Enhancing Image Security during Transmission using Residue Number System and k-shuffle
Open Access
- 7 July 2020
- journal article
- Published by Earthline Publishers in Earthline Journal of Mathematical Sciences
- Vol. 4 (2), 399-424
- https://doi.org/10.34198/ejms.4220.399424
Abstract
This paper proposes an algorithm that enhances the speed of transmission and secure images that are transmitted over internet or a network. The proposed cryptosystem uses a modified k-shuffling technique to scramble pixels of images and further decomposes them using Residue Number System. Simulations are done using two moduli sets with the modified k-shuffle technique. Analyses of results showed that both simulations could secure images without any loss of information and also the time taken for a complete encryption/decryption process is dependent on the moduli set. Among the chosen moduli sets, the even moduli set optimizes and completes execution using less time as compared to the traditional moduli set. The proposed scheme also showed resistance to statistical attacks (histogram, ciphertext, correlation attacks) and a significant reduction in the size of cipher images which enhances the speed of transmission over network.Keywords
This publication has 27 references indexed in Scilit:
- Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphicsMeasurement, 2018
- Chaos-based image encryption using vertical-cavity surface-emitting lasersOptik, 2018
- A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation StrategySecurity and Communication Networks, 2018
- A Survey of Image Encryption Algorithms3D Research, 2017
- Traditional and Hybrid Encryption Techniques: A SurveyPublished by Springer Science and Business Media LLC ,2017
- Image Acquisition and Techniques to Perform Image AcquisitionSAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 2017
- Image Encryption Using Fibonacci-Lucas TransformationInternational Journal on Cryptography and Information Security, 2012
- Image Encryption Algorithm Based on Chaotic MappingJurnal Teknologi, 2012
- 2D Triangular Mappings and Their Applications in Scrambling Rectangle ImageInformation Technology Journal, 2007
- Large encrypting binary images with higher securityPattern Recognition Letters, 1998