A New Color Image Encryption Algorithm With Three Stage Shuffling And Xor Diffusion
Subashanthini S1, Pounambal M2
1Subashanthini S, School if Information Technology and Engineering, VIT University – Vellore.
2Pounambal M*, School of Information Technology and Engineering, VIT University – Vellore.
Manuscript received on August 05, 2019. | Revised Manuscript received on August 30 2019. | Manuscript published on August 30, 2019. | PP: 3575-3581 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9172088619/2019©BEIESP | DOI: 10.35940/ijeat.F9172.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The world has developed far beyond our expectations with the essence of technology, which has a profound effect on recent ways of data transmission. Data can be transmitted in many ways, but not so efficiently and securely as digital data. Imagery data is very vital these days considered these are used everywhere around the world. This paper mainly emphasizes on the prime issue i.e. “making the system more secure”. Therefore securing the image is a principal factor of this paper as the present issue that is ongoing now with data theft which is predominantly in an image. So, this paper mainly focuses on how to proliferate the sensitivity to the attacks and securing the image which is an integration of different algorithms of diffusion and shuffling based on chaotic logistic maps. A new approach for the proposed algorithm was generated. A few basic examinations like NPCR (Number of Pixel Change Rate), Histogram investigations, UACI (Unified Average Change of Intensity) and PSNR (Peak Signal to Noise Ratio) are performed against various test images of size 256 × 256×3. Results obtained from the analysis endorses that it offers a high level of security. This proves the credibility for this algorithm for the future usage in the real world.
Keywords: Chaotic logistic map, Image Encryption, Diffusion, Shuffling, Knight’s tour