An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images


  • M. O. Al-Dwairi Department of Communication Technology Engineering, Al-Balqa' Applied University, Jordan
  • A. Y. Hendi Department of Communication Technology Engineering, Al-Balqa' Applied University, Jordan
  • Z. A. AlQadi Department of Computer Engineering, Al-Balqa' Applied University, Jordan


Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.


encryption-decryption times, throughput, speedup, MSE, PSNR


Download data is not yet available.


M. J. Aqel, Z. AlQadi, A. A. Abdullah, “RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication”, International Journal of Engineering and Technology, Vol. 7, No. 3.13, pp. 104-107, 2018 DOI:

J. Thakur, N. Kumar, “DES, AES, and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 2, pp. 6-12, 2011

S. A. M. Rizvi, S. Z. Hussain, N. Wadhwa, “A Comparative Study of Two Symmetric Encryption Algorithms across Different Platforms”, International Conference on Security and Management, World Academy of Science, Las Vegas, USA, July 18-21, 2011

S. Wang, Y. Zheng, Z. Gao, “A New Image Scrambling Method through Folding Transform”, IEEE International Conference on Computer Application and System Modeling, Taiyuan, China, October 22-24, 2010

J. N. Abdel-Jalil, “Performance analysis of color image encryptiondecryption techniques”, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016

G. Ye, “An Efficient Image Encryption Scheme based on Logistic maps”, International Journal of Pure and Applied Mathematics, Vol. 55, No. 1, pp. 37-47, 2009

T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013

H. Gao, Y. Zhang, S. Liang, D. Li, “A New Chaotic Algorithm for Image Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-399, 2006 DOI:

G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749–761, 2004 DOI:

K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, Article ID 173931, pp. pp. 1-13, 2012 DOI:

X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008


How to Cite

M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, “An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images”, Eng. Technol. Appl. Sci. Res., vol. 9, no. 3, pp. 4165–4168, Jun. 2019.


Abstract Views: 462
PDF Downloads: 296

Metrics Information
Bookmark and Share

Most read articles by the same author(s)