Encryption Using Concatenation
Encryption Using Concatenation
large size. This encrypted image has high entropy and low N
1
correlation coefficient, so this encrypted image is more
difficult to understand compared to four separated images.
D( x )
N
i1
( xi - E ( x)) 2 , (3)
General Terms 1 N
Keywords cov(x,y)
Correlation coefficient, concatenation, entropy, histogram and rxy , (5)
image D( x ) D( y )
30
International Journal of Computer Applications (0975 – 8887)
Volume 98– No.14, July 2014
2.2.2 Substitution
This phase has following steps
Step 1: transform image matrix to one-dimensional array.
Step 2: pick 50 pixels in sequence and convert into bits.
Step 3: operate the XOR function on these bits with a key of
400 bits.
Step 4: operate a circular shift process on the result of step 3
with the help of key. Fig 4. Third image Fig 5. Fourth image
31
International Journal of Computer Applications (0975 – 8887)
Volume 98– No.14, July 2014
32
International Journal of Computer Applications (0975 – 8887)
Volume 98– No.14, July 2014
Fig 11. First half Fig 13. Decrypted image 1 Fig 14. Decrypted image 2
Image (size) In original image In encrypted image In original image In encrypted image
Figure 17 shows the correlation coefficient in encrypted image, number 4 shows the fourth image and number 5
image. In this figure, horizontal or x-axis represents the represents the concatenated image. In this figure, vertical or
images. At x-axis number 1 represents the first image, number y-axis represents the correlation coefficients in encrypted
2 illustrates the second image, number 3 shows the third
33
International Journal of Computer Applications (0975 – 8887)
Volume 98– No.14, July 2014
image. This figure confirms that image of large area has lower As, low correlation creates difficulty to guess the value of
correlation coefficient than image of small area. neighbor pixels so encrypted image is secured. Consequently,
this research concludes that a user should encrypt image after
concatenating them for higher security, provided that the user
want to send multiple images of the same size.
6. FUTURE WORK
As the condition is that dimensions of images should be same
to concatenate them, if images are not of the same dimension
then a sender can add extra bits in the smaller image to make
this image equal to other images.
A video is made up of multiple frames or images with little
differences and these frames have same dimensions. So, a
user can use this technique effectively in video encryption. To
make this technique suitable for videos, there is a need to
improve performance of this technique in terms of encryption
time. So that it will become usable for real time encryption
system.
7. ACKNOWLEDGEMENT
Author is thankful to his guides Mr. Akshat Agrawal and Mr.
Ankit Garg who give him an opportunity to carry out this
work. Author is also thankful to NPTEL which provides E-
learning through online Web and Video courses in
Fig 17. Correlation coefficient in encrypted image Engineering, Science and humanities streams.
IJCATM : www.ijcaonline.org 34