Enhanced Image Encryption Technique: A Hybrid Approach using Scrambling and Genetic Encryption

  • Shivam Sharma B.Tech., SASTRA University

Abstract

Traditional image encryption methods often suffer from security vulnerabilities, image quality degradation, diffusion issues, low latency, poor key sensitivity, and significant correlation. In response, this study proposes an advanced image encryption technique based on a combination of scrambling and discrete wavelet transform. The scrambling process alters the pixel locations without changing their values, preserving statistical properties. The proposed hybrid encryption method incorporates genetic encryption to enhance both image security and quality. The developed approach undergoes rigorous testing against brute force and equivalent key attacks, demonstrating statistical effectiveness, robust performance, and key sensitivity advantages. The results indicate that the hybrid approach meets the criteria for photo security and real-time performance.

References

1. Shin CM, Seo DH, Cho KB, Lee HW, Kim SJ. Multilevel image encryption by binary phase XOR operations. InCLEO/Pacific Rim 2003. The 5th Pacific Rim Conference on Lasers and Electro-Optics (IEEE Cat. No. 03TH8671) 2003 Dec 15 (Vol. 2, pp. 426-vol). IEEE.
2. Zhang MR, Shao GC, Yi KC. T-matrix and its applications in image processing. Electronics Letters. 2004 Dec 9;40(25):1.
3. Ying W, DeLing Z, Lei J, Yaoguang W. The spatial-domain encryption of digital images based on high-dimension chaotic system. InIEEE Conference on Cybernetics and Intelligent Systems, 2004. 2004 Dec 1 (Vol. 2, pp. 1172-1176). IEEE.
4. Gu G, Han G. An enhanced chaos based image encryption algorithm. InFirst International Conference on Innovative Computing, Information and Control-Volume I (ICICIC'06) 2006 Aug 30 (Vol. 1, pp. 492-495). IEEE.
5. Pareek NK, Patidar V, Sud KK. Image encryption using chaotic logistic map. Image and vision computing. 2006 Sep 1;24(9):926-34.
6. Panigrahy SK, Acharya B, Jena D. Image encryption using self-invertible key matrix of hill cipher algorithm.
7. El Assad S, Farajallah M. A new chaos-based image encryption system. Signal Processing: Image Communication. 2016 Feb 1;41:144-57.
8. El Assad S, Farajallah M. A new chaos-based image encryption system. Signal Processing: Image Communication. 2016 Feb 1;41:144-57.
9. Chang CC, Hwang MS, Chen TS. A new encryption algorithm for image cryptosystems. Journal of Systems and Software. 2001 Sep 1;58(2):83-91.
10. Dey S, Ghosh R. A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes. Cryptology ePrint Archive. 2018.
11. Farwa S, Shah T, Muhammad N, Bibi N, Jahangir A, Arshad S. An image encryption technique based on chaotic S-box and Arnold transform. International Journal of Advanced Computer Science and Applications. 2017;8(6).
12. Fu C, Wen ZK, Zhu ZL, Yu H. A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system. International Journal of Computational Science and Engineering. 2016;12(2-3):113-23.
13. Hariyanto E, Rahim R. Arnold’s cat map algorithm in digital image encryption. International Journal of Science and Research (IJSR). 2016 Oct;5(10):1363-5.
14. Huang LC, Hwang MS, Tseng LY. Reversible data hiding for medical images in cloud computing environments based on chaotic Henon map. Journal of Electronic Science and Technology. 2013 Jun 25;11(2):230-6.
15. Liu J, Yin S, Li H, Teng L. A Density-based Clustering Method for K-anonymity Privacy Protection. J. Inf. Hiding Multim. Signal Process.. 2017 Jan;8(1):12-8.
16. Liu L, Cao Z. Analysis of two confidentialitypreserving image search schemes based on additive homomorphic encryption. International Journal of Electronics and Information Engineering. 2016 Sep 1;5(1):1-5.
17. McCarthy S, Smyth N, O’Sullivan E. A practical implementation of identity-based encryption over NTRU lattices. InCryptography and Coding: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings 16 2017 (pp. 227-246). Springer International Publishing.
18. Rajendran S, Doraipandian M. Chaotic map based random image steganography using lsb technique. Int. J. Netw. Secur.. 2017 Jul 1;19(4):593-8.
19. Sharma H, Khatri N. An image encryption scheme using chaotic sequence for pixel scrambling and DFrFT. InProceedings of First International Conference on Smart System, Innovations and Computing: SSIC 2017, Jaipur, India 2018 (pp. 487-493). Springer Singapore.
20. Su X, Li W, Hu H. Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools and Applications. 2017 Jun;76:14021-33.
21. Li H, Li H, Wei K, Yin S, Zhao C. A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment. J. Inf. Hiding Multim. Signal Process.. 2017 Mar;8(2):413-22.
22. Teng L, Li H, Liu J, Yin S. An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method. Int. J. Netw. Secur.. 2018 Sep 1;20(5):872-8.
23. Wu J, Liao X, Yang B. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Processing. 2017 Dec 1;141:109-24.
24. Yin S, Liu J, Teng L. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption. Int. J. Netw. Secur.. 2020 May 1;22(3):419-24.
25. Ye G, Huang X. An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing. 2017 Aug 16;251:45-53.
26. Yin S, Liu J. A K-means Approach for Map-Reduce Model and Social Network Privacy Protection. J. Inf. Hiding Multim. Signal Process.. 2016 Nov;7(6):1215-21.
27. Zhang Q, Yang LT, Liu X, Chen Z, Li P. A tucker deep computation model for mobile multimedia feature learning. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM). 2017 Aug 10;13(3s):1-8.
Published
2023-11-30
How to Cite
SHARMA, Shivam. Enhanced Image Encryption Technique: A Hybrid Approach using Scrambling and Genetic Encryption. Journal of Advanced Research in Image Processing and Applications, [S.l.], v. 6, n. 2, p. 5-10, nov. 2023. Available at: <http://thejournalshouse.com/index.php/image-pocessing-applications/article/view/961>. Date accessed: 03 may 2024.