Skip to main content

2018 | OriginalPaper | Buchkapitel

An Image Encryption Scheme Using Chaotic Sequence for Pixel Scrambling and DFrFT

verfasst von : Harish Sharma, Narendra Khatri

Erschienen in: Proceedings of First International Conference on Smart System, Innovations and Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Now a day digitalization is everywhere in the world, and there is a huge amount of data transfer takes place every second on the internet. In this digital world major contribution of data as Images. The entire data transfer will take place on the internet, i.e., a public network, so the security of these Image data is very important. Image encryption can be done through different methods, these are cryptographic algorithms and various transforms were used for Image encryption. In this paper, an innovative Image encryption algorithm is proposed using Image Pixel Scrambling and DFrFT. The Image pixel scrambling operation is performed using the sequence generated by the chaotic function. The scrambled Image is encrypted through DFrFT. The developed algorithm improves the information security and the robustness of the system. The effectiveness and the efficiency of the proposed algorithm are verified from the simulation results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat X. Feng, X. Tian and S. Xia, “A novel Image encryption algorithm based on fractional fourier transform and magic cube rotation,” 2011 4th International Congress on Image and Signal Processing, Shanghai, 2011, pp. 1008–1011. doi:10.1109/CISP.2011.6100319 X. Feng, X. Tian and S. Xia, “A novel Image encryption algorithm based on fractional fourier transform and magic cube rotation,” 2011 4th International Congress on Image and Signal Processing, Shanghai, 2011, pp. 1008–1011. doi:10.​1109/​CISP.​2011.​6100319
2.
Zurück zum Zitat W. Zheng, Z. G. Cheng and Y. l. Cui, “Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes Decomposition,” 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 2008, pp. 1–4. doi:10.1109/WiCom.2008.773 W. Zheng, Z. G. Cheng and Y. l. Cui, “Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes Decomposition,” 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 2008, pp. 1–4. doi:10.​1109/​WiCom.​2008.​773
3.
Zurück zum Zitat K. K. Sharmaand Heena Jain, “Image encryption algorithm based on wavelet packet decomposition and discrete linear canonical transform”, Proc. SPIE8760, International Conference on Communication and Electronics System Design, 87601P (January 28, 2013); doi:10.1117/12.2012323 K. K. Sharmaand Heena Jain, “Image encryption algorithm based on wavelet packet decomposition and discrete linear canonical transform”, Proc. SPIE8760, International Conference on Communication and Electronics System Design, 87601P (January 28, 2013); doi:10.​1117/​12.​2012323
4.
Zurück zum Zitat H. Y. Zhang, “A New Image Scrambling Algorithm Based on Queue Transformation,” 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, 2007, pp. 1526–1530. doi:10.1109/ICMLC.2007.4370387 H. Y. Zhang, “A New Image Scrambling Algorithm Based on Queue Transformation,” 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, 2007, pp. 1526–1530. doi:10.​1109/​ICMLC.​2007.​4370387
5.
Zurück zum Zitat L. Xiang dong, Z. Junxing, Z. Jinhai, H. Xiqin, “Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation”, in International Journal of Computer Science and Network Security, VOL.8 No.1, 2008, pp. 64–68 L. Xiang dong, Z. Junxing, Z. Jinhai, H. Xiqin, “Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation”, in International Journal of Computer Science and Network Security, VOL.8 No.1, 2008, pp. 64–68
6.
7.
Zurück zum Zitat A. Koc, H. M. Ozaktas, C. Candan and M. A. Kutay, “Digital Computation of Linear Canonical Transforms,” in IEEE Transactions on Signal Processing, vol. 56, no. 6, pp. 2383–2394, June 2008. doi:10.1109/TSP.2007.912890 A. Koc, H. M. Ozaktas, C. Candan and M. A. Kutay, “Digital Computation of Linear Canonical Transforms,” in IEEE Transactions on Signal Processing, vol. 56, no. 6, pp. 2383–2394, June 2008. doi:10.​1109/​TSP.​2007.​912890
8.
Zurück zum Zitat S. Oraintara, “The generalized DFrFTs,” 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, USA, 2002, pp. II-1185-II-1188. doi:10.1109/ICASSP.2002.5744012 S. Oraintara, “The generalized DFrFTs,” 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, USA, 2002, pp. II-1185-II-1188. doi:10.​1109/​ICASSP.​2002.​5744012
11.
Zurück zum Zitat N. Jindal and K. Singh, “Image Encryption Using Discrete Fractional Transforms,” 2010 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, 2010, pp. 165–167. doi:10.1109/ARTCom.2010.9 N. Jindal and K. Singh, “Image Encryption Using Discrete Fractional Transforms,” 2010 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, 2010, pp. 165–167. doi:10.​1109/​ARTCom.​2010.​9
12.
13.
Zurück zum Zitat Jae Wan Shim and Ren´ee Gatignol, “How to obtain higher-order multivariate Hermite expansion of Maxwell–Boltzmann distribution by using Taylor expansion?” in R. Z. Angew. Math. Phys. (2013) 64: 473. doi:10.1007/s00033-012-0265-1 Jae Wan Shim and Ren´ee Gatignol, “How to obtain higher-order multivariate Hermite expansion of Maxwell–Boltzmann distribution by using Taylor expansion?” in R. Z. Angew. Math. Phys. (2013) 64: 473. doi:10.​1007/​s00033-012-0265-1
14.
Zurück zum Zitat H. Agrawal, D. Kalot, A. Jain and N. Kahtri, “Image encryption using various transforms-a brief comparative analysis,” 2014 Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), Kottayam, 2014, pp. 1–4. doi:10.1109/AICERA.2014.6908280 H. Agrawal, D. Kalot, A. Jain and N. Kahtri, “Image encryption using various transforms-a brief comparative analysis,” 2014 Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), Kottayam, 2014, pp. 1–4. doi:10.​1109/​AICERA.​2014.​6908280
15.
Zurück zum Zitat N. Khatri and N. Agrawal, “Double Image encryption using double pixel scrambling and linear canonical transform,” 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, 2013, pp. 1–5. doi:10.1109/ICCCNT.2013.6726546 N. Khatri and N. Agrawal, “Double Image encryption using double pixel scrambling and linear canonical transform,” 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, 2013, pp. 1–5. doi:10.​1109/​ICCCNT.​2013.​6726546
16.
Zurück zum Zitat X. Luo, J. Fan and J. Wu, “Single-channel color Image encryption based on the multiple-order DFrFT and chaotic scrambling,” 2012 IEEE International Conference on Information Science and Technology, Hubei, 2012, pp. 780–784. doi:10.1109/ICIST.2012.6221754 X. Luo, J. Fan and J. Wu, “Single-channel color Image encryption based on the multiple-order DFrFT and chaotic scrambling,” 2012 IEEE International Conference on Information Science and Technology, Hubei, 2012, pp. 780–784. doi:10.​1109/​ICIST.​2012.​6221754
Metadaten
Titel
An Image Encryption Scheme Using Chaotic Sequence for Pixel Scrambling and DFrFT
verfasst von
Harish Sharma
Narendra Khatri
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5828-8_46