New Image Encryption Method Based on two Stage Scrambling

Abstract

The purpose of digital image scrambling technology is to put a meaningful image into a disordered one to enhance the resistance ability against illegal attacks. This paper proposed an image scrambling algorithm based on idea of movement of elephant in the chess board the system consist of two main steps the first one rotate each diagonal by key generated from computing the standard deviation the second step include exchange the upper half of image with the lower half of image the proposed system shows a good result and we reach 100 percent accuracy in decryption thus the proposed system can be used by any application for secure transmitting.Keywords standard deviation, scramble, Encryption1-IntroductionThe advent of personal computers and the Internet has made it possible for anyone to distribute worldwide digital information easily and economically.Many applications like military image databases confidential video conferencing, medical imaging system, cable TV, online personal photograph album, etc. require reliable, fast and robust security system to store and transmit digital images[1]. In this environment, there are several security problems associated with the processing and transmission of digital images over an open network it is necessary to assure the confidentiality, the integrity and the authenticity of the digital image transmitted[2]. Also Encryption of images is different from that of text due to some intrinsic features of images such as redundancy of data, strong correlation among adjacent pixels, being less sensitive as compared to the text data i.e. a tiny change in the attribute of any pixel of the image does not drastically degrade the quality of the image and bulk capacity of data. To meet these challenges, a wide variety of cryptographic protocols have been appeared in the scientific literature [3]. In recent years, amount of research in the field of image encryption system is increasing day by day due to technological progress[4]. Image based cryptosystems are different from textual cryptosystems because of large amount of