Encrypt Images Using Mutation Methods
DOI:
https://doi.org/10.31642/JoKMC/2018/060204Keywords:
Methods of Mutation , Images Encryption , Correlation Coefficient , Histogram analysisAbstract
As a result of the tremendous development of information and communications technology, especially after the wide spread of the internet, the process of preserving images has become a major and important subject. The most important method to preserve images is the use of encryption, which aims to ensure the preservation of the privacy of images and not allowing anyone to tamper with or view them because they are either confidential or very special. Also, no one can understand the content of those images unless they have a means of encryption. In this research, a new methods has been applied in images encryption using mutation methods. Different analysis like correlation coefficient, and histogram analysis is applied for the verification of the performance of the suggested algorithm. Matlab language has been used to implement the suggested algorithm, because of its efficiency, accuracy and flexibility in giving results.Downloads
References
Veetil, Amritha, " An Encryption Technique Using Genetic Operators", International Journal of Science & Technology Research, Vol. 4, No. 7, pp. 202-203, 2015.
Parameshwaran, Anuja and Wen Zhan, " Encryption Algorithm for Color Images: A Brief Review of Recent Trends", International Journal of Advanced Computer Sciences and Applications, Vol. 7, No. 10, pp. 1-11, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.071001
Agarwal, Shafali, " Image Encryption Techniques Using Fractal Function: A Review", International Journal of Computer Science & Information Technology , Vol. 9, No. 2, pp. 53-68, 2017. DOI: https://doi.org/10.5121/ijcsit.2017.9205
Kumari, Abiban and Shruti Goyal, " Encryption and Code Breaking of Image Using Genetic in Matlab", International Journal of Advanced Research in Algorithm Computer Science and Management Studies, Vol. 4, No. 7, pp. 356-361, 2016.
Shah, Jalpa and J. Dhobi, " Review of Image Encryption and Decryption Techniques for 2D Images", International Journal of Engineering Technologies and Management Research , Vol. 5, No. 1, pp. 81-84, 2018. DOI: https://doi.org/10.29121/ijetmr.v5.i1.2018.49
Ghosh, Chinmoy and Satyendra Nath, " Image Encryption: A New Approach Using Genetic Algorithm", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 5, No. 13, pp. 278-284, 2016.
Al-Husainy, Mohammed and Diaa Mohammed, " Image Encryption Technique Based on the Entropy Value of a Random Block", International Journal of Advanced Computer Science and Applications, Vol. 8, No. 7, pp. 260-266, 2017. DOI: https://doi.org/10.14569/IJACSA.2017.080735
Srikanth, P. and Abhinav Mehta, " Encryption and Decryption Using Number", International Journal of Computer Science and Network, Vol. 6, No. 3, pp. 455-459, 2017.
Kumar, Rohit and Shekhar, " Comparison of Genetic Algorithm of Image Encryption With New Cipher", International Journal of Emerging Trends in Engineering Research, Vol. 2, No. 11, pp. 64-68, 2014.
Soni, Aarti and Suyash Agrawal, " Key Generation Using Genetic Algorithm for Image Encryption", International Journal of Computer Science and Mobile Computing , Vol. 2, No. 6, pp. 376-383, 2013. Fig. 5 Histogram of the original Image 2 and histogram of the encrypted image 2 methods Fig. 6
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Shahla Kharofa
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.