A value transformation and random permutation-based coloured image encryption technique
by Mahmood Al-Khassaweneh; Shefa Tawalbeh
International Journal of Information and Computer Security (IJICS), Vol. 5, No. 4, 2013

Abstract: With the recent advances in multimedia transmission and storage, security becomes an important issue to protect data from unauthorised access. There are several methods proposed to secure data including watermarking, encryption, steganography and others. Image encryption, which is widely used in many applications to provide high levels of security such as internet communication, multimedia systems and medical imaging, is proposed in this paper. The proposed encryption method is based on value transformation in which the image pixels are transformed to new values and random permutations in which the rows and the columns of the image are shuffled. The value transformation step is applied on pixels values through performing logical AND operation between their values and specific value in order to get new transformed image with new pixels values unrelated to the original pixels. Moreover, the random permutation step is applied to the columns and rows of the transformed image. In this step the rows and the columns are shuffled respectively using random permutation key to produce the encrypted image. The same generated key is used to shuffle both the rows and the columns of the image. The simulation results show the effectiveness and the security of the proposed method.

Online publication date: Tue, 10-Dec-2013

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?

Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com