Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 12 , Issue 1 , PP: 30-40, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

An Improved Analysis of Secured Permutation and Substitution based Image Encryption

Vikas Goel 1 * , Amit Kumar Goyal 2

  • 1 Department of Information Technology, Kiet group of institutions, Ghaziabad, India - (vikas.goel@kiet.edu)
  • 2 Department of CA, Kiet group of institutions, Ghaziabad, India - (Amit.goyal@kiet.edu)
  • Doi: https://doi.org/10.54216/JCIM.120103

    Received: December 14, 2022 Revised: February 09, 2023 Accepted: April 27, 2023
    Abstract

    The transmission and storage of digital data raises serious security concerns as information technology evolves at a breakneck pace. To ensure the safety of the transferred data, security methods must be put in place. Encrypting an image is a method of protecting sensitive data by converting it into an unrecognizable format. The procedure includes access control, privacy, validation, and copyright protection. Cryptography, steganography, and watermarking are three distinct methods to prevent unauthorized access to digital data. Of these three methods, cryptography has emerged as one of the most important ways to ensure complete safety. Therefore, a secure and efficient cipher algorithm is required for trustworthy communication.  In this work, we offer a practical Secured Asymmetric Image Cipher (SAIC) Algorithm for encrypting images with a secret key of arbitrary length. At first, the KG algorithm creates two unique keys. Both the encryption and decryption processes require a key.  The experimental results reveal that the encrypted image lacks the original image's independence (NPCR > 99.89%, UACI > 36.89%). The suggested approach has a high encryption rate, can be implemented easily, and is computationally secure. The reproduced data validates the safety and practicability of the proposed architecture.

    Keywords :

    Image Encryption , SAIC , Permutation , Substitution , Secured Asymmetric Image Cipher

    References

    [1]. Abdurahman Kadir & Hong Jun Liu 2015, ‘Asymmetric color image encryption scheme using 2D discrete-time map’, Signal Processing, vol. 113, no. 1, pp. 104 - 112.

    [2]. Abitha, KA & Pradeep K Bharathan 2016, ‘Secure Communication Based On Rubik’s Cube Algorithm And Chaotic Baker Map’, International Conference on Emerging Trends in Engineering, Science and Technology, vol. 24, no. 1, pp. 782 - 789.

    [3]. Ayesha Kulsoom, Di Xiao Aqeel-ur-Rehman & Syed Ali Abbas 2016, ‘An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules’, Multimedia Tools and Applications, vol. 75, no. 4, pp. 1-23.

    [4]. Baiying Lei & Dong Ni 2014, ‘Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform’, Nonlinear Dynamics, vol. 78, no. 4, pp. 2897-2907.

    [5]. Isha Mehra & Naveen Nischal, K 2015, ‘Optical asymmetric image encryption using gyrator wavelet transform’, Optics Communications , vol. 354, no. 1, pp. 344-352.

    [6]. Iztok Fister & Aleksandra Tepeh 2016, ‘Epistatic arithmetic crossover based on Cartesian graph product in Ensemble differential evolution’, Elsevier, vol. 283, no. 1, pp. 181-194.

    [7]. Jalesh Kumar & Nirmala, S 2015, ‘Securing the Contents of Document Images using Knight Moves and Genetic Approach’, IEEE, vol. 62, no. 12, pp. 65-73.

    [8]. Jalesh, K & Nirmala, S 2016, ‘A novel and efficient method based on knight moves for securing the information contents of images a parallel approach’, Journal of Information Security and Applications, vol. 30, no. 18, pp. 105-117.

    [9]. Kamil Dworak & Michal Kawulok 2016, ‘Cryptanalysis of SDES Using Genetic and Memetic Algorithms’, Springer, vol. 642, no. 1, pp. 3-14.

    [10]. Kekre & Tanuja Sarode, HB 2015, ‘Partial Image Scrambling Using Walsh Sequency in Sinusoidal Wavelet Transform Domain’, Springer, Intelligent Systems Technologies and Applications, vol. 384, no. 2, pp. 471-484.

    [11]. Kunal Kumar Kabi & Arun Chauhan 2015, ‘Implementation of New Framework for Image Encryption Using Arnold 3D Cat Map’, Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing, vol. 339, no. 1, pp. 379-384.

    [12]. Narendra K Pareek & Vinod Patidar 2016, ‘Medical image protection using genetic algorithm’, Soft computing, Springer, vol. 20, no. 2, pp. 763-772.

    [13]. Oh, JY, Yang, DI & Chon, KH 2010, ‘A selective encryption algorithm based on AES for medical information’, Health Informatics Research, vol. 1, no.5, pp. 22-29.

    [14]. Pareek, NK & Patidar, V 2016, ‘Medical image protection using genetic algorithm’, Soft Computing, vol. 20, no. 2, pp. 763–772. 68. Pareek, NK, Patidar, V & Sud, KK 2013, ‘Diffusion–substitution based gray image encryption’, Digital Signal Processing, Elsevier, vol. 23, no. 3, pp. 894-901.

