Seyed Mohammad Seyedzade, S. Mirzakuchaki, Reza Ebrahimi Atani
{"title":"A novel image encryption algorithm based on hash function","authors":"Seyed Mohammad Seyedzade, S. Mirzakuchaki, Reza Ebrahimi Atani","doi":"10.1109/IRANIANMVIP.2010.5941167","DOIUrl":null,"url":null,"abstract":"In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The main idea of the algorithm is to use one half of image data for encryption of the other half of the image reciprocally. Distinct characteristics of the algorithm are high security, high sensitivity and high speed that can be applied for encryption of gray-level and color images. The algorithm consists of two main sections: The first does preprocessing operation to shuffle one half of image. The second uses hash function to generate a random number mask. The mask is then XORed with the other part of the image which is going to be encrypted. The aim of this work is to increase the image entropy. Both security and performance aspects of the proposed algorithm are analyzed and satisfactory results are achieved in various rounds.","PeriodicalId":350778,"journal":{"name":"2010 6th Iranian Conference on Machine Vision and Image Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"62","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 6th Iranian Conference on Machine Vision and Image Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRANIANMVIP.2010.5941167","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 62
Abstract
In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The main idea of the algorithm is to use one half of image data for encryption of the other half of the image reciprocally. Distinct characteristics of the algorithm are high security, high sensitivity and high speed that can be applied for encryption of gray-level and color images. The algorithm consists of two main sections: The first does preprocessing operation to shuffle one half of image. The second uses hash function to generate a random number mask. The mask is then XORed with the other part of the image which is going to be encrypted. The aim of this work is to increase the image entropy. Both security and performance aspects of the proposed algorithm are analyzed and satisfactory results are achieved in various rounds.