Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2014 | Volume: 6 | Issue: 4 | Page No.: 368-378
DOI: 10.3923/rjit.2014.368.378
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Image Encryption

Padmapriya Praveenkumar, R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and Rengarajan Amirtharajan

This study focuses on image shuffling where the image is segmentd into four and then to each segment, various shuffling algorithms are applied and iterated until the vertical, horizontal and diagonal correlation values are minimum. Then to the shuffled segment, Cipher Block Chaining (CBC) algorithm is applied. Then the same procedure is applied for all the four segments and then combined again to form the original shuffled image. To authenticate the proposed method, correlation values, Number of Pixels Changing Rate (NPCR) and the Unified Averaged Changing Intensity (UACI) histogram analysis are computed to validate the sterness of the proposed algorithm and compared with the available literature.
PDF Fulltext XML References Citation Report Citation
  •    Tri Layer Image Encryption Based on Quantum Principle
  •    Horse DNA Runs on Image: A Novel Road to Image Encryption
  •    Image Merger Encryptor: A Chaotic and Chebyshev Key Approach
  •    Chain of Shuffling and Chaos: A Tied Encryptic Approach
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Steganography-Time to Time: A Review
  •    Kubera Kolam: A Way for Random Image Steganography
How to cite this article:

Padmapriya Praveenkumar, R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and Rengarajan Amirtharajan, 2014. Image Encryption. Research Journal of Information Technology, 6: 368-378.

DOI: 10.3923/rjit.2014.368.378






Curve Bottom