In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and large-sized key represents the main factors that give the encryption system the required strength and give encrypted data more protection. This paper presents a non-traditional encryption algorithm that uses a large key size (256 bytes) 2048 bits, to achieve a high degree of protection for the image. First, the algorithm represents the source image as a set of two-dimensional blocks of size bytes and the secret key as a two-dimensional block of size bytes. Second, transposition and substitution operations are implemented within each block of the image based on the extracted map of overlapped paths from the secret key block. Successive different keys are generated by using another way of implementation of the substitution and transposition operations in the secret key block. The recorded performance results, from the evaluation tests, have been compared with some well-known encryption algorithms and they proved that the proposed algorithm can be used effectively to protect images.
Mots-clés : Hexadecimal, XOR, transposition, substitution, information security
@article{ITA_2016__50_3_241_0, author = {Fadhil Al-Husainy, Mohammed A.}, title = {A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key}, journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications}, pages = {241--249}, publisher = {EDP-Sciences}, volume = {50}, number = {3}, year = {2016}, doi = {10.1051/ita/2016023}, mrnumber = {3582640}, zbl = {1401.68066}, language = {en}, url = {http://www.numdam.org/articles/10.1051/ita/2016023/} }
TY - JOUR AU - Fadhil Al-Husainy, Mohammed A. TI - A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key JO - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications PY - 2016 SP - 241 EP - 249 VL - 50 IS - 3 PB - EDP-Sciences UR - http://www.numdam.org/articles/10.1051/ita/2016023/ DO - 10.1051/ita/2016023 LA - en ID - ITA_2016__50_3_241_0 ER -
%0 Journal Article %A Fadhil Al-Husainy, Mohammed A. %T A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key %J RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications %D 2016 %P 241-249 %V 50 %N 3 %I EDP-Sciences %U http://www.numdam.org/articles/10.1051/ita/2016023/ %R 10.1051/ita/2016023 %G en %F ITA_2016__50_3_241_0
Fadhil Al-Husainy, Mohammed A. A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 50 (2016) no. 3, pp. 241-249. doi : 10.1051/ita/2016023. http://www.numdam.org/articles/10.1051/ita/2016023/
A Novel Algorithm for Image Encryption by Integrated Pixel Scrambling Plus Diffusion [IISPD] Utilizing Duo Chaos Mapping Applicability in Wireless Systems. Procedia Comput. Sci. 3 (2011) 378–387. | DOI
, and ,Rapid Encryption Method Based on AES Algorithm for Grey Scale HD Image Encryption. Procedia Tech. 11 (2013) 51–56. | DOI
and ,Securing Color Information of an Image by Concealing the Color Palette. J. Syst. Softw. 86 (2013) 809–825. | DOI
, and ,Image Encryption and Decryption Using Selective Block Encryption Technique. Int. J. Comput. Sci. Eng. Tech. (IJCSET) 5 (2014) 941–946.
, and ,A Novel Encryption Method for Image Security. Int. J. Secur. Appl. 6 (2012) 1–8.
,Optimized Hybrid Security Mechanism for Image Authentication and Security using PSO. Int. J. Netw. Secur. Appl. (IJNSA) 5 (2013) 115–128.
and ,A Novel Image Encryption Approach using Matrix Reordering. WSEAS Trans. Comput. 12 (2013) 407–417.
and ,A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy 17 (2015) 6954–6968. | DOI | MR
and ,A Secure Symmetric Image Encryption Based on Bit-wise Operation. Int. J. Image Graph. Signal Process. 6 (2014) 30–38. | DOI
and ,Novel Image Encryption based on Quantum Walks. Scientific Rep. 5 (2015) 7784. | DOI
, , and ,Cité par Sources :