
In the digitalized era, an enormous amount of digital images are being shared over the different networks and also available in different storage mediums. Internet users enjoy this convenient way of sharing images and at the meantime, they need to face the consequences like chosen plain-text, statistical, differential attacks, and brute-force attack. These attacks and noises create the need of enhancing the image information security. An image encryption algorithm needs to be robust. An image encryption algorithm (i-TSS) based on transposition, shuffling, and substitution is presented in this paper, that provides better security to the image. This algorithm is implemented using Java. By assessing the results of image quality metrics, this algorithm proves to be secured and robust against the external attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996). ISBN 0-471-11709-9
Soleymani, A., Ali, Z., Nordin, M.: A survey on principal aspects of secure image transmission. In: Proceedings of World Academy of Science, Engineering and Technology, pp. 247–254 (2012)
Stalling, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice Hall, Upper Saddle River (2013). ISBN 978-0133354690
Mollin, R.A.: An Introduction to Cryptography. CRC Press, Boca Raton (2006)
Vanstone, S.A., Menezes, A.J., Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284, 2775–2780 (2011)
Lin, Z., Wang, H.: Efficient image encryption using a chaos-based PWL memristor. IETE Tech. Rev. 27, 318–325 (2010)
Diaconu, A.V., Costea, A., Costea, M.A.: Color image scrambling technique based on transposition of pixels between RGB channels using Knight’s moving rules and digital chaotic map. In: Mathematical Problems in Engineering (2014)
Dascalescu, A.C., Boriga, R.E.: A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn. 74, 307–318 (2013)
Dalhoum, A.L.A., Mahafzah, B.A., Awwad, A.A., Aldamari, I., Ortega, A., Alfonseca, M.: Digital image scrambling using 2D cellular automata. IEEE Trans. Multimedia 19, 28–36 (2012)
Askar, S.S., Karawia, A.A., Alshamrani, A.: Image encryption algorithm based on chaotic economic model. In: Mathematical Problems in Engineering (2015)
Zhang, J., Fang, D., Ren, H.: Image encryption algorithm based on DNA encoding and chaotic maps. In: Mathematical Problems in Engineering (2015)
http://www.cs.umd.edu/class/sum2003/cmsc311/Notes/BitOp/xor.html. Accessed 10 October 2015
http://sipi.usc.edu/database/. Accessed 10 October 2015
http://in.mathworks.com/help/images/image-quality-metrics.html and http://in.mathworks.com/help/images/image-quality.html. Accessed 10 October 2015
Peak Signal-to-Noise Ratio as an Image Quality Metric: White paper published by National Instruments China (2013)
Wang, Z., Bovik, A.C.: Mean squared error: Love it or leave it?—A new look at signal fidelity measures. IEEE Signal Process. Mag. 26(1), 98–117 (2009)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT), April Edition, 31–38 (2011)
Shannon, C.: Communication theory of secrecy systems. Bell Syst. Techn. J. 28, 656–7151 (1949)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Narayanasamy, K., Arumugam, P. (2016). i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution Using Randomly Generated Bitmap Image. In: Bjørner, N., Prasad, S., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2016. Lecture Notes in Computer Science(), vol 9581. Springer, Cham. https://doi.org/10.1007/978-3-319-28034-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-28034-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28033-2
Online ISBN: 978-3-319-28034-9
eBook Packages: Computer ScienceComputer Science (R0)