Encrypt Images Using Mutation Methods

Authors

  • Shahla Kharofa College Of Dentistry, University of Mosul Mosul, Iraq.

DOI:

https://doi.org/10.31642/JoKMC/2018/060204

Keywords:

Methods of Mutation , Images Encryption , Correlation Coefficient , Histogram analysis

Abstract

As a result of the tremendous development of information and communications technology, especially after the wide spread of the internet, the process of preserving images has become a major and important subject. The most important method to preserve images is the use of encryption, which aims to ensure the preservation of the privacy of images and not allowing anyone to tamper with or view them because they are either confidential or very special. Also, no one can understand the content of those images unless they have a means of encryption. In this research, a new methods has been applied in images encryption using mutation methods. Different analysis like correlation coefficient, and histogram analysis is applied for the verification of the performance of the suggested algorithm. Matlab language has been used to implement the suggested algorithm, because of its efficiency, accuracy and flexibility in giving results.

Downloads

Download data is not yet available.

References

Veetil, Amritha, " An Encryption Technique Using Genetic Operators", International Journal of Science & Technology Research, Vol. 4, No. 7, pp. 202-203, 2015.

Parameshwaran, Anuja and Wen Zhan, " Encryption Algorithm for Color Images: A Brief Review of Recent Trends", International Journal of Advanced Computer Sciences and Applications, Vol. 7, No. 10, pp. 1-11, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.071001

Agarwal, Shafali, " Image Encryption Techniques Using Fractal Function: A Review", International Journal of Computer Science & Information Technology , Vol. 9, No. 2, pp. 53-68, 2017. DOI: https://doi.org/10.5121/ijcsit.2017.9205

Kumari, Abiban and Shruti Goyal, " Encryption and Code Breaking of Image Using Genetic in Matlab", International Journal of Advanced Research in Algorithm Computer Science and Management Studies, Vol. 4, No. 7, pp. 356-361, 2016.

Shah, Jalpa and J. Dhobi, " Review of Image Encryption and Decryption Techniques for 2D Images", International Journal of Engineering Technologies and Management Research , Vol. 5, No. 1, pp. 81-84, 2018. DOI: https://doi.org/10.29121/ijetmr.v5.i1.2018.49

Ghosh, Chinmoy and Satyendra Nath, " Image Encryption: A New Approach Using Genetic Algorithm", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 5, No. 13, pp. 278-284, 2016.

Al-Husainy, Mohammed and Diaa Mohammed, " Image Encryption Technique Based on the Entropy Value of a Random Block", International Journal of Advanced Computer Science and Applications, Vol. 8, No. 7, pp. 260-266, 2017. DOI: https://doi.org/10.14569/IJACSA.2017.080735

Srikanth, P. and Abhinav Mehta, " Encryption and Decryption Using Number", International Journal of Computer Science and Network, Vol. 6, No. 3, pp. 455-459, 2017.

Kumar, Rohit and Shekhar, " Comparison of Genetic Algorithm of Image Encryption With New Cipher", International Journal of Emerging Trends in Engineering Research, Vol. 2, No. 11, pp. 64-68, 2014.

Soni, Aarti and Suyash Agrawal, " Key Generation Using Genetic Algorithm for Image Encryption", International Journal of Computer Science and Mobile Computing , Vol. 2, No. 6, pp. 376-383, 2013. Fig. 5 Histogram of the original Image 2 and histogram of the encrypted image 2 methods Fig. 6

Downloads

Published

2019-09-12

How to Cite

Kharofa, S. (2019). Encrypt Images Using Mutation Methods. Journal of Kufa for Mathematics and Computer, 6(2). https://doi.org/10.31642/JoKMC/2018/060204

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.