Computer Science and Engineering
p-ISSN: 2163-1484 e-ISSN: 2163-1492
2012; 2(5): 77-85
doi: 10.5923/j.computer.20120205.06
Nashwan A. Al-Romema 1, Abdulfatah S. Mashat 2, Ibrahim AlBidewi 2
1Faculty of Computing and Information Technology- Rabigh
2Faculty of Computing and Information Technology- Jeddah, King Abdulaziz University, P.O. Box 344, Rabigh 21911, Saudi Arabia
Correspondence to: Nashwan A. Al-Romema , Faculty of Computing and Information Technology- Rabigh.
Email: |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
The widely use of data digitization leads to the necessity of hiding the content of a message when it enters an insecure channel. The message prepared by the sender is encrypted before transmission. The encryption process requires an encryption algorithm and a key. In image cryptography, recently numbers of effective chaos-based image encryption schemes have been proposed. This paper presents a novel image encryption scheme which encrypts the pixels' RGB component instead of the pixels itself, where every pixel in the image will be extracted to its RGB triple, encrypted, and prepared to be transmitted. In the encryption process we use another image as a key, this image should be larger than or of the same size of the plain image that we intend to encrypt. The image encryption scheme introduced is based on chaotic systems. Simulation results show that the proposed image encryption scheme achieves high level of security, and reduces the encryption and the decryption time of image data.
Keywords: Image RGB Color Components, Image Encryption, Chaos-Based Encryption, Chaotic Maps
Figure 1. Typical architecture of chaos-based image encryption scheme |
Figure 2. Typical architecture of the proposed image cryptosystems |
Figure 3. Example of the proposed image encryption scheme |
(1) |
(2) |
(3) |
(4) |
Figure 4. Image encryption experimental result 1: (a) Plain- image, (b) Key image, (c) Encrypted image |
Figure 7. Image encryption experimental result 4 using Lena Image: (a) Plain- image, (b) Key image, (c) Encrypted image, (d) The decrypted image |