Performance analysis of gray code number system in image security
Open Access
- 5 September 2019
- journal article
- Published by Institute of Research and Community Services Diponegoro University (LPPM UNDIP) in Jurnal Teknologi dan Sistem Komputer
- Vol. 7 (4), 141-146
- https://doi.org/10.14710/jtsiskom.7.4.2019.141-146
Abstract
The encryption of digital images has become essential since it is vulnerable to interception while being transmitted or stored. A new image encryption algorithm to address the security challenges of traditional image encryption algorithms is presented in this research. The proposed scheme transforms the pixel information of an original image by taking into consideration the pixel location such that two neighboring pixels are processed via two separate algorithms. The proposed scheme utilized the Gray code number system. The experimental results and comparison shows the encrypted images were different from the original images. Also, pixel histogram revealed that the distribution of the plain images and their decrypted images have the same pixel histogram distributions, which means that there is a high correlation between the original images and decrypted images. The scheme also offers strong resistance to statistical attacks.Keywords
Funding Information
- Kwara State University, Nigeria
This publication has 23 references indexed in Scilit:
- A Comprehensive Survey of Video Encryption AlgorithmsInternational Journal of Computer Applications, 2012
- A New Chaos-Based Image-Encryption and Compression AlgorithmJournal of Electrical and Computer Engineering, 2012
- A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group-Wise Of RGB Values and Explosive Inter-Pixel DisplacementInternational Journal of Image, Graphics and Signal Processing(ijigsp), 2012
- Image Encryption Algorithm Based on Chaotic MappingJurnal Teknologi, 2012
- Image encryption based on a new total shuffling algorithmChaos, Solitons, and Fractals, 2008
- 2D Triangular Mappings and Their Applications in Scrambling Rectangle ImageInformation Technology Journal, 2007
- Image encryption using chaotic logistic mapImage and Vision Computing, 2006
- An image encryption approach based on chaotic mapsChaos, Solitons, and Fractals, 2005
- Large encrypting binary images with higher securityPattern Recognition Letters, 1998
- Gray Code Generation for MPSK SignalsIEEE Transactions on Communications, 1981