A color image encryption technique using block scrambling and chaos

Faculty Computer Science Year: 2021
Type of Publication: ZU Hosted Pages: 505-525
Authors:
Journal: Multimedia Tools and Applications Springer Volume:
Keywords : , color image encryption technique using block    
Abstract:
Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web. Protecting these images from unauthorized persons is an important issue. Image encryption is one of the image-securing techniques. One advantage of using encryption is that the plain image is converted to an unrecognized one. Also, the plain image is restored without any loss of information. In this paper, a color image encryption technique using blocks scrambling and chaos is presented. First, the plain image is decomposed into three channels: R, G, and B. Then, each channel is divided into sub-images and blocks. Our encryption algorithm depends on two main steps: scrambling and diffusion. First, the pixels’ arrangement in sub-images and blocks is changed, and then scrambling between sub-images is done to get the scrambled image. Then, in diffusion, the scrambled image diffuses using the logistic map to get the encrypted image. The experimental results show that our proposed algorithm has good performance in encrypting color images.
   
     
 
       

Author Related Publications

  • Khalied Mohamed Hosny, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Khalied Mohamed Hosny, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Khalied Mohamed Hosny, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Khalied Mohamed Hosny, "Fast computation of accurate Zernike moments", Springer, 2008 More
  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet