Click Here for
Track Your Paper

International Journal of New Technology and Research

Impact Factor 3.953

(An ISO 9001:2008 Certified Online Journal)
India | Germany | France | Japan

Image Encryption based on Chaotic Systems and Shuffling Algorithm

( Volume 4 Issue 4,April 2018 ) OPEN ACCESS

Anish Batra, Siddharth Gorey, Ms. Reena Singh


The process of encoding any given piece of information or data using a particular selection of available algorithms is known as encryption. The motive is to ensure that the message only reaches the actual receiving audience for which it was intended in the first place and even if the transmission pathway is compromised in one way or another and an unauthorized party is somehow able to get hold of the data,it should be nothing more than gibberish for them. Our research paper focuses on image encryption in particular. With the huge plethora of images being shared today with many containing sensitive and confidential information, the need of image encryption has never been higher. Further, with computational power increasing exponentially with every year passing, older encryption schemes may not always offer the security and protection that they once did. Hence constant up gradation and improvement of encryption algorithms is the key to ensuring security. Further, encryption algorithms that work for textual data aren't as efficient or effective when used for encrypting images. Extensive previous research has been done on image encryption algorithms, we intend to build upon that research. Initially the researchers were focused on chaotic systems for image encryption using either Lorenz or Rossler chaotic systems. As time progressed, several combinations of Lorenz and Rossler started emerging. Separate algorithms were also developed that focused on shuffling algorithms with and without s-boxes. In our paper, we will utilize a combination of Lorenz and Rossler, couple it with shuffling algorithm and apply s-box shuffling over and above these to encrypt a gray scale image. This effectively gives us a three layer encryption thereby providing hugely improved security.

Paper Statistics:

Total View : 207 | Downloads : 198 | Page No: 86-90 |

Cite this Article:
Click here to get all Styles of Citation using DOI of the article.