Open Access Open Access  Restricted Access Subscription Access

Image Encryption using Edge Map and Key Image


Affiliations
1 Research and Development Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, India
2 Department of Electronics and Computer Engineering, KL University, Guntur - 522502, Andhra Pradesh, India
 

Objective: An Image Encryption algorithm is proposed which uses an image as key and concept of Edge Map for Encryption. Method/Analysis: The proposed algorithm uses gradient operators like Sobel, Roberts, Prewitt and Canny edge detectors for generating the edge map of key image and which is used for encrypting the original image with xor operation. Findings: The encrypted image shows remarkable difference from the actual image which is shown in the histogram analysis and other statistical tests. Conclusion/Applications: The proposed algorithm achieves considerable level of encryption, which makes it suitable to be used in different applications. It is used for protection of images against various kinds of common attacks like brute force attacks.

Keywords

Cryptanalysis, Edge Map, Gradient Operators, Histogram Analysis, Image Encryption, Key Image
User

Abstract Views: 217

PDF Views: 0




  • Image Encryption using Edge Map and Key Image

Abstract Views: 217  |  PDF Views: 0

Authors

Shrija Somaraj
Research and Development Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, India
Mohammed Ali Hussain
Department of Electronics and Computer Engineering, KL University, Guntur - 522502, Andhra Pradesh, India

Abstract


Objective: An Image Encryption algorithm is proposed which uses an image as key and concept of Edge Map for Encryption. Method/Analysis: The proposed algorithm uses gradient operators like Sobel, Roberts, Prewitt and Canny edge detectors for generating the edge map of key image and which is used for encrypting the original image with xor operation. Findings: The encrypted image shows remarkable difference from the actual image which is shown in the histogram analysis and other statistical tests. Conclusion/Applications: The proposed algorithm achieves considerable level of encryption, which makes it suitable to be used in different applications. It is used for protection of images against various kinds of common attacks like brute force attacks.

Keywords


Cryptanalysis, Edge Map, Gradient Operators, Histogram Analysis, Image Encryption, Key Image



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i4%2F139421