TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - May Issue 2013 by IJCTT Journal
Volume-4 Issue-5                           
Year of Publication : 2013
Authors :Taranjit Kaur, Reecha Sharma

MLA

Taranjit Kaur, Reecha Sharma "TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping"International Journal of Computer Trends and Technology (IJCTT),V4(5):1295-1300 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Presently, cryptography of images is of high concern due to highly confidential information contained in it. Image encryption is difficult as compared to text encryption because of high correlation among pixels and bulk information capacity. A newly proposed algorithm based on symmetric key algorithm, TJ-ACA, an advanced cryptographic algorithm will make use of pixel position alteration, and pixel intensity surrogation through which a visually changed image i.e. encrypted image is obtained. In this algorithm, ikeda mapping and various methods are used to get highly secure image. To increase the security ikeda mapping is done at five different values instead of single value. This proposed algorithm is applicable for color images and also for images on which steganography has been applied and by this method we get lossless decrypted image. This method resists Brute Force attack. TJ-ACA can be applied to all sizes images which can be used in medical, aerial application.

 

References-
[1]. IsmetOzturk and Ibrahim Sogukpinaar, “Analysis and Comparison of Image Encryption Algorithms” , World Academy of Science, Engineering and Technology 3 2007 ,page no: 562-566.
[2]. Sara Tedmori and Nijad Al-Najwadi , “Lossless image Cryptography Algorithm Based on Discrete Cosine Transform”, The International Arab journal of Information Technology , Vol .9 , No. 5 , September 2012 , page no : 471-478.
[3]. SomdipDey,” SD-AEI: An Advanced Encryption Technique For Images” , An Advanced Combined Encryption Technique For Encrypting Images Using Randomized Byte Manipulation , pp. 68-73 , 2012.
[4]. Suli Wu and Yang Zhang , “ A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue” ,International Conference on Computer -Science and Software Engineering , pp. 841-844 , 2008.
[5]. Xiaojun Tong and Minggen Cui “A Novel Image Encryption Scheme Based On Feedback and 3D Baker”, 2008 IEEE.
[6]. AlirezaJolfaei and AbdolrasoulMirghadri , “A novel image encryption scheme using pixel shuffler and A5/1”, International Conference on Artificial Intelligence and Computational Intelligence, pp. 369-373 , 2010.
[7]. SaharMazloom and Amir MasudEftekhari – Moghadam , “ Color Image Cryptosystem using Chaotic Maps”, 2011 IEEE.
[8]. SeshaPallaviIndrakanti and P.S.Avadhani, “Permutation based Image Encryption Technique”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.
[9]. SomdipDey,“SD-AEI: An Advanced Encryption Technique For Images” , An Advanced Combined Encryption Technique For Encrypting Images Using Randomized Byte Manipulation , pp. 68-73 , 2012.
[10]. SomdipDey , “An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES ”, International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(2): 82-88 .

Keywords — Ikeda mapping, image Cryptography, pixel intensity surrogation, statistical analysis.