Cover
Vol. 11 No. 1 (2015)

Published: July 31, 2015

Pages: 42-48

Original Article

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption

Abstract

In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation method. A new non linear stream cipher algorithm is also proposed that is based on combining several keys generated by Linear Feedback Shift Register (LFSR). The results shown that the proposed algorithm has a high security feature and it is efficient for image encryption. Practical tests proved that the proposed encryption algorithm is robust, provides high level of security and gives perfect reconstruction of the decrypted image.

References

  1. O. M. Abu Zaid, N. A. El-Fishawy, E. M. Nigm, and O. S. Faragallah, "A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Secuerity", Journal of Computer Applications ( 0975 – 8887) Vol. 61, No. 5, pp. 29-39, January 2013.
  2. M. Prasad, and K.L.Sudha, "Chaos Image Encryption using Pixel shuffling", D.C. Wyld, et al. (Eds): CCSEA 2011, Computer Science & Information Technology (CS & IT) 02, pp. 169–179, October 2011.
  3. G. A. Sathishkumar, K. Bhoopathy, and N.Sriraam, "Image Encryption Based on Diffusion and Multiple Chaotic Maps", 181-194, March 2011.
  4. S. Shekhar, H. Srivastava, and M. Dutta, "An Efficient Adaptive Encryption Algorithm for Digital Images", International Journal of Computer and Electrical Engineering, Vol. 4, No. 3, pp. 380-383, June 2012.
  5. S. Laskar, and K. Hemachandran, "High Capacity data hiding using LSB Steganography and Encryption", International Journal of Database Management Systems ( 2012.
  6. C. Guang-hui1, H. Kai, Y. He and E. Xu, "Algorithm of Image Encryption based on Permutation Entropy", Proceedings of Computer Science & Information Tech (IPCSIT), Vol. 53, pp. 102-108,October 2012.
  7. C. Paar, and J. Pelzl, " Understanding Cryptography ", Springer-Verlag Berlin Heidelberg, 2010.
  8. R. K. yadava, B. K. Singh, S. K. Sinha, and K. K. Pandey, "A New Approach of Colour Chaotic Map", Journal of Engineering and Applications, Vol. 3, No. 6, pp. 14-20, June 2013.
  9. D.L. Mancilla, J. H. Lopez, R. J. Reategui, R. Chiu, E. Rauda, C. E. Hernandez, and G. H. Cuellar, " Statistical Analysis of Imaging Encryption Using Chaos", Latest Ternds in Circuit, Systems,Signal Processing and Automatic Control, pp. 86-90, March 2010.
  10. O. M. Abu Zaid, N. A. El-Fishawy, and E. M. Nigm, "Cryptosystem Algorithm Based on Chaotic Systems for Encrypting Colored Computer Science Issues, Vol. 10, Issue 4, No. 2, pp. 212-224, July 2013.
  11. A. Jolefaei, and A. Mirghadri, "An Image Encryption Approach Using Chaos and Stream Cipher", Journal of Theoretical and Applied 117-125, October 2010.
  12. B. Aissa, D. Nadir, and R. Mohamed, "An ciphers Based on Nonlinear Filter Generator", Journal of Theoretical and Applied 7, July 2012.
  13. D. C. Mishra and R. K. Sharma, " Hill Cipher over SLn(F) Associated With Discrete Wavelet Transformation", Applications and Applied Mathematics: An pp. 777-791, December 2013.
  14. P. Jagadeesh, P. Nagabhushan, and R. P Kumar, "A Novel Perceptual Encryption Scheme Using Geometric Objects Based Kernel", International Journal of Computer Science & Information Technology (IJCSIT) Vol. 5, No. 4, pp. 165-173, August 2013.