Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 22
Page No. 4635 - 4647

A New Image Encryption Method Using Scan Pattern and Random Key Stream

Authors : T. Sivakuma and T. Anusha

References

Aggarwal, C.C., 2011. Social Network Data Analytics. Springer, Berlin, Germany, ISBN: 978-1-4419-8461-6, Pages: 501.

Alexopoulos, C., N.G. Bourbakis and N. Ioannou, 1995. Image encryption method using a class of fractals. J. Electron. Imaging, 4: 251-259.
CrossRef  |  Direct Link  |  

Arroyo, D., C. Li, S. Li, G. Alvarez and W.A. Halang, 2009. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons Fractals, 41: 2613-2616.
Direct Link  |  

Bourbakis, N. and C. Alexopoulos, 1992. Picture data encryption using SCAN patterns. Pattern Recognition, 25: 567-581.
Direct Link  |  

Bouslimi, D., G. Coatrieux, M. Cozic and C. Roux, 2012. A joint encryption-watermarking system for verifying the reliability of medical images. IEEE. Trans. Inf. Technol. Biomed., 16: 891-899.
CrossRef  |  Direct Link  |  

Chang, C.C., M.S. Hwang and T.S. Chen, 2001. A new encryption algorithm for image cryptosystems. J. Syst. Software, 58: 83-91.
Direct Link  |  

Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. A hash-based image encryption algorithm. Opt. Commun., 283: 879-893.
CrossRef  |  Direct Link  |  

Chen, G., Y. Mao and C.K. Chui, 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals, 21: 749-761.
CrossRef  |  

Francois, M., T. Grosges, D. Barchiesi and R. Erra, 2012. A new image encryption scheme based on a chaotic function. Signal Process. Image Commun., 27: 249-259.
Direct Link  |  

Fu, C., B.B. Lin, Y.S. Miao, X. Liu and J.J. Chen, 2011. A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Commun., 284: 5415-5423.
CrossRef  |  Direct Link  |  

Hu, H., L. Liu and N. Ding, 2013. Pseudorandom sequence generator based on the Chen chaotic system. Comput. Phys. Commun., 184: 765-768.
Direct Link  |  

Huang, C.K., C.W. Liao, S.L. Hsu and Y.C. Jeng, 2013. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst., 52: 563-571.
CrossRef  |  

Jawad, A. and A. Fawad, 2013. Efficiency analysis and security evaluation of image encryption schemes. Int. J. Video Image Process. Network Secur., 12: 18-31.

Loukhaoukha, K., J.Y. Chouinard and A. Berdai, 2012. A secure image encryption algorithm based on Rubik's cube principle. J. Electr. Comput. Eng. 10.1155/2012/173931

Mahmood, A.B. and R.D. Dony, 2011. Segmentation based encryption method for medical images. Proceedings of the2011 International Conference on Internet Technology and Secured Transactions (ICITST), December 11-14, 2011, IEEE, New York, USA., ISBN: 978-1-4577-0884-8, pp: 596-601.

Maniccam, S.S. and N.G. Bourbakis, 2001. Lossless image compression and encryption using SCAN. Pattern Recognit., 34: 1229-1245.
Direct Link  |  

Maniccam, S.S. and N.G. Bourbakis, 2004. Image and video encryption using SCAN patterns. Pattern Recognit., 37: 725-737.
CrossRef  |  

Menezes, A.J., P.C.V. Oorschot and S.A. Vanstone, 2010. Handbook of Applied Cryptography. CRC Press, New York, USA.,.

Ozkaynak, F., A.B. Ozer and S. Yavuz, 2012. Cryptanalysis of Bigdeli algorithm using Cokal's attack. Int. J. Inf. Security Sci., 1: 79-81.
Direct Link  |  

Pandey, U., M. Manoria and J. Jain, 2012. A novel approach for image encryption by new M box encryption algorithm using block based transformation along with shuffle operation. Int. J. Comput. Appl., 42: 9-15.

Panduranga, H.T. and S.K.N. Kumar, 2010. Hybrid approach for image encryption using SCAN patterns and Carrier Images. Int. J. Comput. Sci. Eng., 2: 297-300.
Direct Link  |  

Patidar, V., N.K. Pareek, G. Purohit and K.K. Sud, 2011. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun., 284: 4331-4339.
CrossRef  |  

Saraswathi, P.V. and M. Venkatesulu, 2012. A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal. J. Comput. Sci., 8: 1541-1546.
Direct Link  |  

Sathishkumar, G.A. and K.B. Bagan, 2011. A novel image encryption algorithm using pixel shuffling and base 64 encoding based chaotic block cipher (IMPSBEC). WSEAS. Trans. Comput., 10: 169-178.
Direct Link  |  

Sathishkumar, G.A., K.B. Bagan and N. Sriraam, 2011. Image encryption based on diffusion and multiple chaotic maps. Int. J. Network Secur. Applic., 3: 181-194.
CrossRef  |  Direct Link  |  

Sathyanarayana, S.V., M.A. Kumar and K.H. Bhat, 2011. Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points. Int. J. Network Secur., 12: 137-150.
Direct Link  |  

Seyedzade, S.M., S. Mirzakuchaki and R.E. Atani, 2010. A novel image encryption algorithm based on hash function. Proceedings of the 6th Iranian Machine Vision and Image Processing, October 27-28, 2010, Isfahan, Iran, pp: 1-6.

Shannon, C.E., 1949. Communication theory of secrecy systems. Bell Syst. Tech. J., 28: 656-715.
CrossRef  |  Direct Link  |  

Stallings, W., 2013. Cryptography and Network Security-Principles and Practice. 5th Edn., Pearson Education, New Delhi, India,.

Usman, K., H. Juzoji, I. Nakajima, S. Soegidjoko and M. Ramdhani et al., 2007. Medical image encryption based on pixel arrangement and random permutation for transmission security. Proceedings of the 2007 9th International Conference on E-Health Networking Application and Services, June 19-22, 2007, IEEE, New York, USA., pp: 244-247.

Ye, R., 2011. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Commun., 284: 5290-5298.
Direct Link  |  

Zare, M.R., A. Mueen and W.C. Seng, 2013. Automatic classification of medical X-ray images using a bag of visual words. IET Comput. Vision, 7: 105-114.
CrossRef  |  

Zhao, L., A. Adhikari, D. Xiao and K. Sakurai, 2012. On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption. Commun. Nonlinear Sci. Numer. Simul., 17: 3303-3327.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved