Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Image encryption


Images Encryption Using Chaos and Random Generation

Yossra Hussain Ail; Zahraa A.H. Alobaidy

Engineering and Technology Journal, 2016, Volume 34, Issue 1, Pages 172-179

Due to the network and multimedia application development information security become important since information can be attacked over the transmission channels and the combination of cryptography and chaotic become important filed of information security, where many encryption algorithm are based on chaotic mapping due to the inherent features of image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve good diffused image by setting the initial conditions to generate the shuffling sequence randomly by 2D zaslevskii mapand employ them in 2D cat map for shuffling the image pixels positions, also baker map is used to decomposed image into four rectangles and shuffle them.To increase the security level of the encryption algorithm Geffe random key generator is used to generate 128 bit key and employ it with exclusive-OR equation to the diffused image. The results indicated that the combination of chaotic and cryptography proved to be good for high security level. All the experimental results show that the proposed algorithm is secure due to the large key space and the high sensitivity to the secret key.

Image Encryption using Resilient Boolean Function and DCT

Hussam A. Darweesh; Ekbal H. Ali; Azhar Malik

Engineering and Technology Journal, 2011, Volume 29, Issue 12, Pages 2551-2563

The information security is becoming more important in data storage and transmission, where images are widely used in it. The Stream cipher cryptosystems are extensively used for provide a reliable and efficient method of security. The new propose system image encryption investigated by encrypt the powerful frequency coefficients in DCT by used saturated best resilient Boolean function that constructed by Zhang's constructions that implement Maiorana-McFarland like constructions technique and its modifications. The simulation results of the proposal system calculate correlation test (Corr1) and PSNR1 to compare between original and encrypted image as parameter of robustness, and correlation test (Corr2) and PSNR2 as correlation parameter between original and decrypted image as parameter of quality in reconstruct image.

Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption

Musaab R. Abdulrazzaq

Engineering and Technology Journal, 2010, Volume 28, Issue 7, Pages 1340-1349

Secret sharing is a scheme used to distribute secret among a group of users.
Rather than making duplicated copies of secrets among users, the secret is divided
into a number of pieces, called shares. The secret can be revealed if a certain
number of user shares are combined. The method proposed here (i)utilizes bit-level
decomposition and stacking operations to both encrypt and decrypt B-bit image,
(ii) preserves all the features of traditional (k, n) sharing schemes, (iii) allows for
perfect reconstruction of the input B-bit image, (iv) encrypts binary, gray-scale and
color images, and (v) can be effectively implemented either in software or
hardware.