American Journal of Mobile Systems, Applications and Services
Articles Information
American Journal of Mobile Systems, Applications and Services, Vol.1, No.1, Aug. 2015, Pub. Date: Jul. 15, 2015
Enhanced Encryption Algorithm Based on a Modified Confusion and Diffusion Scheme
Pages: 20-29 Views: 2540 Downloads: 1389
Authors
[01] Isiaka A. Alimi, Department of Electrical and Electronics Engineering, School of Engineering and Engineering Technology, Federal University of Technology, Akure, Nigeria.
[02] Oluyomi Aboderin, Department of Engineering and Space Systems, National Space Research and Development Agency, Abuja, Nigeria.
Abstract
There have been significant developments in computer networking which have result in high rate of internet and multimedia application usage. However, transmission of images and other relevant information over such network can be compromised if adequate security is not employed. Consequently, security is a technical challenge in transmission and storage of digital images. Therefore, image encryption has been noted to be an efficient means of securing digital images and various encryption methods have been proposed in the literature. One of such method is chaos based image encryption technique in which random sequence is employed. This technique is relatively an efficient means of achieving fast and reliable encryption. Nevertheless, it has limited precision which necessitate an improved scheme to be developed. This paper presents image encryption algorithm with improved precision, confidentiality and security that exploits the existing algorithms. The effectiveness of the algorithm is evaluated by comparing the plaintext and the decrypted text using MATLAB®. The simulation results show that, the proposed scheme is viable and offers a reasonable degree of security. Also, there is no loss in the quality of digital images during the process.
Keywords
Cryptography, Encryption, Decrypting, Key, Chaotic Map, Security
References
[01] M.P. Leong, S.Z.M. Naziri and S.Y.Perng, "Image Encryption Design Using FPGA," 2013 International Conference on Electrical, Electronics and System Engineering, pp. 27-32.
[02] M. Al-qdah and Lin Yi Hui, “Simple Encryption/Decryption Application,” International Journal of Computer Science and Security, vol. 1, issue 1, pp. 33-40, 2007.
[03] S. D. Sadananda, and A. Karkala, “Image Encryption and Decryption Using Image Gradient Technique,” International Journal of Emerging Technology and Advanced Engineering vol. 3, issue 1, pp. 511-515, 2013.
[04] V. Shokeen and N. Yadav, “Encryption and Decryption Technique for Message Communication,” International Journal of Electronics and Comm. Technology, vol. 2, Issue 2, pp. 80-83. 2011.
[05] Y. Zhang, W. Liu, S. Cao, Z. Zhai, X. Nie and W. Dai, "Digital Image Encryption Algorithm Based On Chaos And Improved DES," 2009 IEEE International Conf. on Systems, Man and Cybernetics, pp.474-479.
[06] R. Venkateswaran and V. Sundaram, “Information Security: Text Encryption and Decryption with Poly Substitution Method and Combining the Features of Cryptography,” International Journal of Computer Applications, vol. 3, no.7, pp. 28-31. 2010,
[07] M. Bin Younas and J. Ahmad, "Comparative Analysis of Chaotic and Non-Chaotic Image Encryption Schemes," 2014 International Conference on Emerging Technologies, pp. 81-86.
[08] A. P. Deshmukh and R. Qureshi, “Transparent Data Encryption- Solution for Security of Database Contents,” International Journal of Advanced Computer Science and Applications, vol. 2, no. 3, pp. 25-28, 2011.
[09] R. S.Jamgekar and G. S. Joshi, “File Encryption and Decryption using Secure RSA,” International Journal of Emerging Science and Engineering, vol. 1, Issue 4, pp. 11-14, 2013.
[10] A. S. Rajput, N. Mishra and S. Sharma, "Towards the Growth of Image Encryption and Authentication Schemes," 2013 Intern. Conf. on Advances in Computing, Communications and Informatics, pp. 454-459.
[11] N. Kumar, D. Wadhwa, D. Tomer and S. Vijayalakshmi, “Review on Different Chaotic Based Image Encryption Techniques,” Intern. Journal of Info. and Computation Tech. vol. 4, no. 2, pp. 197-206, 2014.
[12] R. B. Prajapati, “Tutorial Review on Image Hiding,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, issue 11, pp. 8362-8365, 2014.
[13] H. S. Kwok and W. K. S. Tang, “A Fast Image Encryption System Based on Chaotic Maps with Finite Precision Representation,” Elsevier, Chaos, Solitons and Fractals 32, pp.1518–1529, 2007.
[14] [S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, and A. Akhavand, “A Fast Chaotic Encryption Scheme Based on Piecewise Nonlinear Chaotic Maps,” Elsevier, Physics Letters A, pp. 391–396, 2007.
[15] X. Wu, Y. Xiong, "Adaptive Watermarking Algorithm Based on Chaotic Map," 2010 International Conference on Computer Application and System Modeling, vol. 6, pp. v6-477-v6-480.
600 ATLANTIC AVE, BOSTON,
MA 02210, USA
+001-6179630233
AIS is an academia-oriented and non-commercial institute aiming at providing users with a way to quickly and easily get the academic and scientific information.
Copyright © 2014 - American Institute of Science except certain content provided by third parties.