International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P66 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P66

TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping


Taranjit Kaur, Reecha Sharma

Citation :

Taranjit Kaur, Reecha Sharma, "TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1295-1300, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P66

Abstract

Presently, cryptography of images is of high concern due to highly confidential information contained in it. Image encryption is difficult as compared to text encryption because of high correlation among pixels and bulk information capacity. A newly proposed algorithm based on symmetric key algorithm, TJ-ACA, an advanced cryptographic algorithm will make use of pixel position alteration, and pixel intensity surrogation through which a visually changed image i.e. encrypted image is obtained. In this algorithm, ikeda mapping and various methods are used to get highly secure image. To increase the security ikeda mapping is done at five different values instead of single value. This proposed algorithm is applicable for color images and also for images on which steganography has been applied and by this method we get lossless decrypted image. This method resists Brute Force attack. TJ-ACA can be applied to all sizes images which can be used in medical, aerial application.

Keywords

Ikeda mapping, image Cryptography, pixel intensity surrogation, statistical analysis.

References

[1]. Ismet Ozturk and Ibrahim Sogukpinaar, “Analysis and Comparison of Image Encryption Algorithms” , World Academy of Science, Engineering and Technology 3 2007 ,page no: 562-566.                                                                                                      [2]. Sara Tedmori  and Nijad Al-Najwadi ,  “Lossless image Cryptography Algorithm Based on Discrete Cosine Transform”, The International Arab journal of Information Technology , Vol .9 , No. 5 , September 2012 , page no : 471-478.
[3]. Somdip Dey,” SD-AEI: An Advanced Encryption Technique For Images” , An Advanced Combined Encryption Technique For Encrypting Images Using Randomized Byte Manipulation , pp. 68-73 , 2012.
[4]. Suli Wu and Yang Zhang , “ A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bicolumn Bi-row Circular Queue” ,International Conference on Computer -Science and Software Engineering , pp. 841844 , 2008. 
[5]. Xiaojun Tong and Minggen Cui “A Novel Image Encryption Scheme Based On Feedback and 3D Baker”, 2008 IEEE.
[6]. Alireza Jolfaei and Abdolrasoul Mirghadri , “A novel image encryption scheme using pixel shuffler and A5/1”, International Conference on Artificial Intelligence and Computational Intelligence, pp. 369-373 , 2010.
[7]. Sahar Mazloom and Amir Masud Eftekhari – Moghadam , “ Color Image Cryptosystem using Chaotic Maps”, 2011 IEEE.
[8]. Sesha Pallavi Indrakanti and P.S.Avadhani, “Permutation based Image Encryption Technique”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.
[9]. Somdip Dey, “SD-AEI: An Advanced Encryption Technique For Images” , An Advanced Combined Encryption Technique For Encrypting Images Using Randomized Byte Manipulation , pp. 68-73 , 2012.
[10]. Somdip Dey , “ An Image Encryption Method: SDAdvanced Image Encryption Standard: SD-AIES ”,  International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(2): 82-88 .
[11]. Komal D Patel and Sonal Belani “image encryption using different techniques : A review” , International Journal of Emerging Technology and Advanced Engineering , ISSN 2250-2459, Volume 1, Issue 1, November 2011 ,pp. 30-34. [12]. Rafael C.Gonzalez and Richard E.Woods ,  “Image Processing”, Pearson, 2011.
[13]. Keerti Kushwaha and Sini Sibu, “ PROPOSED MODEL OF IMAGE CRYPTOGRAPHY (A DESIGNING APPROACH FOR IMAGES SECURITY)”, International Journal of Emerging Technology and advanced engineering, ISSN 2250-2459, ISO 9001:2008 certified journal, Volume 3, Issue 1, January 2013 , Page no : 144149.
[14]. Hiral Rathod , Mahendra Singh Sisodia, and Sanjay Kumar Sharma, “A REVIEW AND COMPARATIVE STUDY OF  BLOCK BASED SYMMETRIC TRANSFORMATION ALGORITHM FOR IMAGE ENCRYPTION”, International Journal of computer technology and electronics engineering (IJCTEE) Volume 1, issue 2, ISSN 2249-6343 ,page  no : 23-30.
[15]. Yaobin Mao and Guanrong chen, “CHAOS-BASED IMAGE ENCRYPTION”.
[16]. K.Ikeda, Multiple-valued Stationary State and its Instability of the Transmitted Light by a Ring Cavity System, Opt. Commun. 30 257-261 (1979); K. Ikeda, H. Daido and O. Akimoto, Optical Turbulence:Chaotic Behavior of Transmitted Light from a Ring Cavity, Phys. Rev. Lett. 45, 709–712 (1980).