Back to Search Start Over

A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators

Authors :
Mostafa Merras
Nabil El Akkad
Khalid Satori
Abderrahim Saaidi
Mohammed Es-sabry
Source :
Soft Computing. 24:3829-3848
Publication Year :
2019
Publisher :
Springer Science and Business Media LLC, 2019.

Abstract

In this work, we proposed a new approach to encrypt color images using two matrices with size of 16 × 16 whose integer values are between 0 and 255 generated randomly, and the bit-shift operators. These matrices are used to perform the first encryption phase. The first value of the first matrix is calculated from the pixels of each channel (red, green and blue) of the original image; the rest of the values are randomly generated; each value must be unique; the values of the second matrix are unique and generated randomly. The first encryption phase of the original image is done by digraph (two-digit sequence). We take the first digit in the first matrix, the second digit in the second matrix; then, we look in these matrices for the numbers that complete the rectangle. In the second encryption phase, we used a right circular shift of bits; the number of bits to shift is calculated according to a function which considers the values of the two matrices as well as their positions (row and column). Therefore, any change in the two keys (two matrices) will completely change the encrypted image. Our encryption system is resistant against brute force attacks, statistical attacks as well as differential attacks. The results are justified by applying several safety criteria, such as correlation coefficient, entropy and peak signal-to-noise ratio (PSNR). In addition, our method is very sensitive to the change made, either in the original image or in the two keys used for the encryption, which was justified by calculating the number of changing pixel rate (NPCR > 99.69) and the unified averaged changed intensity (UACI > 33.54).

Details

ISSN :
14337479 and 14327643
Volume :
24
Database :
OpenAIRE
Journal :
Soft Computing
Accession number :
edsair.doi...........fac6a99e3198a2bd41cf1a1e2df37180
Full Text :
https://doi.org/10.1007/s00500-019-04151-8