An ILM-cosine transform-based improved approach to image encryption

被引:18
|
作者
Dua, Mohit [1 ]
Suthar, Arun [1 ]
Garg, Arpit [1 ]
Garg, Vaibhav [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
CT-ILM; Random order substitution; Image encryption; CC; MSE; MAP; CRYPTANALYSIS;
D O I
10.1007/s40747-020-00201-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The chaos-based cryptography techniques are used widely to protect digital information from intruders. The chaotic systems have some of special features that make them suitable for the purpose of encryption. These systems are highly unpredictable and are highly sensitive or responsive to the initial conditions, also known as butterfly effect. This sensitive dependence on initial conditions make these systems to exhibit an intricate dynamical behaviour. However, this dynamical behaviour is not much complex in simple one-dimensional chaotic maps. Hence, it becomes easy for an intruder to predict the contents of the message being sent. The proposed work in this paper introduces an improved method for encrypting images, which uses cosine transformation of 3-D Intertwining Logistic Map (ILM). The proposed approach has been split into three major parts. In the first part, Secure Hash Function-256 (SHA-256) is used with cosine transformed ILM (CT-ILM) to generate the chaotic sequence. This chaotic sequence is used by high-efficiency scrambling to reduce the correlations between the adjacent pixels of the image. In the second part, the image is rotated to move all the pixels away from their original position. In the third part, random order substitution is applied to change the value of image pixels. The effectiveness of the proposed method has been tested on a number of standard parameters such as correlation coefficient, Entropy and Unified average change in intensity. The proposed approach has also been tested for decryption parameters like mean square error and peak signal to noise ratio. It can easily be observed from the obtained results that the proposed method of image encryption is more secure and time efficient than some earlier proposed techniques. The approach works for both color and grey scale images.
引用
收藏
页码:327 / 343
页数:17
相关论文
共 50 条
  • [41] Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform
    Shu Min Pan
    Ru Hong Wen
    Zhi Hong Zhou
    Nan Run Zhou
    Multimedia Tools and Applications, 2017, 76 : 2933 - 2953
  • [42] Joint medical image compression–encryption in the cloud using multiscale transform-based image compression encoding techniques
    S P Raja
    Sādhanā, 2019, 44
  • [43] Hyperchaotic image encryption using DNA coding and discrete cosine transform
    Lone, Parveiz Nazir
    Mir, Umar Hussain
    Gaffar, Abdul
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (17): : 13318 - 13338
  • [44] Partial encryption of color image using quaternion discrete cosine transform
    Fan, Jing
    Wang, Jinwei
    Sun, Xingming
    Li, Ting
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, 8 (10) : 171 - 190
  • [45] Image encryption with an improved cryptosystem based on a matrix approach
    Ramirez-Torres, M. T.
    Murguia, J. S.
    Mejia Carlos, M.
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2014, 25 (10):
  • [46] Asymmetric image encryption based on the Discrete Cosine Transform using Random Phase Masks.
    Anshula
    Singh, Hukum
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 184 - 187
  • [47] Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion
    Wu, Jianhua
    Zhang, Mengxia
    Zhou, Nanrun
    JOURNAL OF MODERN OPTICS, 2017, 64 (04) : 334 - 346
  • [48] Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain
    Sundaram, Gaurav
    Panna, Bhaskar
    Jha, Rajib Kumar
    Kumar, Sumit
    IET IMAGE PROCESSING, 2023, 17 (04) : 1195 - 1207
  • [49] Discrete cosine transform-based data hiding for speech bandwidth extension
    Koduri S.K.
    Kishore Kumar T.
    International Journal of Speech Technology, 2022, 25 (03): : 697 - 706
  • [50] Discrete Cosine Transform-Based Key Generation Scheme for Indoor Environment
    Suwadi
    Yuliana, Mike
    Wirawan
    2021 4TH INTERNATIONAL SEMINAR ON RESEARCH OF INFORMATION TECHNOLOGY AND INTELLIGENT SYSTEMS (ISRITI 2021), 2020,