Skip to main content

A Novel Image Encryption Technique Based on Inter Block Difference


Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner.

This is a preview of subscription content, access via your institution.


  1. [1]

    EL ABBADI N K, MOHAMAD A, ABDULHAMEED M. Image encryption based on singular value decomposition [J]. Journal of Computer Science, 2014, 10(7): 1222–1230.

    Article  Google Scholar 

  2. [2]

    NASKAR P K, CHAUDHURI A, CHAUDHURI A. A secure symmetric image encryption based on linear geometry [C]//2014 Applications and Innovations in Mobile Computing. Kolkata, India: IEEE, 2014: 67–74.

    Google Scholar 

  3. [3]

    YE R S, ZENG S J, LUN P Q, et al. An image encryption scheme based on bit circular shift and bidirectional diffusion [J]. International Journal of Information Technology and Computer Science, 2014, 6(1): 82–92.

    Article  Google Scholar 

  4. [4]

    KR NASKAR P, CHAUDHURI A. A secure symmetric image encryption based on bit-wise operation [J]. International Journal of Image, Graphics and Signal Processing, 2014, 6(2): 30–38.

    Article  Google Scholar 

  5. [5]

    CHEN J X, ZHU Z L, LIU Z J, et al. A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J]. Optics Express, 2014, 22(6): 7349–7361.

    Article  Google Scholar 

  6. [6]

    ALGHAMDI A S, ULLAH H. A secure Iris image encryption technique using bio-chaotic algorithm [J]. International Journal of Computer and Network Security, 2010, 2(4): 78–84.

    Google Scholar 

  7. [7]

    ALGHAMDI A S, ULLAH H, MAHMUD M, et al. Bio-chaotic stream cipher-based Iris image encryption [C]//2009 International Conference on Computational Science and Engineering. Vancouver, BC, Canada: IEEE, 2009: 739–744.

    Chapter  Google Scholar 

  8. [8]

    SUN Y Y, CHEN L N, XU R D, et al. An image encryption algorithm utilizing Julia sets and Hilbert curves [J]. PLoS One, 2014, 9(1): e84655.

    Article  Google Scholar 

  9. [9]

    ARUL MURUGAN C, KARTHIGAIKUMAR P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms [J]. Mobile Networks and Applications, 2018. (published online).

  10. [10]

    DAWAHDEH Z E, YAAKOB S N, RAZIF BIN OTHMAN R. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J]. Journal of King Saud University-Computer and Information Sciences, 2018, 30(3): 349–355.

    Article  Google Scholar 

  11. [11]

    YASSER I, KHALIFA F, MOHAMED M A, et al. A new image encryption scheme based on hybrid chaotic maps [J]. Complexity, 2020, 2020: 1–23.

    Article  Google Scholar 

  12. [12]

    ES-SABRY M, EL AKKAD N, MERRAS M, et al. A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators [J]. Soft Computing, 2020, 24(5): 3829–3848.

    Article  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Srinivasa Rao Thamanam.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Thamanam, S.R., Nagaraja, P., Naik, B.B. et al. A Novel Image Encryption Technique Based on Inter Block Difference. J. Shanghai Jiaotong Univ. (Sci.) 26, 488–493 (2021).

Download citation

Key words

  • encryption
  • decryption
  • inter block difference
  • advanced encryption standard (AES)

CLC number

  • TP 309.7