On the Sanctuary of a Combined Confusion and Diffusion based scheme for Image Encryption
Prajwalasimha S N1, Aishwarya V Kumar2, Arpitha C R3

1Prajwalasimha S N*, Department of Electronics & Communication Engineering, ATME College of Engineering, Mysuru, India.
2Aishwarya V Kumar, Department of Electronics & Communication Engineering, ATME College of Engineering, Mysuru, India.
3Arpitha C R, Department of Electronics & Communication Engineering, ATME College of Engineering, Mysuru, India.
Manuscript received on September 21, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 3258-3263 | Volume-9 Issue-1, October 2019 | Retrieval Number: A1422109119/2019©BEIESP | DOI: 10.35940/ijeat.A1422.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Confusion and diffusion are the frequently used embryonics in multimedia (image) encryption systems. Multimedia data protection against cryptanalysis can be effectually fortified by these techniques. Due to inherent properties of images such as high inter-pixel redundancy and bulk data capacity, encryption is performed in two stages: Confusion and Diffusion. In this article, a combined Pseudo Hadamard transformation in the confusion stage and Gingerbreadman chaotic substitution in the diffusion stage are used in the encryption phase of the algorithm. The strong correlation between contiguous elements in the host image is effectually reduced using Pseudo Hadamard transformation and entropy in the cipher image is enhanced using Gingerbreadman chaotic substitution. Secrete key length used in the algorithm is 128 bits, these are the initial conditions for Gingerbreadman chaotic generator. The elements of S-box in the substitution stage are considered from this random sequence generator. Experimental exploration including information entropy, correlation analysis, sensitivity analysis, key space analysis and computational complexity have been performed on set of standard images. Results obtained are better compared to many existing systems.
Keywords: Confusion,  Encryption,  Correlation,  Entropy,  Security,  Diffusion,  Multimedia.