Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.14MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusive OR Combination
Saleh S Saraireh, Mohammed AL-Saraireh, Yazeed Alsbou
Pages - 66 - 80     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 2    |    Publication Date - June 2013  Table of Contents
MORE INFORMATION
KEYWORDS
Image Encryption, Filter Bank, XOR, Histogram, Key Sensitivity.
ABSTRACT
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
CITED BY (2)  
1 Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing.
2 Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014.
1 Google Scholar 
2 CiteSeerX 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 F. BORKO, S. DANIEL, and M AHMET.Fundamentals of multimedia encryption techniques.Multimedia Security Handbook, 2004.
2 H. AHMED, H. M KALASH, and O. S FARAG ALLAH.: Encryption analysis of the rc5 block cipher algorithm for digital images. Menoufia University, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menouf-32952, Egypt 2006.
3 H. RATHOD, M. SISODIA, and S SHARMA." A review and comparative study of block based symmetric transformation algorithm for image encryption." International Journal of Computer Technology and Electronics Engineering (IJCTEE) 1(2), 2011.
4 N. FERGUSON, B. SCHNEIER, and A KOHNO. Cryptography engineering. 2nd edition, John Wiley & Sons, 2010.
5 A. GUPTA, N. JOSHI and C. NAGAR, "A review new symmetric image encryption scheme based on correlation pattern." International Journal on Emerging Technologies 3(1): 2012,pp 102-104.
6 K. MILOZŠ, "Qualitative aspects of image applications in multimedia technology." 17th IEEE International Conference on Radioelektronika, April 2007, Prague, pp.1 – 11.
7 B. FURHT and D. KIROVSKI. Multimedia security handbook. CRC Press, Boca Raton,Florida, 2005.
8 P. KARTHIGAIKUMAR and S. RASHEED. "Simulation of image encryption using AES algorithm." IJCA Special Issue on Computational Science - New Dimensions & Perspective 2011.
9 M. A. BANI YOUNES and A. JANTAN. "Image encryption using block-based transformation algorithm." IAENG International Journal of Computer Science, 35(1) 2008a.
10 M. A. BANI YOUNES and A. JANTAN "An image encryption approach using a combination of permutation technique followed by encryption." International Journal of Computer Science and Network Security (IJCSNS), 8(4) 2008b.
11 S. H. KAMALI, R. SHAKERIAN, M. HEDAYATI, and M. RAHMANI. "A new modified version of advanced encryption standard (aes) based algorithm for image encryption." IEEE Transactions on Electronics and Information Engineering, 2010a, 1:141-145.
12 S. SARAIREH and M. BENAISSA. "A scalable block cipher design using filter banks over finite fields." In Acoustics Speech and Signal Processing (ICASSP), IEEE International Conference, Dallas, TX, USA 2010.
13 S. H. KAMALI, R. SHAKERIAN, M. HEDAYATI, and M. RAHMANI. "A new modified version of advance encryption standard based algorithm for image encryption." International Conference in Electronics and Information Engineering (ICEIE) 2010b.
14 B.V. RAMA DEVI. "A novel encryption method for the secure transmission of images."International Journal on Computer Science and Engineering, 2(9): 2010, pp 2801-2804.
15 H. XIAO and G. ZHANG. "An image encryption scheme based on chaotic systems." IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics,Dalian 2006.
16 Y. ZHANG. "Image encryption using extended chaotic sequences." IEEE Transactions International Conference on Intelligent Computation Technology and Automation, 2011a pp:143-146.
17 Y. ZHANG. "Image encryption with logistic map and cheat image."3rd International Conference on Computer Research and Development (ICCRD), 2011b, 1: 97 – 101.
18 L. KRIKOR, S. BABA, T. ARIF and Z. SHAABAN. "Image encryption using DCT and stream cipher." European Journal of Scientific, 32(1) 2009, pp47-57.
