Image encryption using a synchronous permutation-diffusion technique |
| |
Institution: | 1. Department of Computer Engineering, Firoozkooh Branch, Islamic Azad University, Firoozkooh, Iran;2. Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Malaysia;3. College of Applied Studies and Community Services, King Saud University (KSU), Riyadh 12372, Saudi Arabia;4. The Research Center for Advanced Image and Information Technology, School of Electronics and Information Engineering, ChonBuk National University, JeonJu, ChonBuk 561-756, Republic of Korea;1. College of Computer and Information Engineering, Henan Normal University, Xinxiang, 453007, China;2. Shangqiu Polytechnic, Shangqiu, 476000, China;3. China National Digital Switching System Engineering and Technological R&D Center, Zhengzhou, 450002, China;4. School of Automation Science and Electrical Engineering, Beihang University, Beijing, 100191, China;1. School of Computer Sciences, Universiti Sains Malaysia, 11800 USM, Penang, Malaysia;2. Department of Physics, Urmia Branch, Islamic Azad University, Urmia, Iran;1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;2. City Institute, Dalian University of Technology, Dalian 116600, China;1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;2. City Institute, Dalian University of Technology, Dalian 116600, China |
| |
Abstract: | In the past decade, the interest on digital images security has been increased among scientists. A synchronous permutation and diffusion technique is designed in order to protect gray-level image content while sending it through internet. To implement the proposed method, two-dimensional plain-image is converted to one dimension. Afterward, in order to reduce the sending process time, permutation and diffusion steps for any pixel are performed in the same time. The permutation step uses chaotic map and deoxyribonucleic acid (DNA) to permute a pixel, while diffusion employs DNA sequence and DNA operator to encrypt the pixel. Experimental results and extensive security analyses have been conducted to demonstrate the feasibility and validity of this proposed image encryption method. |
| |
Keywords: | Image encryption DNA sequence Permutation Diffusion Chaotic map |
本文献已被 ScienceDirect 等数据库收录! |
|