An Enhanced Image Encryption Scheme using 16 Byte Key

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2015 by IJETT Journal
Volume-30 Number-3
Year of Publication : 2015
Authors : Shradha Suryawanshi, Pankaj Kumar Sahu
DOI :  10.14445/22315381/IJETT-V30P221


Shradha Suryawanshi, Pankaj Kumar Sahu"An Enhanced Image Encryption Scheme using 16 Byte Key", International Journal of Engineering Trends and Technology (IJETT), V30(3),115-120 December 2015. ISSN:2231-5381. published by seventh sense research group

Nowadays, security and privacy has become one of the primary issues in data storage and transmission. In the age of multimedia, images are widely used in business, advertising and promotions. Therefore the protection of images from unauthorized access is important. Image encryption plays a significant role in the field of information hiding. In this article, we introduce a chaos based image encryption technique using method of shuffled operations. This technique uses 128-bit private key for encryption. Performance of proposed image encryption scheme is compared with the existing inter pixel displacement image encryption scheme. Performance evaluation reveals that proposed scheme performs better than existing scheme in terms of entropy of encrypted image.


[1] Amnesh Goel and Nidhi Chandra ?A Technique for Image Encryption Based On Explosive n*n Block Displacement Followed By Inter-Pixel Displacement of RGB Attribute of A Pixel 2012 IEEE International Conference on Communication Systems and Network Technologies
[2] P.Karthigaikumar, Soumiya Rasheed ?Simulation of Image Encryption using AES Algorithm IJCA Special Issue on “Computational Science - New Dimensions & Perspectives” NCCSE, 2011
[3] D. Chattopadhyay, M. K. Mandal and D. Nandi Robust Chaotic Image Encryption based on Perturbation Technique published in ICGST-GVIP Journal, Volume 11, Issue 2, April 2011.
[4] Manjunath Prasad1 and K.L.Sudha2and named “Chaos Image Encryption using Pixel shuffling published in D.C. Wyld, et al. (Eds): CCSEA 2011, CS & IT 02, pp. 169–179, 2011.
[5] Jolly Shah and Dr. Vikas Saxena ?Performance Study on Image Encryption Schemes published in IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011 ISSN (Online): 1694-0814.
[6] Reji Mathews, Amnesh Goel and Nidhi Chandra ?Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices International Journal of Computer Applications (0975 – 8887) Volume 36– No.3, December 2011.
[7] Dongming Chen, and Yunpeng Chang ?A Novel Image Encryption Algorithm based on Logistic Maps Advances in Information Sciences and Service Sciences, Volume3, Number7, August 2011.
[8] K.Sakthidasan and B.V.Santhosh Krishna New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images International Journal of Information and Education Technology, Vol. 1, No. 2, June 2011.
[9] Kamlesh Gupta1, Sanjay Silakari2 ?Choase Based Image Encryption Using Block-Based Transformation Algorithm(IJCNS) International Journal of Computer and Network Security,Vol. 1, No. 3, December 2009.
[10] Mohammad Ali Bani Younes and Aman Jantan ?An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008.
[11] Mohammad Ali Bani Younes and Aman Jantan ?Image Encryption using Block-Based Transformation Algorithm IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03 Advance online publication: 19 February 2008.

Image encryption, cipher, security.