A novel image encryption method based on invertible 3D maps and its security analysis

Yong Feng*, Juan Li, Fengling Han, Tohari Ahmad

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

This paper presents a novel invertible 3D maps based image encryption method. A 2D gray-level image is represented as an array of gray level values of the pixel, which can be considered as the third dimension. An invertible 3D maps are presented and utilized for image encryption. The proposed scheme combines the permutation and the substitution using the invertible 3D maps. All bits in the image data matrix are permuted during the operation of the 3D maps. Therefore 2D positions of image pixels are permuted, and 1D grey level values of the pixels are also substituted, that is two processes of image encryption, permutation and substitution, are performed simultaneously. The security abilities of the scheme are analyzed evaluated in detail, which shows that it has high level security. Simulation results validate the effectiveness of the proposed image encryption method.

Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationIECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society
Pages2186-2191
Number of pages6
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event37th Annual Conference of the IEEE Industrial Electronics Society, IECON 2011 - Melbourne, VIC, Australia
Duration: 7 Nov 201110 Nov 2011

Publication series

NameIECON Proceedings (Industrial Electronics Conference)

Conference

Conference37th Annual Conference of the IEEE Industrial Electronics Society, IECON 2011
Country/TerritoryAustralia
CityMelbourne, VIC
Period7/11/1110/11/11

Keywords

  • Visual cryptography
  • image coding
  • image encryption
  • image processing

Fingerprint

Dive into the research topics of 'A novel image encryption method based on invertible 3D maps and its security analysis'. Together they form a unique fingerprint.

Cite this