Contribution for Improvement of Image Scrambling Technique Based on Zigzag Matrix Reodering

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-61 Number-1
Year of Publication : 2018
Authors : Mamy Alain Rakotomalala, Tahina E. Rakotondraina, Sitrakar. Rakotondramanana
DOI :  10.14445/22312803/IJCTT-V61P102

MLA

MLA Style: Mamy Alain Rakotomalala, Tahina E. Rakotondraina, Sitrakar. Rakotondramanana "Contribution for Improvement of Image Scrambling Technique Based on Zigzag Matrix Reodering" International Journal of Computer Trends and Technology 61.1 (2018): 10-17.

APA Style:Mamy Alain Rakotomalala, Tahina E. Rakotondraina, Sitrakar. Rakotondramanana, (2018). Contribution for Improvement of Image Scrambling Technique Based on Zigzag Matrix Reodering. International Journal of Computer Trends and Technology, 61(1), 10-17.

Abstract
In the natural state, all images are most correlated. For improving the image ciphering and eliminating this physical aspect, using the scrambling technique gives the best result. The scrambling technique is a block before or after the image encryption. By reordering the matrix following some specific path, the pixels position becomes scrambled. Indeed our research is based on the fact that when using the scrambling of the pixels position only, the histogram of the image doesn’t change and the distribution of the adjacent pixels are predictable. In this, adding some techniques of color scrambling is necessary. This will improve the different criteria of performance evaluation like: PSNR, SSIM, distribution of adjacent pixels, histogram and time following our simulation on Matlab.

Reference
[1] G. Thippanna, “Re-examine on assorted digital image encryptionalgorithm’s techniques”,India 17 (01) (2018)
[2] D. Shinghai and C. Gupta, “A review on various image encryption technique using AES and random RGB substitution”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCC),Vol.7, 1 (1) (2018)
[3] J. Shah and J. S. Dhobi, “Review of image encryption and decryption techniques for 2D images”, International Journal of Engineering Technologies and Management Research (IJETMR), (1) (2018)
[4] Minati Mishra, Priyadarsini Mishra, M.C. Adhikary and Sunit Kumar, “IMAGE ENCRYPTION USING FIBONACCI-LUCAS TRANSFORMATION”, International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.3, India (8) (2012)
[5] JianchengZou, Rabab K. Ward, Dongxu Qi, “THE GENERALIZED FIBONACCI TRANSFORMATIONS AND APPLICATION TO IMAGE SCRAMBLING”, International Conference on Acoustics, Speech, and Signal Processing (ICASSP), China (6) (2004)
[6] ShafaliAgarwal, “A Review of Image Scrambling Technique Using Chaotic Maps”, International Journal of Engineering and Technology Innovation, Vol. 8, No. 2, 2018, USA (2018) 77-98
[7] Hui Liu, Cong Jin, “A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic”, International Journal of Network Security, Vol.19, China 10 (06) (2016)
[8] Seesa Paul, “A Study on various Image Scrambling Techniques”, International Journal for Scientific Research & Development (IJSRD), Vol. 4, Issue.12, India (2017)
[9] M. Essaid, A. Jarjar, I. Akharraz A. Saaidi, and A. Mouhib,”Image encryption based on Arnold transformation”,Gulf Journal of Mathematics, Vol 4, Issue 4 (2016) 103-107
[10] SnehaBirendraTiwari, NagarajVernekar, “A Novel Approach to Image Encryption”, IOSR Journal of Computer Engineering (IOSR-JCE), India (2013) 31-36
[11] ReemaDhiman, Butta Singh, “IMAGE ENCRYPTION TECHNIQUES: A LITERATURE REVIEW”, International Journal of Advanced Research in Computer Science (IJARCS), Vol.8, No.7, India (7-8) (2017)
[12]ChengqingLia,DongdongLina, JinhuLub, “Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits”, IEEE Multimedia, China 6 (8) (2017)
[13] Sabah Fadhel, MohdShafry, Omar Farook, “Chaos Image Encryption Methods: A Survey Study”, Bulletin of Electrical Engineering and Informatics, Vol.6, No.1, Malaysia (3) 2017 99-104
[14]FarzanaKabir, JasmeetKaur, “Color Image Encryption for Secure Transfer over Internet: A survey”, International Research Journal of Engineering and Technology (IRJET), Vol.4, India (10) 2017
[15] S. El Assad, M. Farajallah and C. Vladeanu, “Fast and Secure Chaos-based Cryptosystem for Images”, International Journal of Bifurcation and Chaos (IJBC), (2) (2016)
[16] 1Sangita Vishwakarma, Mrs. ShahanaQureshi, “TECHNIQUES OF VISUAL CRYPTOGRAPHY SCHEMES: A REVIEW”, Journal of Emerging Technologies and Innovative Research (JETIR), Vol. 4, (4) (2017)
[17] C. Muramatsu, S. Higuchi, T. Morita and H. Fujita, “Similarity estimation for reference image retrieval in mammograms using convolutional neural network”, Texas 27 (2) (2018)
[18] PunitaKumari and Kalpana Jain, “Digital Image Encryption Technique Using Block Based Scrambling and Substitution”, Global Journal of Computer Science and Technology, Vol.1, USA (2017)
[19] KokSheik Wong, Kiyoshi Tanaka, “SCALABLE IMAGE SCRAMBLING METHOD USING UNIFIED CONSTRUCTIVE PERMUTATION FUNCTION ON DIAGONAL BLOCKS”, 28th Picture Coding Symposium, Japan 8-10 (12) (2012)
[20] Ahmet C¸ Agr?Bagbaba, BernaOrs, “Hardware Implementation of Novel Image Compression-Encryption System on a FPGA”, Istanbul Technical University, Turkey (2013)
[21] Chady ElMoucary, “A Novel Blind Digital Watermarking Technique for Stegano-Encrypting Information Using Nine- AC-Coefficient Prediction Algorithm with an Innovative Security Strategy”, WSEAS Transactions on Signal Processing, Vol.5, Issue.11, Libanese (06) (2009)
[22] J.M. Rodriguesa, W. Puecha and A.G. Borsb, “A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher”, University of Montpellier, France (2002)
[23] S.S. Maniccama, N.G. Bourbakis, “Image and video encryption using SCAN patterns”, The Journal of the Pattern Recognition Society, Greece 18 (8) (2003)
[24] Shalin J Patel, “Image Encryption and Compression using Scan Patterns”, International Journal for Scientific Research & Development (IJSRD), Vol. 3, Issue 03,Kalol (2015)
[25] FaramarzSadeghi, FatemehZarisfiKermani, and MarjanKuchaki Rafsanjani, “Optimizing Image Steganography by Combining the GA and ICA”, the ISC International Journal of Information Security, Vol.7, No.1, Iran (1) (2015) 47-58
[26] K. Saravanan, T. Purusothaman and KVN.Kavitha, “COMPRESSIVE SENSING BASED IMAGE ENCRYPTION SCHEME”, ARPN Journal of Engineering and Applied Sciences (Asian Research Publishing Network (ARPN), ARPN-JEAS), Vol.13, No.4, India (2) (2018)
[27] ChangjiuPu, “Image scrambling algorithm based on image block and zigzag Transformation”, Computer Modelling & New Technologies (CMNT), China (1) (6) (2014)
[28] R. Rakotomalala, “Analyse de corrélation, Étude des dépendances - Variables quantitatives Version 1.1”, Support Université Lumière Lyon 2, 27 (12) (2017)

Keywords
scrambling, zigzag, PSNR, SSIM, UACI, NPCR