Image Encryption using Various Transforms-A Brief Comparative Analysis

被引:0
|
作者
Agrawal, Hemlata [1 ]
Kalot, Dimple [1 ]
Jain, Ankita [1 ]
Kahtri, Narendra [1 ]
机构
[1] Chartered Inst Technol, Dept ECE, Aburoad, Rajasthan, India
关键词
Encryption & Decryption; Discrete Fractional Fourier Transform; Discrete Linear Canonical transform;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A comparative analysis for the gray scale image encryption technique is presented in this paper and more focus on security management of the bulk data (i.e. image) transfer in the secure way. This will provide authentication for user, ethical code, accuracy and safety of images which is travelling over internet while an image based data requires more effort during encryption & decryption. The most proposed architecture for encryption and decryption is developed with the same objective of an image using suitable user defined key. There are various methods by which image can be encrypted and decrypted to ensure the security. But here in this paper image encryption and decryption is performed using two major transforms i.e. Discrete Fractional Fourier Transform and Discrete Linear Canonical Transform.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Comparison of Encryption Levels for Image Security Using Various Transforms
    Sumathy, K.
    Tamilselvi, R.
    [J]. INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 244 - 248
  • [2] Optical image encryption using improper Hartley transforms and chaos
    Singh, Narendra
    Sinha, Aloka
    [J]. OPTIK, 2010, 121 (10): : 918 - 925
  • [3] MIXED FOURIER TRANSFORMS AND IMAGE ENCRYPTION
    Du, Nan
    Devineni, Sree
    Grigoryan, Artyom M.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 547 - 552
  • [4] Introducing real-time image encryption technology using key vault, various transforms, and phase masks
    Yadav, Poonam
    Singh, Hukum
    Khanna, Kavita
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (25) : 39099 - 39117
  • [5] Introducing real-time image encryption technology using key vault, various transforms, and phase masks
    Poonam Yadav
    Hukum Singh
    Kavita Khanna
    [J]. Multimedia Tools and Applications, 2023, 82 : 39099 - 39117
  • [6] Optical image encryption with Hartley transforms
    Chen, Linfei
    Zhao, Daomu
    [J]. OPTICS LETTERS, 2006, 31 (23) : 3438 - 3440
  • [7] A Review and Comparative Analysis of Various Encryption Algorithms
    Bhanot, Rajdeep
    Hans, Rahul
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 289 - 306
  • [8] Chaos based multiple image encryption using multiple canonical transforms
    Singh, Narendra
    Sinha, Aloka
    [J]. OPTICS AND LASER TECHNOLOGY, 2010, 42 (05): : 724 - 731
  • [9] Joint image compression-encryption using discrete fractional transforms
    Jindal, N.
    Singh, K.
    [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (05): : 265 - 272
  • [10] Comparative Analysis and Implementation of Image Encryption Algorithms
    Kaur, Rajinder
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (12): : 53 - 57