Implementation on Magic Square Based Spatial Domain Image Obfuscation
Vybhavi. B1, Dr.K.Mani2,Dr.Umadevi3,Dr.S.Kumar Chandar4
1
Research Scholar, Department of computer science
Nehru Memorial College (Autonomous)Puthanampatti
Tiruchirappalli, Affiliated to Bharathidasan University,
Tamil Nadu-621007
2
Dr.K.Mani,Associate Professor Head
Department of computer science
Nehru Memorial College (Autonomous)Puthanampatti
Tiruchirappalli, Affiliated to Bharathidasan University,
Tamil Nadu.
3
Assistant Professor Department of computer science Nehru
Memorial College (Autonomous)Puthanampatti Tiruchirappalli,
Affiliated to Bharathidasan University,
Tamil Nadu.
, Abstract
One essential method for preventing unwanted access to sensitive images is digital image
encryption. A promising new approach to image encryption that has gained popularity recently
is the magic square methodology. Magic square-based encryption algorithms may produce a
large range of encryption keys and are simple to accept and use. Furthermore, hybrid picture
encryption algorithms that combine the benefits of several encryption approaches can be
created using magic squares. This paper gives a thorough introduction to the properties of
magic square-based digital image encryption. It implements current magic square values
correlated with RGB values using encryption techniques, this has been implemented looking at
the constraint to increase the speed transition. Images are encrypted using Raster Scan format.
Keywords: Digital image encryption, Magic square methodology, Raster Scan format,Contor
pairing function.
1. Introduction
In cryptography, image encryption is a procedure which converts plain image to an encrypted
image by employing a secret key. The decryption process decrypts the cipher image into the
original image by employing the secret key. The main objective of image encryption is to
encrypt the images for security purposes using cryptography techniques. When image reaches
intended receiver, he must first enter required keys. Based on the key and algorithm used by
the sender he can decrypt it. The entire image in the original format will appear to the
receiver. Thus, we encrypt and securely send images over the internet using encryption
algorithm [1].
Digital images are a common form of multimedia that are utilized extensively in various
contexts. Effective techniques to secure the data that images contain are constantly needed,
given the massive needed that are being shared publicly in various sectors, including the
military, medical, and political. Digital images are among the most widely used multimedia
and are utilized extensively in a variety of fields viz., politics, economics, education etc.
Certain industries, like business, military affairs, and medical care, are particularly concerned
about security during image transmission.
Despite being a very old field of study, encryption has a big influence on modern information
security. However, current encryption methods barely meet these expectations because of the
enormous quantity of digital image files and the requirement for real-time encryption [2]. Chaos
theory has been used in a variety of fields, including mathematics, physics, astronomy,
information technology, and more, since it was first introduced as a new field of study in the
1970s. It has continuously resulted in advancements in various fields. Image encryption with
cryptography is the process of using a secret key to transform a plain image into an encrypted
image. Using the secret key, the decryption procedure converts the cipher image back into the
original image. The primary goal of image encryption is to encrypt the images for security
purposes using cryptography techniques. Fig 1 shows the process of securing images through
image encryption
Vybhavi. B1, Dr.K.Mani2,Dr.Umadevi3,Dr.S.Kumar Chandar4
1
Research Scholar, Department of computer science
Nehru Memorial College (Autonomous)Puthanampatti
Tiruchirappalli, Affiliated to Bharathidasan University,
Tamil Nadu-621007
2
Dr.K.Mani,Associate Professor Head
Department of computer science
Nehru Memorial College (Autonomous)Puthanampatti
Tiruchirappalli, Affiliated to Bharathidasan University,
Tamil Nadu.
3
Assistant Professor Department of computer science Nehru
Memorial College (Autonomous)Puthanampatti Tiruchirappalli,
Affiliated to Bharathidasan University,
Tamil Nadu.
, Abstract
One essential method for preventing unwanted access to sensitive images is digital image
encryption. A promising new approach to image encryption that has gained popularity recently
is the magic square methodology. Magic square-based encryption algorithms may produce a
large range of encryption keys and are simple to accept and use. Furthermore, hybrid picture
encryption algorithms that combine the benefits of several encryption approaches can be
created using magic squares. This paper gives a thorough introduction to the properties of
magic square-based digital image encryption. It implements current magic square values
correlated with RGB values using encryption techniques, this has been implemented looking at
the constraint to increase the speed transition. Images are encrypted using Raster Scan format.
Keywords: Digital image encryption, Magic square methodology, Raster Scan format,Contor
pairing function.
1. Introduction
In cryptography, image encryption is a procedure which converts plain image to an encrypted
image by employing a secret key. The decryption process decrypts the cipher image into the
original image by employing the secret key. The main objective of image encryption is to
encrypt the images for security purposes using cryptography techniques. When image reaches
intended receiver, he must first enter required keys. Based on the key and algorithm used by
the sender he can decrypt it. The entire image in the original format will appear to the
receiver. Thus, we encrypt and securely send images over the internet using encryption
algorithm [1].
Digital images are a common form of multimedia that are utilized extensively in various
contexts. Effective techniques to secure the data that images contain are constantly needed,
given the massive needed that are being shared publicly in various sectors, including the
military, medical, and political. Digital images are among the most widely used multimedia
and are utilized extensively in a variety of fields viz., politics, economics, education etc.
Certain industries, like business, military affairs, and medical care, are particularly concerned
about security during image transmission.
Despite being a very old field of study, encryption has a big influence on modern information
security. However, current encryption methods barely meet these expectations because of the
enormous quantity of digital image files and the requirement for real-time encryption [2]. Chaos
theory has been used in a variety of fields, including mathematics, physics, astronomy,
information technology, and more, since it was first introduced as a new field of study in the
1970s. It has continuously resulted in advancements in various fields. Image encryption with
cryptography is the process of using a secret key to transform a plain image into an encrypted
image. Using the secret key, the decryption procedure converts the cipher image back into the
original image. The primary goal of image encryption is to encrypt the images for security
purposes using cryptography techniques. Fig 1 shows the process of securing images through
image encryption