19 Z. ZHOU SHIHUA, Z. QIANG, and W. XIAO-PENG. "Image encryption algorithm based on DNA sequences for the big image." International Conference on Multimedia Information Networking and Security, 2010, pp 884-888.
20 N. SETHI and D. SHARMA. " A new cryptology approach for image encryption." 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), 2012, pp 905– 908.
21 J. AHMAD and F. AHMED. "Efficiency analysis and security evaluation of image encryption schemes." International Journal of Video and Image Processing and Network Security,12(4), 2012.
22 A. JOLFAEI and A. MIRGHADRI. "Image Encryption Approach Using Chaos and Stream Cipher." Journal of Theoretical and Applied Information Technology, 2010a.
23 A. JOLFAEI and A. MIRGHADRI. "Survey: image encryption using A5/1 and W7." Journal of Computing, 2(8), 2010b .
24 S. E. BORUJENI, and M. ESHGHI. "Chaotic image encryption design using tompkins-paige algorithm." Hindawi Publishing Corporation, Mathematical Problems in Engineering, Article ID 762652, 2009.
25 U. PANDEY, M. MANORIA, and J. JAIN. "A novel approach for image encryption by new m box encryption algorithm using block based transformation along with shuffle operation."International Journal of Computer Applications, 42(1), 2012.
26 R. ENAYATIFAR. "Image Encryption Via logistic map function and heap tree." International Journal of Physics Science, 6(2) 2011.
27 S. RAKESH, A. AJITKUMAR, B. SHADAKSHARI, and B. ANNAPPA. "Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping." International Journal on Cryptography and Information Security (IJCIS), 2(1) 2012.
28 B. AÏSSA, D. NADIB, and R. MOHAMED. "Image encryption using stream cipher based on nonlinear combination generator with enhanced security." NEW TRENDS IN MATHEMATICAL SCIENCES, 1(1) 2013, pp 18-27.
29 A. N. PISARCHIK and M. ZANIN. "Image encryption with chaotically coupled chaotic maps."Physica D, 237(20): 2008 pp 2638-2648.
30 I. ELASHRY, O. ALLAH, A. ABBAS, S. RABAIE, and F. EL-SAMIE. "Homomorphic image encryption." Journal of Electronic Imaging, 18, 2009.
31 Z. HEGUI, L. XIAOJUN, T. QINGSONG, Z. XIANGDE, and Z. CHENG. "A new chaosbased image encryption scheme using quadratic residue." IEEE International Conference on Systems and Informatics (ICSAI), 2012, pp 1800-1804.
32 C. K. HUANG, and H. H. NIEN. "Multi chaotic systems based pixel shuffle for image encryption." Optical communications, 282, 2009, pp 2123-2127.
33 A. DIACONU, and K. LOUKHAOUKH. "An improved secure image encryption algorithm based on rubik's cube principle and digital chaotic cipher." Mathematical Problems in Engineering, Hindawi Publishing Corporation, 2013.
34 S. LIAN, J. SUN, and Z. WANG. "Security analysis of a chaos-based image encryption algorithm." Physics Letters A 35, 1, 2005, pp 645-661.
35 A. M. RIAD, A. H. HUSSEIN, H. M. KASEM, and A. ABOU EL-AZM. "A new efficient image encryption technique based on arnold and idea algorithms." International Conference on Image and Information Processing (ICIIP 2012), 46, 2012, Singapore.
36 Z. LIEHUANG, L. WENZHUO, L. LEJIAN, and L. HONG. "A novel image scrambling algorithm for digital watermarking based on chaotic sequences." International Journal of Computer Science and Network Security, 6(8B), 2006, pp 125–130.
Dr. Saleh S Saraireh
Department of Communications and Electron ic Engineering Philadelphia University Amman - Jordan
saleh_53@yahoo.com
Dr. Mohammed AL-Saraireh
Department of Computer Engineering, Mu’tah University Karak - Jordan
Dr. Yazeed Alsbou
Department of Computer Engineering, Mu’tah University Karak - Jordan