CFP last date
15 April 2024
Call for Paper
May Edition
IJAIS solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 15 April 2024

Submit your paper
Know more
Reseach Article

Implementation of Gray Image Encryption using Multi-Level of Permutation and Substitution

by Dina Riadh Alshibani, Rasha Shaker Ibrahim
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 1
Year of Publication: 2015
Authors: Dina Riadh Alshibani, Rasha Shaker Ibrahim
10.5120/ijais2015451458

Dina Riadh Alshibani, Rasha Shaker Ibrahim . Implementation of Gray Image Encryption using Multi-Level of Permutation and Substitution. International Journal of Applied Information Systems. 10, 1 ( November 2015), 25-30. DOI=10.5120/ijais2015451458

@article{ 10.5120/ijais2015451458,
author = { Dina Riadh Alshibani, Rasha Shaker Ibrahim },
title = { Implementation of Gray Image Encryption using Multi-Level of Permutation and Substitution },
journal = { International Journal of Applied Information Systems },
issue_date = { November 2015 },
volume = { 10 },
number = { 1 },
month = { November },
year = { 2015 },
issn = { 2249-0868 },
pages = { 25-30 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number1/834-2015451458/ },
doi = { 10.5120/ijais2015451458 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:02:03.787516+05:30
%A Dina Riadh Alshibani
%A Rasha Shaker Ibrahim
%T Implementation of Gray Image Encryption using Multi-Level of Permutation and Substitution
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 1
%P 25-30
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a new Gray image encryption system is presented. It is based on permutation and substitution of image pixels using secret keys in time domain. The system is with multilevel to increase the security and to present an encrypted image with low pixel correlation, high entropy and uniform distributed histogram. The Tinkerbell map, Zaslavsky Map and Arnold Transform are employed in keys generation to be used in the permutation and substitution process. Test results are done with definite investigation to show that the proposed image encryption is very secure because of its vast key space and robust permutation-diffusion mechanism.

References
  1. Akhavan A., Samsudin A. , Akhshani A., " A novel parallel hash function based on 3D chaoticmap ", EURASIP Journal on Advances in Signal Processing 2013.
  2. Gopalakrishnan T., Ramakrishnan S., Balakumar M., " Image Encryption using Chaos and Parity based Pixel Modification in Permutation", International Journal of Computer Applications® (IJCA) , 2014.
  3. Akhshani A. , Behnia S., A. Akhavan, Hassan H. Abu, Hassan Z. , "A novel scheme for image encryption based on 2D piecewise chaotic maps", Optics Communications 283 (2010) 3259–3266.
  4. Goldsztejn A., "Tinkerbell is chaotic", SIAM Journal applied dynamical system, 2011, vol. 10, No. 4, pp. 1480-1501.
  5. Stoyanov B., Kordov K., "Novel Zaslavsky Map Based Pseudorandom Bit Generation Scheme ", Applied Mathematical Sciences, Vol. 8, 2014, no. 178, 8883 - 8887.
  6. Tian-gong P., Li Da-yong, " A Novel Image Encryption Using Arnold Cat", International Journal of Security and Its Applications, Vol.7, No.5 (2013), pp.377-386.
  7. Tiegang G., Zengqiang C., "A new image encryption algorithm based on hyper-chaos", Elsevier B.V. All rights reserved 2007.
  8. Hanchinamani G., Kulakarni L., " A Novel Approach for Image Encryption based on Parametric Mixing Chaotic System ", International Journal of Computer Applications (0975 – 8887) ,Volume 96– No. 11, June 2014
  9. Huang C.K., Liao C.W., Hsu S.L., Jeng ·Y.C., "Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system ", © Springer Science Business Media, LLC 2011.
  10. Chen G., Mao Y., & Chui, C. K., "A symmetric image encryption scheme based on 3D chaotic cat maps.Chaos", Solitons and Fractals, 21, 749–761, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Choatic maps Arnold Transform Tinkerbell map Zaslavsky Map Permutation Subsitusion.