Skip to main content
Log in

An ultra robust session key based image cryptography

  • Technical Paper
  • Published:
Microsystem Technologies Aims and scope Submit manuscript

Abstract

Increased use of internet demands substantial protection for secret image file from any adversary, specifically during transmission. In the field of cryptography there are two role models: cryptographer and crypt-analyst/attacker. The cryptographer develops techniques to make sure certain safety and security for transmissions while the crypt-analyst attempts to undo the former’s work by cracking the same. The basic goal of our scheme is to design an image encryption model which is extra challenging against any attack. In our research article, we have introduced session key dependent image encryption technique wherein the session key is the function of an original secret key (known for a pair of sender and receiver one time forever at the beginning) and the present secret image to be encrypted. Additionally the scheme does not require extracting and remembering of session keys to construct the subsequent session keys although the keys change during each transmission. Besides, in our scheme a double encryption technique is required, which once again confirms that the technique we propose is more robust than the conventional image encryption techniques known till date and is capable of resisting cyber-attacks of such kinds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • AbuTaha M, Farajallah M, Tahboub R (2011) A practical one way hash algorithm based on matrix multiplication. Int J Comput Appl 23(2):34–38

    Google Scholar 

  • Acharya B, Panigrahy SK, Patra SK, Panda G (2010) Image encryption using advanced hill cipher algorithm. ACEEE Int J Signal Image Process 1(1):37–41

    Google Scholar 

  • Ahmad J, Khan MA, Ahmed F et al (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput Appl 30:1–11

    Google Scholar 

  • Barker E, Roginsky A (2011) Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A

  • Chakrabarti P, Bhuyan B, Chowdhuri A, Bhunia CT (2008) A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int J Comput Sci Netw Secur 8(5)

  • Chhotaray SK, Majhi J, Rath GS (2013) Encryption by Hill cipher and by a novel method using Chinese remainder theorem in Galois field. Int J Signal Imaging Syst Eng IJSISE 6(1):38–45 (Inderscience)

    Article  Google Scholar 

  • Goswami, Subhra R, Chakraborty SK, Bhunia A, Bhunia CT (2013) New approach towards generation of automatic variable key to achieve perfect security. In: 2013 10th International Conference on information technology: new generations, pp. 489–491. IEEE, 2013

  • Kak A (2015) Lecture notes on “computer and network security” in Lecture 15: hashing for message authentication

  • Khan HN, Chaudhuri A, Kar S, Roy P, Chaudhuri A (2015) Robust symmetric cryptography using plain-text variant session key. Int J Electron Secur Dig Forensics 7(1):30–40

    Article  Google Scholar 

  • Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460

    Article  Google Scholar 

  • Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433

    Article  Google Scholar 

  • Mishra DC, Sharma RK (2013) Grayscale-image encryption using random hill cipher over SLn(F) associated with discrete wavelet transformation. Appl Appl Math 8(2):777–791

    MATH  Google Scholar 

  • Murugan Brindha, Gounder Ammasai Gounden Nanjappa (2016) Image encryption scheme based on block-based confusion and multiple le-vels of diffusion. IET Comput Vis 10(6):593–602

    Article  Google Scholar 

  • Naskar PK, Chaudhuri A, Chaudhuri A (2014) A secure symmetric image encryption based on linear geometry. IEEE Conf Appl Innov Mobile Comput(AIMoC), pp. 67–74

  • Sreelaja N, Pai G, Vijayalakshmi A (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 9:2879–2895

    Article  Google Scholar 

  • Sridhar S, Sathishkumar R, Sudha GF (2017) Adaptive halftoned visual cryptography with improved quality and security. Multimedia Tools Appl. 76(1):815–834

    Article  Google Scholar 

  • Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. Int J Electron Commun 65:338–344

    Article  Google Scholar 

  • Wang X, Zhou G, Dai C, Chen J (2017) Optical image encryption with divergent illumination and asymmetric keys. IEEE Photon J 9(2):1

    Google Scholar 

  • Yamuna M, Ravi Rohith S, Mazumdar P, Gupta A (2013) Text encryption using matrices. Int J Appl Innov Eng Manag 2(3):265–268

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Das.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, H.N., Chaudhuri, A., Das, A. et al. An ultra robust session key based image cryptography. Microsyst Technol 26, 2193–2201 (2020). https://doi.org/10.1007/s00542-019-04518-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00542-019-04518-9

Navigation