RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication

  • Authors

    • Musbah J. Aqel
    • Ziad ALQadi
    • Ammar Ahmed Abdullah
    2018-07-27
    https://doi.org/10.14419/ijet.v7i3.13.16334
  • Digital RGB color Image, Image Segmentation, Private Key, Encryption, Decryption, Speedup, Throughput, Hacking.
  • Digital RGB color images are considered as the most widely used data type through the internet, so there is a need for efficient and secure techniques to transmit and protect these digital images and this is a matter of high priority process. Many researchers had developed different techniques to increase the security of image transmission, and most of these techniques suffer from the low speed of the encryption-decryption process. In this paper, a novel technique is proposed that could be used for digital color image encryption-decryption. The performance of this technique is compared with the performance of other techniques and it has shown the advantages of using this technique over other techniques in enhancing the throughput and speed of encryption-decryption process.

     

  • References

    1. [1] Ziad A. Alqadi ,Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, 2010, Optimized True-RGB color Image Processing, World Applied Sciences Journal 8 (10): 1175-1182, ISSN 1818-4952.

      [2] Waheeb, A. and Ziad AlQadi, 2009. Gray image reconstruction. Eur. J. Sci. Res., 27: 167-173.

      [3] Rojo, M.G., G.B. García, C.P. Mateos, J.G. García and M.C. Vicente, 2006. Critical comparison of 31 commercially available digital slide systems in pathology. Int. J. Surg. Pathol., 14: 285-305.

      [4] T.Sivakumar , and R.Venkatesan , A Novel Image Encryption Approach using Matrix Reordering, WSEAS TRANSACTIONS on COMPUTERS, Issue 11, Volume 12, November 2013,pp 407-418.

      [5] Haojiang Gao, Yisheng Zhang, Shuyun Liang and Dequn Li, “A New Chaotic Algorithm for Image Encryptionâ€, Elsevier Science Direct, vol. 29, no. 2, 2006, pp.393-399.

      [6] Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principleâ€, Journal of Electrical and Computer Engineering, 2011, pp. pp.1-13.

      [7] Xiaomin Wang, and Jiashu Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operationâ€, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, 23-24 April 2008, pp.1-6.

      [8] G. Chen, Y. Mao, and C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Mapsâ€, Chaos, Solitons and Fractals, Vol. 21, No. 3, 2004, pp.749–761.

      [9] Guodong Ye, “An Efficient Image Encryption Scheme based on Logistic mapsâ€, International Journal of Pure and Applied Mathematics, Vol.55, No.1,2009, pp. 37-47.

      [10] Han Shuihua and Yang Shuangyuan, “An Asymmetric Image Encryption Based on Matrix Transformationâ€, ECTI Transactions on Computer and Information Technology, Vol.1, No.2, 2005, pp. pp.126-133.

      [11] Prabhudesai Keval Ketan and Vijayarajan V, “An Amalgam Approach using AES and RC4 Algorithms for Encryption and Decryptionâ€, International Journal of Computer Applications, Vol.54, No.12, 2012, pp.29-36.

      [12] S.A.M Rizvi, Syed Zeeshan Hussain and Neeta Wadhwa, “A Comparative Study of Two Symmetric Encryption Algorithms Across Different Platformsâ€, International Conference on Security and Management (SAM’11), World Academy of Science, USA, 2011.

      [13] Sanfu Wang, Yuying Zheng and Zhongshe Gao, “A New Image Scrambling Method through Folding Transformâ€, IEEE International Conference on Computer Application and System Modeling, Taiyuan, 22-24 Oct. 2010, pp.v2-395-399.

      [14] G.A. Sathishkumar and K.Bhoopathy Bagan, “A Novel Image Encryption Algorithm Using Pixel Shuffling and BASE 64 Encoding Based Chaotic Block Cipher, WSEAS Transactions on Computers, Vol.10, No. 6, 2011, pp. 169-178.

      [15] John Justin M, Manimurugan S , “A Survey on Various Encryption Techniques â€, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

      [16] Ephin M, Judy Ann Joy and N. A. Vasanthi, “ Survey of Chaos based Image Encryption and Decryption Techniques †, Amrita International Conference of Women in Computing (AICWIC’13) Proceedings published by International Journal of Computer Applications (IJCA).

      [17] Jawahar Thakur, and Nagesh Kumar, “DES, AES, and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysisâ€, International Journal of Emerging Technology and Advanced Engineering, Vol.1, No.2, 2011, pp.6-12.

      [18] Liu Hongjun and Wang Xingyuan, “Color image encryption based on one-time keys and robust chaotic mapsâ€, Journal of Computers and Mathematics with Applications (Elsevier), Vol.59, 2010, pp. 3320-3327.

      [19] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, “A Modified AES Based Algorithm for Image Encryptionâ€, World Academy of Science, Engineering and Technology, Vol.3, 2007, pp.526-531.

      [20] S.S. Maniccam, and N.G.Bourbakis “Image and Video Encryption using SCAN Patternsâ€, The Journal of the Pattern Recognition Society, Vol.37, 2004, pp.725-737.

      [21] Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption using Block-Based Transformation Algorithmâ€, IAENG International Journal of Computer Science, Vol.35, No.1, 2008, pp.3-11.

  • Downloads

  • How to Cite

    J. Aqel, M., ALQadi, Z., & Ahmed Abdullah, A. (2018). RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication. International Journal of Engineering & Technology, 7(3.13), 104-107. https://doi.org/10.14419/ijet.v7i3.13.16334