Skip to main content

A Color Image Encryption Technique Based on a Substitution-Permutation Network

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 193))

Abstract

In this paper we have proposed and tested an image encryption technique consisting of matrix transformation, pixel diffusion and a permutation box. Since the matrix transformation, which produces both confusion and diffusion, is linear, the pixel diffusion and permutation have been introduced so as to make the technique nonlinear. This technique is specifically designed for sensitive fields like medicine where misinterpretation could result in loss of life. One apt application of this technique is its use in PACS for secure storage and transfer of medical images. The uniqueness of our technique is that it is ciphertext sensitive so that decryption doesn’t yield a recognizable image in case there is an error during transmission. The proposed technique gives good parametric and sensitivity results proving itself an eligible candidate for image encryption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sathish Kumar, G.A., Bhoopathy Bagan, K., Vivekanand, V.: A novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems. Procedia Computer Science 3, 378–387 (2011)

    Article  Google Scholar 

  2. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic Baker Maps. International Journal of Bifurcation and Chaos 14(10), 3613–3624 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. MU, X-C., SONG, E.-N.: A new color Image Encryption Algorithm Based on 3D Lorenz Chaos Sequences. In: First international Conference on Pervasive Computer, Signal Processing and Application, pp. 269–272 (2010)

    Google Scholar 

  4. Liu, S., Sun, J., Xu, Z.: An improved image encryption algorithm based on chaotic system. Journal of computers 4(11) (2009)

    Google Scholar 

  5. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8, 1259–1284 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  6. Socet,D., Magliveras, S.S.,Furht, B.: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 406–407 (2005)

    Google Scholar 

  7. Usman, K., Juzoji, H., Nakajimal, I., Soegidjoko, Ramdhani, M., Hori, T., Igi, S.: Medical image encryption based on pixel arrangement and random permutation for transmission security. In: 9th International Conference on e-Health Networking, Application and Services, pp. 244–247 (2007)

    Google Scholar 

  8. Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.-T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication 23(3), 212–223 (2008)

    Google Scholar 

  9. Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Techn. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  10. http://www.healthcareitnews.com/news/hhs-cracks-down-provider-pay-100000-hipaa-penalties-over-lost-laptops

  11. J. Mohamedmoideen Kader Mastan, Sathishkumar, G.A., Bagan, K.B.: Digital Image Security using Matrix and Non-Linear Pixel Transformation. In: International Conference on Computer, Communication, and Electrical Technology, vol. 1 (2011)

    Google Scholar 

  12. Hill, L.S.: Cryptography in an Algebraic Alphabet. The American Mathematical Monthly 36(6), 306–312 (1929)

    Article  MathSciNet  MATH  Google Scholar 

  13. Overbey, J., Traves, W., Wojdylo, J.: On the keyspace of the hill cipher. Cryptologia 29(1), 59–72 (2005)

    Article  MATH  Google Scholar 

  14. Forouzan, B.A.: Cryptography & Network Security. Tata McGraw-Hill, New York (2009) ISBN-13: 978-0-07-066046-5

    Google Scholar 

  15. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, NY (1995)

    MATH  Google Scholar 

  16. Buchholz, J.J.: Matlab Implementation of the Advanced Encryption Standard (2001), http://buchholz.hs-bremen.de/aes/aes.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mastan, J.M.K., Sathishkumar, G.A., Bagan, K.B. (2011). A Color Image Encryption Technique Based on a Substitution-Permutation Network. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22726-4_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22726-4_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22725-7

  • Online ISBN: 978-3-642-22726-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics