Visual encryption by pixel property permutation

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data security is a challenging problem in the sphere of storage and transmission of data. With the development of heavy computational resources, various encryption algorithms are getting more prone to subsequent attacks or threats either via brute force, cipher attacks or statistical attacks, and side-channel attacks. Thus, for better security there is a need for more robust encryption of data especially unstructured data. This paper has tried to propose a novel image encryption technique known as Pixel Property Permutation (PPP) on the basis of Visual Cryptography. In this algorithm, any image RGB or greyscale is first converted to Black and White and compressed of (200 * 200) pixels. Although this is not mandatory, one can even use the RGB image however this guideline is assumed only for simplicity purposes. The pixel values of the image are extracted and stored. These pixel values are then permuted with one another using random permutations. Thus, the encrypted image is obtained. Now, using the encrypted image and the original image a key is generated (superimposing one on the other). The key and the encrypted image are both subjected to the 128-bit AES Encryption (Roeder, Symmetric-Key Cryptography, [1]). The decryption process is also very similar. The two AES encrypted images are decrypted using the same key obtained earlier. In the next step we use the decrypted AES image and the cipher key image to recover the original image by superimposing one on top of another. This process of PPP uses AES encryption algorithm as an added layer of defence which is not essentially necessary but encouraged, this technique is cost effective and can be used to secure highly sensitive data.

Cite

CITATION STYLE

APA

Surana, A., Ajmal, T., & Annapurani, K. (2018). Visual encryption by pixel property permutation. In Advances in Intelligent Systems and Computing (Vol. 758, pp. 685–697). Springer Verlag. https://doi.org/10.1007/978-981-13-0514-6_65

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free