    [15]. Saranya, MR & Arun Mohan, K 2015, ‘Algorithm for Enhanced Image Security DNA and Genetic Algorithm’, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, vol. 70, no. 1, pp. 1-7.

    [16]. Saranya, MR & Mohan, AK 2015, ‘Algorithm for enhanced image security DNA and genetic algorithm’, IEEE, vol. 26, no. 1, pp. 523-530.

    [17]. Sengul Dogan 2016, ‘A new data hiding method based on chaos embedded genetic algorithm for color image’, Springer, vol. 46, no. 1, pp. 129 - 143.

    [18]. Shihua Zhou & Ziqi Wei 2016, ‘An encryption method based on the new secret key algorithm for color image’, International Journal of Electronics and Communications, vol. 70, no. 1, pp. 1-7.

    [19]. Teng, L, Wang, X & Wang, X 2013, ‘Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme’, International Journal of Electronics and Communication, vol. 67, no. 6, pp. 540-547.

    [20]. Ting Hu, Ye Liu, Li-Hua Gong, Shao-Feng Guo & Hong-Mei Yuan 2017, ‘Chaotic image cryptosystem using DNA deletion and DNA insertion’, Signal Processing, vol. 134, no. 1, pp. 234-243.

    [21]. Tang, Z 2016, ‘Multiple- image encryption with bit-plane decomposition and chaotic maps’, Optics and Lasers in Engineering, vol. 80, no. 2, pp. 1-11.

    [22]. Tao Xiang, Jia Hu & Jianglin Sun 2015, ‘Outsourcing chaotic selective image encryption to the cloud with steganography’, Digital Signal Processing, vol. 43, no. 4, pp. 28-37.

    [23]. Wang, B, Xie, Y & Zhou, C 2016, ‘Evaluating the permutation and on operation used in image encryption based on chaotic maps’, Optik - International Journal for Light and Electron Optics, vol. 127, no. 7, pp. 3541-3545.

    [24]. Wang, GG, Deb, S & Zhao, X 2018, ‘A new monarch butterfly optimization with an improved crossover operator’, Springer, Operational Research, vol. 18, no. 3, pp. 731-755.

    [25]. Wang, X & He, G 2011, ‘Cryptanalysis on a novel image encryption method based on total shuffling scheme’, Optical Communication, vol. 284, no. 24, pp. 5804-5807.

    [26]. Zhao, X, Lin, Q, Chen, J, Wang, X, Yu, J & Ming, Z 2016, ‘Optimizing security and quality of service in a real-time database system using multi-objective genetic algorithm’, Expert Systems with Applications, vol. 64, no. 1, pp. 11 - 23.

    [27]. Shalini Stalin, Vandana Roy, Prashant Kumar Shukla, Atef Zaguia, Mohammad Monirujjaman Khan, Piyush Kumar Shukla, Anurag Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach", Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. https://doi.org/10.1155/2021/2942808.

    [28]. Zhengjun Liu & Min Gong 2012, ‘Double image encryption by using Arnold transform and discrete fractional angular transform’, Optics and Lasers in Engineering, vol. 50, no. 2, pp. 248-255.

    [29]. Sui, L.S.; Lu, H.W.; Wang, Z.M.; Sun, Q.D. Double-image encryption using discrete fractional random transform and logistic maps. Opt. Laser Eng. 2014, 56, 1–12.

    [30]. Lang, J.; Fu, X.X.; Guo, P. Optical color image asymmetric compressed encryption in fractional Fourier transform domain. Opto-Electron. Eng. 2018, 45, 170732.

    Cite This Article As :
    Goel, Vikas. , Kumar, Amit. An Improved Analysis of Secured Permutation and Substitution based Image Encryption. Journal of Cybersecurity and Information Management, vol. , no. , 2023, pp. 30-40. DOI: https://doi.org/10.54216/JCIM.120103
    Goel, V. Kumar, A. (2023). An Improved Analysis of Secured Permutation and Substitution based Image Encryption. Journal of Cybersecurity and Information Management, (), 30-40. DOI: https://doi.org/10.54216/JCIM.120103
    Goel, Vikas. Kumar, Amit. An Improved Analysis of Secured Permutation and Substitution based Image Encryption. Journal of Cybersecurity and Information Management , no. (2023): 30-40. DOI: https://doi.org/10.54216/JCIM.120103
    Goel, V. , Kumar, A. (2023) . An Improved Analysis of Secured Permutation and Substitution based Image Encryption. Journal of Cybersecurity and Information Management , () , 30-40 . DOI: https://doi.org/10.54216/JCIM.120103
    Goel V. , Kumar A. [2023]. An Improved Analysis of Secured Permutation and Substitution based Image Encryption. Journal of Cybersecurity and Information Management. (): 30-40. DOI: https://doi.org/10.54216/JCIM.120103
    Goel, V. Kumar, A. "An Improved Analysis of Secured Permutation and Substitution based Image Encryption," Journal of Cybersecurity and Information Management, vol. , no. , pp. 30-40, 2023. DOI: https://doi.org/10.54216/JCIM.120103