Abstract
In this paper we have proposed and tested an image encryption technique consisting of matrix transformation, pixel diffusion and a permutation box. Since the matrix transformation, which produces both confusion and diffusion, is linear, the pixel diffusion and permutation have been introduced so as to make the technique nonlinear. This technique is specifically designed for sensitive fields like medicine where misinterpretation could result in loss of life. One apt application of this technique is its use in PACS for secure storage and transfer of medical images. The uniqueness of our technique is that it is ciphertext sensitive so that decryption doesn’t yield a recognizable image in case there is an error during transmission. The proposed technique gives good parametric and sensitivity results proving itself an eligible candidate for image encryption.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Sathish Kumar, G.A., Bhoopathy Bagan, K., Vivekanand, V.: A novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems. Procedia Computer Science 3, 378–387 (2011)
Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic Baker Maps. International Journal of Bifurcation and Chaos 14(10), 3613–3624 (2004)
MU, X-C., SONG, E.-N.: A new color Image Encryption Algorithm Based on 3D Lorenz Chaos Sequences. In: First international Conference on Pervasive Computer, Signal Processing and Application, pp. 269–272 (2010)
Liu, S., Sun, J., Xu, Z.: An improved image encryption algorithm based on chaotic system. Journal of computers 4(11) (2009)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8, 1259–1284 (1997)
Socet,D., Magliveras, S.S.,Furht, B.: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 406–407 (2005)
Usman, K., Juzoji, H., Nakajimal, I., Soegidjoko, Ramdhani, M., Hori, T., Igi, S.: Medical image encryption based on pixel arrangement and random permutation for transmission security. In: 9th International Conference on e-Health Networking, Application and Services, pp. 244–247 (2007)
Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.-T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication 23(3), 212–223 (2008)
Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Techn. J. 28, 656–715 (1949)
J. Mohamedmoideen Kader Mastan, Sathishkumar, G.A., Bagan, K.B.: Digital Image Security using Matrix and Non-Linear Pixel Transformation. In: International Conference on Computer, Communication, and Electrical Technology, vol. 1 (2011)
Hill, L.S.: Cryptography in an Algebraic Alphabet. The American Mathematical Monthly 36(6), 306–312 (1929)
Overbey, J., Traves, W., Wojdylo, J.: On the keyspace of the hill cipher. Cryptologia 29(1), 59–72 (2005)
Forouzan, B.A.: Cryptography & Network Security. Tata McGraw-Hill, New York (2009) ISBN-13: 978-0-07-066046-5
Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, NY (1995)
Buchholz, J.J.: Matlab Implementation of the Advanced Encryption Standard (2001), http://buchholz.hs-bremen.de/aes/aes.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mastan, J.M.K., Sathishkumar, G.A., Bagan, K.B. (2011). A Color Image Encryption Technique Based on a Substitution-Permutation Network. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22726-4_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-22726-4_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22725-7
Online ISBN: 978-3-642-22726-4
eBook Packages: Computer ScienceComputer Science (R0)