Image encryption using vigenere cipher with bit circular shift

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cryptography is a method of securing text data, images and sound in order to secure its confidentiality and to minimize data stealing, attack, etc. The purpose of this study is to improve classic Vigenere cipher using bit circular shift on image encryption. This experiment uses both RGB and grayscale images as samples and shows that Vigenere cipher with bit circular shift has better performance when encrypting an image both visually and its randomness. It is obtained the MAE values of images of final encryption process are 81.702637 of RGB and 73.678756 of grayscale, and the final decryption process of 0 for both images. The randomness of images of the final encryption process is shown by its correlation coefficient values; it is 0.033857 of RGB and -0.058501 of grayscale.

     


  • Keywords


    Vigenere chipper; bit circular shift; image encryption.

  • References


      [1] H. Delfs, K. Paterson, and R. Cramer, Introduction to Cryptography: Principles and Application, Third Edit. Berlin: Springer-Verlag GmnH, 2015.

      [2] B. Schneier, Applied Cryptography, 20th Anniv. Indianapolis: John Wiley & Sons, Inc, 2015.

      [3] C. Paar and J. Pelzl, Understanding Cryptography. 2010.

      [4] R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security : A survey,” Int. J. Eng. Technol., vol. 7, no. 1.5, pp. 107–110, 2018.

      [5] A. Saraswat, C. Khatri, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,” Procedia - Procedia Comput. Sci., vol. 92, pp. 355–360, 2016.

      [6] M. Sajid, Q. Khizrai, and P. S. T. Bodkhe, “Image Encryption using Different Techniques for High-Security Transmission over a Network,” Int. J. Eng. Res. Gen. Sci., vol. 2, no. 4, pp. 299–306, 2014.

      [7] T. Kumar and K. Verma, “A Theory Based on Conversion of RGB image to Gray image,” Int. J. Comput. Appl., vol. 7, no. 2, pp. 5–12, 2010.

      [8] K. Loukhaoukha, J. Chouinard, and A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik ’ s Cube Principle,” J. Electron. Comput. Eng., vol. 2012, 2012.

      [9] E. Setyaningsih, C. Iswahyudi, and N. Widyastuti, “Image Encryption on Mobile Phone using Super Encryption Algorithm,” Telkomnika, vol. 10, no. 4, pp. 835–843, 2012.

      [10] N. Sinha, “Improving Security of Vigenère Cipher by Double Columnar Transposition,” Int. J. Comput. Appl., vol. 100, no. 14, pp. 6–10, 2014.

      [11] A. Jawahir and H. Haviluddin, "An audio encryption using transposition method," International Journal of Advances in Intelligent Informatics, vol. 1, No 2, July 2015, pp. 98-106, 2015.


 

View

Download

Article ID: 12734
 
DOI: 10.14419/ijet.v7i2.2.12734




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.