New image encryption approaches using combinational permutation and image transformation techniques

Other Title(s)

طرق تشفير جديدة باستخدام تقنيات دمج التبديل و تقنيات تشفير الصور

Dissertant

al-Kurji, Muhammad Katia Jawdah

Thesis advisor

Ulwan, Majid Abd al-Nabi

Comitee Members

Ali, Ramzi Salim
Marhun, Ali Fadil
Abd al-Qadir, Sabah S.

University

University of Basrah

Faculty

Engineering College

Department

Department of Electrical Engineering

University Country

Iraq

Degree

Master

Degree Date

2012

English Abstract

-The development of information technology and the rapid growth of computer networks allowed multimedia data, such as digital images, to be easily transmitted in open networks like the internet.

The security of multimedia data is becoming more and more important.

In this thesis, permutation techniques based image encryption approaches are presented.

Each approach is combined with other permutation techniques to obtain the encrypted image.

The first proposed approach is cascaded Iterated permutation (CIP) that iterated the pixels permutation of a grayscale image (256x256 pixels) for several times.

In the second proposed approach which is Cascaded Combined Permutation (CCP) decomposed the secrete grayscale image (256x256 pixels) into four quarters.

Each part is encrypted by using different permutation technique.

The encrypted quarters are combined and further encrypted with another permutation technique to produce the encrypted image.

The resulting encryption has several key points of strength such as the sequence order.

Another key points are the coefficients a, b for each permutation algorithm.

The permutation based image encryption technique gives a good encryption in terms of MSE and correlation For more security, it is needed to change the pixels position and value instead of changing position only.

FFT increase the degree of security by altering the pixels value.

The merging of the two approaches leds to strong encryption taking the benefits of each of the merged approach.

Another transform that changing the pixels position are Hadamard Transform (HT) and Walsh-Hadamard Transform (WHT).

So, the merging of the two approaches (CIP and CCP) with (HT & WHT) leds to an efficient and good encryption while conserve the size of encrypted image unchanged.

MATLAB 2008 is used in this thesis to simulate these algorithms.

Main Subjects

Electronic engineering

Topics

No. of Pages

104

Table of Contents

Table of contents.

Abstract.

Chapter One : introduction to the encryption.

Chapter Two : permutation.

Chapter Three : the proposed method.

Chapter Four : fast Fourier transform based image encryption.

Chapter Five : Hadamard and Walsh-Hadamard transform.

Chapter Six : conclusions and the future work.

References.

American Psychological Association (APA)

al-Kurji, Muhammad Katia Jawdah. (2012). New image encryption approaches using combinational permutation and image transformation techniques. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317171

Modern Language Association (MLA)

al-Kurji, Muhammad Katia Jawdah. New image encryption approaches using combinational permutation and image transformation techniques. (Master's theses Theses and Dissertations Master). University of Basrah. (2012).
https://search.emarefa.net/detail/BIM-317171

American Medical Association (AMA)

al-Kurji, Muhammad Katia Jawdah. (2012). New image encryption approaches using combinational permutation and image transformation techniques. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317171

Language

English

Data Type

Arab Theses

Record ID

BIM-317171