Open Access   Article Go Back

Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS)

Madhuchhanda Dasgupta1 , J. K. Mandal2

Section:Review Paper, Product Type: Journal Paper
Volume-04 , Issue-06 , Page no. 65-70, Aug-2016

Online published on Sep 03, 2016

Copyright © Madhuchhanda Dasgupta , J. K. Mandal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Madhuchhanda Dasgupta , J. K. Mandal, “Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS),” International Journal of Computer Sciences and Engineering, Vol.04, Issue.06, pp.65-70, 2016.

MLA Style Citation: Madhuchhanda Dasgupta , J. K. Mandal "Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS)." International Journal of Computer Sciences and Engineering 04.06 (2016): 65-70.

APA Style Citation: Madhuchhanda Dasgupta , J. K. Mandal, (2016). Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS). International Journal of Computer Sciences and Engineering, 04(06), 65-70.

BibTex Style Citation:
@article{Dasgupta_2016,
author = {Madhuchhanda Dasgupta , J. K. Mandal},
title = {Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2016},
volume = {04},
Issue = {06},
month = {8},
year = {2016},
issn = {2347-2693},
pages = {65-70},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=124},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=124
TI - Bit-plane Oriented Image Encryption through Prime-Nonprime based Positional Substitution (BPIEPNPS)
T2 - International Journal of Computer Sciences and Engineering
AU - Madhuchhanda Dasgupta , J. K. Mandal
PY - 2016
DA - 2016/09/03
PB - IJCSE, Indore, INDIA
SP - 65-70
IS - 06
VL - 04
SN - 2347-2693
ER -

           

Abstract

In this paper a bit-plane based novel image encryption technique has been proposed using pixel shuffling based on characteristics of bit position within a pixel. The image is decomposed into eight binary bit-planes and all the bit-planes are scrambled using Recursive Positional Substitution based on Prime - Nonprime method. The performance of the algorithm is a discussed against common attacks like brute force attack, cipher related attacks and Differential attacks. Test through histogram analysis, correlation co-efficient analysis are provided in simulations and security analysis to shows enhanced performance of the proposed algorithm.

Key-Words / Index Term

Image Encryption; Bit-Plane Decomposition; Scrambling; Pixel Shuffling; Histogram Analysis

References

[1] Iyer K. C. and Subramanya A., "Image Encryption by Pixel property Separation", International Association for Cryptologic Research (IACR), 2009.
[2] National Institute of Standards and Technology, "Data Encryption Standard (DES)," http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf, 1999.
[3] National Institute of Standards and Technology, "Advanced Encryption Standard (AES)," http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf,2001.
[4] Zhou Yicong, Cao Weijia, Philip Chen C.L.," Image encryption using binary bitplane", ScienceDirect, Signal Processing, 197-207, www.elsevier.com/locate/sigpro. 2014,
[5] Zhou Yicong, "Image Encryption Algorithms Based on Generalized P-Gray Code Bit Plane Decomposition", Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, ISSN: 1058-6393, DOI: 10.1109/ACSSC.2009.5469840, IEEE.H,2009.
[6] Y. Zhou, K.Panetta, S.Agaian, C.L.P. Chen, "Image encryption using p-Fibonacci transform and decomposition", Opt. Commun. 285(5) , 594-608 2012.
[7] Kekre H.B., Sarode Tanuja, Halarnkar Pallavi, " Image Scrambling Using R-Prime Shuffle on Image and Image Blocks", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 2. ISSN(print): 2319-5940,February 2014.
[8] Mandal J. K. et al., "Adaptive Partial Image Encryption Technique based on Chaotic Map", Fourth International Conference of Emerging Applications of Information technology, 2014.
[9] Sun Qiudong, Yan Wenying, Huang Jiangwei, Ma Wenxin, " Image Encryption Based on Bit-plane Decomposition and Random Scrambling", 978-1-4577-1415-3/12, IEEE 2012.
[10] Mandal, J. K., Dutta, S. "Development & Analysis of a Ciphering Model through Recursive Positional Substitution based on Prime-Nonprime of Cluster", Association for the Advancement of Modeling and Simulation Techniques in Enterprises (AMSE, France), 2008.
[11] Zhou Yicong, Panetta Karen, Agaian Sos, "Image Encryption Using Binary Key-images", IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009.
[12] Wadi Salim Mushin, Zainal Nasharuddin, "Decomposition by binary codes-based speedy image encryption algorithm for multiple applications", IET Image Processing ( Volume:9, Issue: 5), DOI: 10.1049/iet-ipr.2014.0514, 2015.
[13] Singh Anurag, Dhanda Namrata, " DIP Using Image Encryption and XOR Operation Affine Transform", IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 17, Issue 2, 2015.
[14] Somaraj Shrija, Hussain Mohammed Ali, " Securing Medical Images by Image Encryption using Key Image", IJCA, Vol. 104 - No. 3, 2014.
[15] Gonzales R.C., Woods R.E., Digital Image Processing, 3rd edition, Pearson Prentice Hall.