International Journal of Image, Graphics and Signal Processing(IJIGSP)

ISSN: 2074-9074 (Print), ISSN: 2074-9082 (Online)

Published By: MECS Publisher

IJIGSP Vol.6, No.2, Jan. 2014

A Secure Symmetric Image Encryption Based on Bit-wise Operation

Full Text (PDF, 731KB), PP.30-38

Views:1   Downloads:0


Prabir Kr. Naskar,Atal Chaudhuri

Index Terms

Symmetric encryption;Block cipher;Substitution;Transposition;Dynamic SBOX;Dynamic TBOX;Number of pixel change rate


This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides additional protection of the secret data. The substitution and transposition are done using dynamic substitution box (SBOX) and transposition box (TBOX) which are generated using the secret key and made to vary for each block during ciphering. The size of encrypted data is same as the size of secret data and the proposed scheme has been tested using different images. We have also presented the security analysis such as key sensitivity analysis, statistical analysis, and differential analysis to prove the strength of our algorithm against crypto analysis.

Cite This Paper

Prabir Kr. Naskar,Atal Chaudhuri,"A Secure Symmetric Image Encryption Based on Bit-wise Operation", IJIGSP, vol.6, no.2, pp.30-38, 2014.DOI: 10.5815/ijigsp.2014.02.04


[1]National Bureau of Standards, “Data Encryption Standard,” FIPS Publication 46, 1977.

[2]NIST, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Special Publication 800-67.

[3]Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.

[4]Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126.

[5]K. Wang , Pei , Z. Liuhua ,S. Aiguo Song, H. Zhenya, "On the security of 3D Cat map based symmetric image encryption scheme," Elsevier, Physics Letters A, Vol. 343, Issue 6, 2005, pp. 432–439.

[6]Li. Shujun, X. Zheng "Cryptanalysis of a chaotic image encryption method," Inst. of Image Process. Xi'an Jiaotong Univ., Shaanxi, This paper appears in: Circuits and Systems, ISCAS 2002. IEEE International Symposium on Publication Date: 2002, Vol. 2, 2002, pp. 708,711.

[7]A. Mitra, Y V. Subba Rao, and S. R. M. Prasnna, "A new image encryption approach using combinational permutation techniques," Journal of computer Science, vol. 1, no. 1, 2006, p.127.

[8]R. m. Syed, "Anew encryption algorithm for high throughput multimedia," IN: Interactive Multimedia Systems, 2002, p. 269.

[9]S. P. Nana'Vati and K. P. Prasanta, "Wavelets: Applications to Image Compression-I," Joined of the Scientific and Engineering Computing. Vol. 9, No.3: 2004, PP. 4-10.

[10]C. Ratael, gonzales, e. Richard, and woods, "Digital image processing," 2nd ed, Prentice hall, 2002. 

[11]AL. Vitali, A. Borneo, M. Fumagalli and R. Rinaldo, "Video over IP using standard-compatible multiple description coding," Journal of Zhejiang University- Science A, vol. 7, no. 5 ,2006, pp. 668- 676.

[12]C. Harris, "ITN584 Access Control & Smart Cards," research paper, 2001. 

[13]G. C. Kessler, "An Overview of Cryptography," published by Auerbach, 1998' (22 Desember 2007). 

[14]S. Han, and S. Yang, "An Asymmetric Image Encryption Based on Matrix Transformation," ecti transactions on computer and information technology vol. 1, no. 2, 2005. 

[15]D. Salomon, "Data compression, Image compression," Fourth addition, Springer London, 2005, pp. 263-530. 

[16]I. Ozturk, and I.Sogukpinar, "Analysis and comparison of image encryption algorithm," International Journal of Information Technology, Vol. 1, no. 2, pp. 64-67.

[17]S.S. Maniccam, N.G. Bourbakis, "Image and video encryption using SCAN patterns," Journal of Pattern Recognition Society, vol. 37, no. 4, pp.725–737, 2004.

[18]"The MD4 Message Digest Algorithm"- Network Working Group. 1990-10. Retrieved 2011-04-29.

[19]R. Rivest -'The MD5 Message-Digest Algorithm’ 1991, RFC: 1321.

[20]FIPS 180-2: Secure Hash Standard (SHS) (PDF, 236 kB) – Current version of the Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512), 1 August 2002, amended 25 February 2004.