Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 131))

Abstract

Privacy of information is an important issue in modern era of information technology to manage handling of sensitive information over networks efficiently. It is seen that individual use of inversion and circular shifting while encryption of images does not provide adequate security and weaknesses remain can be exploited by interceptors. In this paper, we propose an improved encryption scheme which utilizes both inversion and shifting in specific manner. We use pseudo random number sequences to perform inversion and circular shifting in a random manner for transforming image pixels. Simulation results show that encrypted images obtained are quite unintelligible and pixels distributed uniformly. Also, proposed encryption method is error propagating, follows avalanche criteria, has large key space and provides higher information security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stephen, G.W.: Digital Modulation and Coding. Prentice Hall (1996)

    Google Scholar 

  2. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)

    Google Scholar 

  3. Ratan, R., Veni Madhavan, C.E.: Steganography based information security. IETE Technical Review 19, 213–219 (2002)

    Article  Google Scholar 

  4. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  5. Schneier, B.: Applied Cryptography. John Wiley and Sons Inc., NY (1996)

    MATH  Google Scholar 

  6. Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  7. Bourbakis, N.G., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recognition 25(6), 567–581 (1992)

    Article  Google Scholar 

  8. Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using scan patterns. Pattern Recognition 37(4), 725–737 (2004)

    Article  Google Scholar 

  9. Mitra, A., Subba Rao, Y.V., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. International Journal of Computer Science 19(2), 127–131 (2006)

    Google Scholar 

  10. Schwartz, C.: A new graphical method for encryption of computer data. Journal of Cryptologia 15(1), 43–46 (1991)

    Article  MathSciNet  Google Scholar 

  11. Yen, J.C., Guo, J.I.: A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)

    Google Scholar 

  12. Fu, C., Zhu, Z.: A chaotic encryption scheme based on circular bit shift method. In: Proceedings of International Conference for Young Computer Scientists, pp. 3057–3061. IEEE Computer Society (2008)

    Google Scholar 

  13. Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Journal of Image and Vision Computing 26(6), 843–850 (2008)

    Article  Google Scholar 

  14. Chin, Y.C., Wang, P.C., Hwang, J.J.: Cryptanalysis on Schwartz graphical encryption method. Journal of Cryptologia 17(3), 301–304 (1993)

    Article  Google Scholar 

  15. Ratan, R., Saxena, P.K.: An algorithm for the restoration of distorted text documents. In: Proceedings of International Conference on Computational Linguistics, Speech and Document Processing (ICCLSDP 1998), pp. A38–A43 (1998)

    Google Scholar 

  16. Ratan, R.: Key Independent Decryption of Graphically Encrypted Images. In: Chen, H., Chau, M., Li, S.-h., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 88–97. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  17. Ratan, R.: Key Independent Retrieval of Chaotic Encrypted Images. In: Chaudhury, S., Mitra, S., Murthy, C.A., Sastry, P.S., Pal, S.K. (eds.) PReMI 2009. LNCS, vol. 5909, pp. 483–488. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  18. Li, S., Zheng, X.: On the security of an image encryption method. In: Proceedings of IEEE International Conference on Image Processing, pp. II-925–II-928 (2002)

    Google Scholar 

  19. Yen, J.C., Guo, J.I.: A new chaotic key based design for image encryption and decryption. In: Proceedings of IEEE International Symposium Circuits and Systems, vol. 4, pp. 49–52 (2000)

    Google Scholar 

  20. Kohda, T., Tsuneda, A.: Statistics of chaotic binary sequences. Journal IEEE Trans. Information Theory 43(1), 104–112 (1997)

    Article  MathSciNet  Google Scholar 

  21. Long, M., Li, T.: A chaos based data encryption algorithm for image/video. In: Proceedings of International Conference on Multimedia and Information Technology, pp. 172–175 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Ratan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer India Pvt. Ltd.

About this paper

Cite this paper

Ratan, R. (2012). Securing Images Using Inversion and Shifting. In: Deep, K., Nagar, A., Pant, M., Bansal, J. (eds) Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Advances in Intelligent and Soft Computing, vol 131. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0491-6_38

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0491-6_38

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-0490-9

  • Online ISBN: 978-81-322-0491-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics