Home   >   CSC-OpenAccess Library   >    Manuscript Information
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusive OR Combination
Saleh S Saraireh, Mohammed AL-Saraireh, Yazeed Alsbou
Pages - 66 - 80     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 2    |    Publication Date - June 2013  Table of Contents
Image Encryption, Filter Bank, XOR, Histogram, Key Sensitivity.
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
CITED BY (2)  
1 Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing.
2 Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014.
1 Google Scholar 
2 CiteSeerX 
3 Scribd 
4 SlideShare 
5 PdfSR 
A. DIACONU, and K. LOUKHAOUKH. "An improved secure image encryption algorithm based on rubik's cube principle and digital chaotic cipher." Mathematical Problems in Engineering, Hindawi Publishing Corporation, 2013.
A. GUPTA, N. JOSHI and C. NAGAR, "A review new symmetric image encryption scheme based on correlation pattern." International Journal on Emerging Technologies 3(1): 2012,pp 102-104.
A. JOLFAEI and A. MIRGHADRI. "Image Encryption Approach Using Chaos and Stream Cipher." Journal of Theoretical and Applied Information Technology, 2010a.
A. JOLFAEI and A. MIRGHADRI. "Survey: image encryption using A5/1 and W7." Journal of Computing, 2(8), 2010b .
A. M. RIAD, A. H. HUSSEIN, H. M. KASEM, and A. ABOU EL-AZM. "A new efficient image encryption technique based on arnold and idea algorithms." International Conference on Image and Information Processing (ICIIP 2012), 46, 2012, Singapore.
A. N. PISARCHIK and M. ZANIN. "Image encryption with chaotically coupled chaotic maps."Physica D, 237(20): 2008 pp 2638-2648.
B. AÏSSA, D. NADIB, and R. MOHAMED. "Image encryption using stream cipher based on nonlinear combination generator with enhanced security." NEW TRENDS IN MATHEMATICAL SCIENCES, 1(1) 2013, pp 18-27.
B. FURHT and D. KIROVSKI. Multimedia security handbook. CRC Press, Boca Raton,Florida, 2005.
B.V. RAMA DEVI. "A novel encryption method for the secure transmission of images."International Journal on Computer Science and Engineering, 2(9): 2010, pp 2801-2804.
C. K. HUANG, and H. H. NIEN. "Multi chaotic systems based pixel shuffle for image encryption." Optical communications, 282, 2009, pp 2123-2127.
F. BORKO, S. DANIEL, and M AHMET.Fundamentals of multimedia encryption techniques.Multimedia Security Handbook, 2004.
H. AHMED, H. M KALASH, and O. S FARAG ALLAH.: Encryption analysis of the rc5 block cipher algorithm for digital images. Menoufia University, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menouf-32952, Egypt 2006.
H. RATHOD, M. SISODIA, and S SHARMA." A review and comparative study of block based symmetric transformation algorithm for image encryption." International Journal of Computer Technology and Electronics Engineering (IJCTEE) 1(2), 2011.
H. XIAO and G. ZHANG. "An image encryption scheme based on chaotic systems." IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics,Dalian 2006.
I. ELASHRY, O. ALLAH, A. ABBAS, S. RABAIE, and F. EL-SAMIE. "Homomorphic image encryption." Journal of Electronic Imaging, 18, 2009.
J. AHMAD and F. AHMED. "Efficiency analysis and security evaluation of image encryption schemes." International Journal of Video and Image Processing and Network Security,12(4), 2012.
K. MILOZŠ, "Qualitative aspects of image applications in multimedia technology." 17th IEEE International Conference on Radioelektronika, April 2007, Prague, pp.1 – 11.
L. KRIKOR, S. BABA, T. ARIF and Z. SHAABAN. "Image encryption using DCT and stream cipher." European Journal of Scientific, 32(1) 2009, pp47-57.
M. A. BANI YOUNES and A. JANTAN "An image encryption approach using a combination of permutation technique followed by encryption." International Journal of Computer Science and Network Security (IJCSNS), 8(4) 2008b.
M. A. BANI YOUNES and A. JANTAN. "Image encryption using block-based transformation algorithm." IAENG International Journal of Computer Science, 35(1) 2008a.
N. FERGUSON, B. SCHNEIER, and A KOHNO. Cryptography engineering. 2nd edition, John Wiley & Sons, 2010.
N. SETHI and D. SHARMA. " A new cryptology approach for image encryption." 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), 2012, pp 905– 908.
P. KARTHIGAIKUMAR and S. RASHEED. "Simulation of image encryption using AES algorithm." IJCA Special Issue on Computational Science - New Dimensions & Perspective 2011.
R. ENAYATIFAR. "Image Encryption Via logistic map function and heap tree." International Journal of Physics Science, 6(2) 2011.
S. E. BORUJENI, and M. ESHGHI. "Chaotic image encryption design using tompkins-paige algorithm." Hindawi Publishing Corporation, Mathematical Problems in Engineering, Article ID 762652, 2009.
S. H. KAMALI, R. SHAKERIAN, M. HEDAYATI, and M. RAHMANI. "A new modified version of advance encryption standard based algorithm for image encryption." International Conference in Electronics and Information Engineering (ICEIE) 2010b.
S. H. KAMALI, R. SHAKERIAN, M. HEDAYATI, and M. RAHMANI. "A new modified version of advanced encryption standard (aes) based algorithm for image encryption." IEEE Transactions on Electronics and Information Engineering, 2010a, 1:141-145.
S. LIAN, J. SUN, and Z. WANG. "Security analysis of a chaos-based image encryption algorithm." Physics Letters A 35, 1, 2005, pp 645-661.
S. RAKESH, A. AJITKUMAR, B. SHADAKSHARI, and B. ANNAPPA. "Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping." International Journal on Cryptography and Information Security (IJCIS), 2(1) 2012.
S. SARAIREH and M. BENAISSA. "A scalable block cipher design using filter banks over finite fields." In Acoustics Speech and Signal Processing (ICASSP), IEEE International Conference, Dallas, TX, USA 2010.
U. PANDEY, M. MANORIA, and J. JAIN. "A novel approach for image encryption by new m box encryption algorithm using block based transformation along with shuffle operation."International Journal of Computer Applications, 42(1), 2012.
Y. ZHANG. "Image encryption using extended chaotic sequences." IEEE Transactions International Conference on Intelligent Computation Technology and Automation, 2011a pp:143-146.
Y. ZHANG. "Image encryption with logistic map and cheat image."3rd International Conference on Computer Research and Development (ICCRD), 2011b, 1: 97 – 101.
Z. HEGUI, L. XIAOJUN, T. QINGSONG, Z. XIANGDE, and Z. CHENG. "A new chaosbased image encryption scheme using quadratic residue." IEEE International Conference on Systems and Informatics (ICSAI), 2012, pp 1800-1804.
Z. LIEHUANG, L. WENZHUO, L. LEJIAN, and L. HONG. "A novel image scrambling algorithm for digital watermarking based on chaotic sequences." International Journal of Computer Science and Network Security, 6(8B), 2006, pp 125–130.
Z. ZHOU SHIHUA, Z. QIANG, and W. XIAO-PENG. "Image encryption algorithm based on DNA sequences for the big image." International Conference on Multimedia Information Networking and Security, 2010, pp 884-888.
Dr. Saleh S Saraireh
Department of Communications and Electron ic Engineering Philadelphia University Amman - Jordan
Dr. Mohammed AL-Saraireh
Department of Computer Engineering, Mu’tah University Karak - Jordan
Dr. Yazeed Alsbou
Department of Computer Engineering, Mu’tah University Karak - Jordan