scispace - formally typeset
Journal ArticleDOI

A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage

Reads0
Chats0
TLDR
The proposed multi-dimensional encryption technique design is using two phases to perform the encryption, and its two phases are image pixel shuffling phase and image pixel rearrange phase.
Abstract
Image encryption is one of the techniques which is used to maintain the image confidentiality. Trust is needed to be created and retained in the cloud between the service provider and the end user. The existing image encryption methods are using a map structure, Rubik cube method, DCT-based approach and s-box designs. The existing algorithms are mostly designed with the concept of offline image encryption. While coming to the online encryption, the image encryption algorithms needed to be redefined with a lightweight approach with an improved security level or same security level of existing algorithms. These things are taken into consideration in the proposed multi-dimensional encryption technique design. The proposed technique is using two phases to perform the encryption. The proposed technique’s two phases are image pixel shuffling phase and image pixel rearrange phase. The proposed technique is already tested successfully on the standard grayscale images, and the results were obtained and it satisfied the objectives. In this paper, the proposed technique was tested on the standard color images and the gained results. Those results have been used to analyze the performance and efficiency of proposed technique with the existing technique, by using different parameters which include PSNR, MSE, information entropy, coefficient correlation, NPCR and UPCI.

read more

Citations
More filters
Journal ArticleDOI

Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD.

TL;DR: This paper introduces a new image encryption algorithm which uses binary bit-plane scrambling and an SPD diffusion technique for the bit-planes of a plain image, based on a card game trick, and proves the first-rate encryption performance of the proposed algorithm.
Journal ArticleDOI

Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform

TL;DR: A comprehensive complexity analysis of performance, security and robustness to attacks, confirmed the feasibility of the proposed image multi-encryption architecture.
Proceedings ArticleDOI

Secure Data Storage in Cloud using Encryption Algorithm

TL;DR: In this paper, the authors have proposed using cryptographic algorithm to store data in secure manner on cloud and improve the security in cloud storage framework using different encryption algorithm like AES algorithm with S- box and Feistel Algorithm.
Journal ArticleDOI

3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA

TL;DR: Simulations and results show that the proposed 3C3R encryption algorithm is robust against all well-known attacks particularly for the known-plaintext attacks, statistical attacks, brute-force attacks, differential attacks, and occlusion attacks, etc.
References
More filters
Journal ArticleDOI

A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images

TL;DR: A new image encryption scheme which employs one of the three dynamic chaotic systems (Lorenz or Chen or LU chaotic system selected based on 16-byte key) to shuffle the position of the image pixels and uses another one the same three chaotic maps to confuse the relationship between the cipher image and the plain-image thereby significantly increasing the resistance to attacks.
Journal ArticleDOI

Image Encryption based on the RGB PIXEL Transposition and Shuffling

TL;DR: A cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values is developed, which ultimately makes it possible for encryption and decryption of the images based on theRGB pixel.
Proceedings ArticleDOI

Data encryption framework model with watermark security for Data Storage in public cloud model

TL;DR: This paper represents the encryption method for public cloud and also the cloud service provider's verification mechanism using the third party auditors with framework model.
Journal ArticleDOI

A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture

TL;DR: The security and performance of the proposed permutation-substitution image encryption scheme have been analyzed, including statisticalAnalysis, key sensitivity analysis, key space analysis, differential analysis, encryption rate analysis etc, and all the experimental results suggest that the proposed imageryption scheme is efficient and highly secure.
Journal ArticleDOI

Implementation of 128-bit AES algorithm in MATLAB

TL;DR: The implementation of AES in MATLAB is explored, a MATLAB code is developed for plaintext encryption and cipher text decryption, and results are superior to the similar software implementations of AES.
Related Papers (5)