Description: Image Encryption based on the RGB PIXEL Transposition and Shuffling
Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties.
This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB.
Index Terms — Cryptography, Encryption, algorithm, cipher image
To Search:
File list (Check if you may need any files):
FINAL_UTKARSH\Correlation_Coefficient_function
.............\................................\prcorr2.c
.............\................................\prcorr2.dll
.............\................................\prcorr2.m
.............\................................\prcorr2.mexglx
.............\................................\prcorr2.mexw64
.............\histogram_gray
.............\..............\histogram_grayimage_dencrypted.m
.............\..............\histogram_grayimage_encrypted.m
.............\..............\histogram_grayimage_orignal.m
.............\..............\rgbdecrypted.m
.............\..............\rgbencrypted.m
.............\..............\rgborignal.m
.............\histogram_rgb
.............\.............\Decrypted_image_histogram.m
.............\.............\Encrypted_Image_histogram.m
.............\.............\orignal_image_histogram.m
.............\.............\rgbhist5.m
.............\image_encryption_shuffling matrix
.............\.................................\imageProcess_UTKARSH.m
.............\.................................\keyGen.m
.............\.................................\lena256X256.jpg
.............\.................................\main_file_UTKARSH.m
.............\.................................\randomize.m
.............\images_result
.............\.............\project
.............\.............\.......\results
.............\.............\.......\.......\final_output
.............\.............\.......\.......\............\decry_image.png
.............\.............\.......\.......\............\encry_image.png
.............\.............\.......\.......\............\orignal_image.png
.............\.............\.......\.......\histogram_gray
.............\.............\.......\.......\..............\decryptd.png
.............\.............\.......\.......\..............\encryptd.png
.............\.............\.......\.......\..............\orignal.png
.............\.............\.......\.......\..............\Thumbs.db
.............\.............\.......\.......\histogram_rgb
.............\.............\.......\.......\.............\decry
.............\.............\.......\.......\.............\.....\1.png
.............\.............\.......\.......\.............\.....\2.png
.............\.............\.......\.......\.............\.....\3.png
.............\.............\.......\.......\.............\.....\Thumbs.db
.............\.............\.......\.......\.............\ency
.............\.............\.......\.......\.............\....\1.png
.............\.............\.......\.......\.............\....\2.png
.............\.............\.......\.......\.............\....\3.png
.............\.............\.......\.......\.............\....\Thumbs.db
.............\.............\.......\.......\.............\orignal
.............\.............\.......\.......\.............\.......\1.png
.............\.............\.......\.......\.............\.......\2.png
.............\.............\.......\.......\.............\.......\3.png
.............\.............\.......\.......\.............\.......\Thumbs.db
.............\.............\.......\.......\test
.............\.............\.......\.......\....\Correlation Coefficient(encryption_image).png
.............\.............\.......\.......\....\Correlation Coefficient(orignal).png
.............\.............\.......\.......\....\error1.png
.............\.............\.......\.......\....\error3.png
.............\.............\.......\.......\....\NPCR_AND_UACI_test.png
.............\.............\.......\.......\....\Thumbs.db
.............\.............\.......\.......\Thumbs.db
.............\kk
.............\..\image_encryption_shuffling matrix
.............\..\.................................\Decoded.jpg
.............\..\.................................\Encoded.jpg
.............\..\.................................\imageProcess.m
.............\..\.................................\lena256X256.jpg
.............\..\.................................\main_file.m
.............\..\............................