Abstract
Data security is a challenging problem in the sphere of storage and transmission of data. With the development of heavy computational resources, various encryption algorithms are getting more prone to subsequent attacks or threats either via brute force, cipher attacks or statistical attacks, and side-channel attacks. Thus, for better security there is a need for more robust encryption of data especially unstructured data. This paper has tried to propose a novel image encryption technique known as Pixel Property Permutation (PPP) on the basis of Visual Cryptography. In this algorithm, any image RGB or greyscale is first converted to Black and White and compressed of (200 * 200) pixels. Although this is not mandatory, one can even use the RGB image however this guideline is assumed only for simplicity purposes. The pixel values of the image are extracted and stored. These pixel values are then permuted with one another using random permutations. Thus, the encrypted image is obtained. Now, using the encrypted image and the original image a key is generated (superimposing one on the other). The key and the encrypted image are both subjected to the 128-bit AES Encryption (Roeder, Symmetric-Key Cryptography, [1]). The decryption process is also very similar. The two AES encrypted images are decrypted using the same key obtained earlier. In the next step we use the decrypted AES image and the cipher key image to recover the original image by superimposing one on top of another. This process of PPP uses AES encryption algorithm as an added layer of defence which is not essentially necessary but encouraged, this technique is cost effective and can be used to secure highly sensitive data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Roeder, T.: Symmetric-Key Cryptography
Bernstein, D.J.: Cache-timing attacks on AES (2005)
Bogdanoy, A., Khovratovich, D., Rechberger, C.: Biclique Cryptanalysis of the Full AES
El Assad, S., Farajallah, M., Vladeanu, C.: Chaos-Based Block Ciphers: An Overview (2011)
Stanisavljevic, Z.S.: Data Encryption Standard Visual representation (1997)
Lee, S.-S.: Phase Masking Visual Cryptography using Interferometer (2008)
Schmeh, K.: Cryptography and Public Key Infrastructure on the Internet, p. 45 (2001)
Iyer, K.C., Subramanya, A.: Image Encryption by Pixel Property Separation
Koh, M.-S., Rodriguez-Marek, E., Talarico, C.: A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen Plaintext Attacks. In: ICME 2007 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Surana, A., Ajmal, T., Annapurani, K. (2019). Visual Encryption by Pixel Property Permutation. In: Nayak, J., Abraham, A., Krishna, B., Chandra Sekhar, G., Das, A. (eds) Soft Computing in Data Analytics . Advances in Intelligent Systems and Computing, vol 758. Springer, Singapore. https://doi.org/10.1007/978-981-13-0514-6_65
Download citation
DOI: https://doi.org/10.1007/978-981-13-0514-6_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0513-9
Online ISBN: 978-981-13-0514-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)