n this paper, a symmetric key image encryption algorithm has been proposed to
encrypt image. At first, a large integer number is taken as input and a set of odious number
has been computed from this number.A remainder set is computed by dividing the elements
of odious set with 255, the maximum grey value of the image. The remainder set is act as
symmetric key. The input im
age is diffused based on a set of predefined rules and
compression technique. Finally, bitwise XOR operation has been applied between key and
diffuse image. The effectiveness of the algorithm has been tested by number of statistical
tests like histogram analysis, correlation, NPCR, UACI and entropy test. It has been
observed that the proposed algorithm has given better result in all tests.
%0 Generic
%1 das2014innovative
%A Das, Subhajit
%A Mondal, Satyendra Nath
%A and Nabin Ghoshal,
%D 2014
%I ACEEE (A Computer division of IDES)
%K If- Odious Symmetric key number rules then
%T An Innovative Approach in Image Encryption
%U http://searchdl.org/public/conference/2014/ITC/96.pdf
%X n this paper, a symmetric key image encryption algorithm has been proposed to
encrypt image. At first, a large integer number is taken as input and a set of odious number
has been computed from this number.A remainder set is computed by dividing the elements
of odious set with 255, the maximum grey value of the image. The remainder set is act as
symmetric key. The input im
age is diffused based on a set of predefined rules and
compression technique. Finally, bitwise XOR operation has been applied between key and
diffuse image. The effectiveness of the algorithm has been tested by number of statistical
tests like histogram analysis, correlation, NPCR, UACI and entropy test. It has been
observed that the proposed algorithm has given better result in all tests.
@conference{das2014innovative,
abstract = {n this paper, a symmetric key image encryption algorithm has been proposed to
encrypt image. At first, a large integer number is taken as input and a set of odious number
has been computed from this number.A remainder set is computed by dividing the elements
of odious set with 255, the maximum grey value of the image. The remainder set is act as
symmetric key. The input im
age is diffused based on a set of predefined rules and
compression technique. Finally, bitwise XOR operation has been applied between key and
diffuse image. The effectiveness of the algorithm has been tested by number of statistical
tests like histogram analysis, correlation, NPCR, UACI and entropy test. It has been
observed that the proposed algorithm has given better result in all tests. },
added-at = {2014-03-24T05:58:47.000+0100},
author = {Das, Subhajit and Mondal, Satyendra Nath and and Nabin Ghoshal},
biburl = {https://www.bibsonomy.org/bibtex/2f366d2854b0738324f8e7aca66cfcc64/idescitation},
interhash = {2df2142f372609d88270100277f11b5b},
intrahash = {f366d2854b0738324f8e7aca66cfcc64},
keywords = {If- Odious Symmetric key number rules then},
organization = {Institute of Doctors Engineers and Scientists},
publisher = {ACEEE (A Computer division of IDES)},
timestamp = {2014-03-24T05:58:47.000+0100},
title = {An Innovative Approach in Image Encryption},
url = {http://searchdl.org/public/conference/2014/ITC/96.pdf},
year = 2014
}