Abstract
Increased use of internet demands substantial protection for secret image file from any adversary, specifically during transmission. In the field of cryptography there are two role models: cryptographer and crypt-analyst/attacker. The cryptographer develops techniques to make sure certain safety and security for transmissions while the crypt-analyst attempts to undo the former’s work by cracking the same. The basic goal of our scheme is to design an image encryption model which is extra challenging against any attack. In our research article, we have introduced session key dependent image encryption technique wherein the session key is the function of an original secret key (known for a pair of sender and receiver one time forever at the beginning) and the present secret image to be encrypted. Additionally the scheme does not require extracting and remembering of session keys to construct the subsequent session keys although the keys change during each transmission. Besides, in our scheme a double encryption technique is required, which once again confirms that the technique we propose is more robust than the conventional image encryption techniques known till date and is capable of resisting cyber-attacks of such kinds.
Similar content being viewed by others
References
AbuTaha M, Farajallah M, Tahboub R (2011) A practical one way hash algorithm based on matrix multiplication. Int J Comput Appl 23(2):34–38
Acharya B, Panigrahy SK, Patra SK, Panda G (2010) Image encryption using advanced hill cipher algorithm. ACEEE Int J Signal Image Process 1(1):37–41
Ahmad J, Khan MA, Ahmed F et al (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput Appl 30:1–11
Barker E, Roginsky A (2011) Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A
Chakrabarti P, Bhuyan B, Chowdhuri A, Bhunia CT (2008) A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int J Comput Sci Netw Secur 8(5)
Chhotaray SK, Majhi J, Rath GS (2013) Encryption by Hill cipher and by a novel method using Chinese remainder theorem in Galois field. Int J Signal Imaging Syst Eng IJSISE 6(1):38–45 (Inderscience)
Goswami, Subhra R, Chakraborty SK, Bhunia A, Bhunia CT (2013) New approach towards generation of automatic variable key to achieve perfect security. In: 2013 10th International Conference on information technology: new generations, pp. 489–491. IEEE, 2013
Kak A (2015) Lecture notes on “computer and network security” in Lecture 15: hashing for message authentication
Khan HN, Chaudhuri A, Kar S, Roy P, Chaudhuri A (2015) Robust symmetric cryptography using plain-text variant session key. Int J Electron Secur Dig Forensics 7(1):30–40
Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460
Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433
Mishra DC, Sharma RK (2013) Grayscale-image encryption using random hill cipher over SLn(F) associated with discrete wavelet transformation. Appl Appl Math 8(2):777–791
Murugan Brindha, Gounder Ammasai Gounden Nanjappa (2016) Image encryption scheme based on block-based confusion and multiple le-vels of diffusion. IET Comput Vis 10(6):593–602
Naskar PK, Chaudhuri A, Chaudhuri A (2014) A secure symmetric image encryption based on linear geometry. IEEE Conf Appl Innov Mobile Comput(AIMoC), pp. 67–74
Sreelaja N, Pai G, Vijayalakshmi A (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 9:2879–2895
Sridhar S, Sathishkumar R, Sudha GF (2017) Adaptive halftoned visual cryptography with improved quality and security. Multimedia Tools Appl. 76(1):815–834
Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. Int J Electron Commun 65:338–344
Wang X, Zhou G, Dai C, Chen J (2017) Optical image encryption with divergent illumination and asymmetric keys. IEEE Photon J 9(2):1
Yamuna M, Ravi Rohith S, Mazumdar P, Gupta A (2013) Text encryption using matrices. Int J Appl Innov Eng Manag 2(3):265–268
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, H.N., Chaudhuri, A., Das, A. et al. An ultra robust session key based image cryptography. Microsyst Technol 26, 2193–2201 (2020). https://doi.org/10.1007/s00542-019-04518-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00542-019-04518-9