Journal ArticleDOI
A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage
D. Boopathy,M. Sundaresan +1 more
Reads0
Chats0
TLDR
The proposed multi-dimensional encryption technique design is using two phases to perform the encryption, and its two phases are image pixel shuffling phase and image pixel rearrange phase.Abstract:
Image encryption is one of the techniques which is used to maintain the image confidentiality. Trust is needed to be created and retained in the cloud between the service provider and the end user. The existing image encryption methods are using a map structure, Rubik cube method, DCT-based approach and s-box designs. The existing algorithms are mostly designed with the concept of offline image encryption. While coming to the online encryption, the image encryption algorithms needed to be redefined with a lightweight approach with an improved security level or same security level of existing algorithms. These things are taken into consideration in the proposed multi-dimensional encryption technique design. The proposed technique is using two phases to perform the encryption. The proposed technique’s two phases are image pixel shuffling phase and image pixel rearrange phase. The proposed technique is already tested successfully on the standard grayscale images, and the results were obtained and it satisfied the objectives. In this paper, the proposed technique was tested on the standard color images and the gained results. Those results have been used to analyze the performance and efficiency of proposed technique with the existing technique, by using different parameters which include PSNR, MSE, information entropy, coefficient correlation, NPCR and UPCI.read more
Citations
More filters
Journal ArticleDOI
Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD.
TL;DR: This paper introduces a new image encryption algorithm which uses binary bit-plane scrambling and an SPD diffusion technique for the bit-planes of a plain image, based on a card game trick, and proves the first-rate encryption performance of the proposed algorithm.
Journal ArticleDOI
Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform
TL;DR: A comprehensive complexity analysis of performance, security and robustness to attacks, confirmed the feasibility of the proposed image multi-encryption architecture.
Proceedings ArticleDOI
Secure Data Storage in Cloud using Encryption Algorithm
Pronika,S.S. Tyagi +1 more
TL;DR: In this paper, the authors have proposed using cryptographic algorithm to store data in secure manner on cloud and improve the security in cloud storage framework using different encryption algorithm like AES algorithm with S- box and Feistel Algorithm.
Journal ArticleDOI
3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA
TL;DR: Simulations and results show that the proposed 3C3R encryption algorithm is robust against all well-known attacks particularly for the known-plaintext attacks, statistical attacks, brute-force attacks, differential attacks, and occlusion attacks, etc.
References
More filters
Journal ArticleDOI
A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images
TL;DR: A new image encryption scheme which employs one of the three dynamic chaotic systems (Lorenz or Chen or LU chaotic system selected based on 16-byte key) to shuffle the position of the image pixels and uses another one the same three chaotic maps to confuse the relationship between the cipher image and the plain-image thereby significantly increasing the resistance to attacks.
Journal ArticleDOI
Image Encryption based on the RGB PIXEL Transposition and Shuffling
TL;DR: A cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values is developed, which ultimately makes it possible for encryption and decryption of the images based on theRGB pixel.
Proceedings ArticleDOI
Data encryption framework model with watermark security for Data Storage in public cloud model
Boopathy D,M. Sundaresan +1 more
TL;DR: This paper represents the encryption method for public cloud and also the cloud service provider's verification mechanism using the third party auditors with framework model.
Journal ArticleDOI
A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture
TL;DR: The security and performance of the proposed permutation-substitution image encryption scheme have been analyzed, including statisticalAnalysis, key sensitivity analysis, key space analysis, differential analysis, encryption rate analysis etc, and all the experimental results suggest that the proposed imageryption scheme is efficient and highly secure.
Journal ArticleDOI
Implementation of 128-bit AES algorithm in MATLAB
TL;DR: The implementation of AES in MATLAB is explored, a MATLAB code is developed for plaintext encryption and cipher text decryption, and results are superior to the similar software implementations of AES.