Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

3-Dimensional Multi-Linear Transformation Based Multimedia Cryptosystem

Author : S. N. Prajwalasimha

Published in: New Trends in Computational Vision and Bio-inspired Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, a new 3-dimensional real and discrete chaotic transformation technique is introduced in order to encrypt the information. The encryption algorithm involves two stages per round: Transformation and Substitution. In the transformation phase, the host image is subjected for three dimensional multi linear transformation (3D-MLT) along with the secrete image. The transformed image is subjected for substitution using S-box created by secrete keys. The cipher image is subjected to security tests which involves different statistical and analytical performance analysis. The obtained results prove high degree of security compared to existing techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Leo Yu Zhang, Yuansheng Liu, Fabio Pareschi, Kwok-Wo Wong and Riccardo Rovatti, Gianluca Setti, “On the Security of a Class of Diffusion Mechanisms for Image Encryption,” IEEE Transactions on Cybernetics, Vol. 48, No. 4, 2018, pp. 1163–1175.CrossRef Leo Yu Zhang, Yuansheng Liu, Fabio Pareschi, Kwok-Wo Wong and Riccardo Rovatti, Gianluca Setti, “On the Security of a Class of Diffusion Mechanisms for Image Encryption,” IEEE Transactions on Cybernetics, Vol. 48, No. 4, 2018, pp. 1163–1175.CrossRef
2.
go back to reference Xuanping Zhang, Zhongmeng Zhao and Jiayin Wang, “Chaotic image encryption based on circular substitution box and key stream buffer,” Signal Processing: Image Communication, Elsevier, Vol. 29, 2014, pp. 902–913. Xuanping Zhang, Zhongmeng Zhao and Jiayin Wang, “Chaotic image encryption based on circular substitution box and key stream buffer,” Signal Processing: Image Communication, Elsevier, Vol. 29, 2014, pp. 902–913.
3.
go back to reference Peiya Li and Kwok-Tung Lo, “A Content-Adaptive Joint Image Compression and Encryption Scheme,” IEEE Transactions on Multimedia, 2017, pp 1–9 Peiya Li and Kwok-Tung Lo, “A Content-Adaptive Joint Image Compression and Encryption Scheme,” IEEE Transactions on Multimedia, 2017, pp 1–9
4.
go back to reference Prajwalasimha S N et al., “Design and analysis of pseudo hadamard transformation and non-chaotic substitution based image encryption scheme,” Indonesian Journal of Electrical Engineering and Computer Science, Vol. 15, No. 3, 2019, pp. 1297–1304CrossRef Prajwalasimha S N et al., “Design and analysis of pseudo hadamard transformation and non-chaotic substitution based image encryption scheme,” Indonesian Journal of Electrical Engineering and Computer Science, Vol. 15, No. 3, 2019, pp. 1297–1304CrossRef
5.
go back to reference Prajwalasimha S N and Basavaraj L, “Performance Analysis of Transformation and Bogdonov Chaotic Substitution based Image Cryptosystem,” International Journal of Electrical and Computer Engineering, Vol. 10 , No. 1, 2019 Prajwalasimha S N and Basavaraj L, “Performance Analysis of Transformation and Bogdonov Chaotic Substitution based Image Cryptosystem,” International Journal of Electrical and Computer Engineering, Vol. 10 , No. 1, 2019
6.
go back to reference Prajwalasimha S.N. (2019) Pseudo-Hadamard Transformation-Based Image Encryption Scheme. In: Krishna A., Srikantaiah K., Naveena C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, SingaporeCrossRef Prajwalasimha S.N. (2019) Pseudo-Hadamard Transformation-Based Image Encryption Scheme. In: Krishna A., Srikantaiah K., Naveena C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, SingaporeCrossRef
7.
go back to reference Prajwalasimha S N and Basavaraj L, “Design and Implementation of Transformation and non-Chaotic Substitution based Image Cryptosystem,” International Journal of Engineering and Advanced Technology, Vol. 8, Issue 6, 2019 Prajwalasimha S N and Basavaraj L, “Design and Implementation of Transformation and non-Chaotic Substitution based Image Cryptosystem,” International Journal of Engineering and Advanced Technology, Vol. 8, Issue 6, 2019
8.
go back to reference Prajwalasimha S.N., Sidramappa, Kavya S.R., Hema A.S., Anusha H.C. (2020) Modified Gingerbreadman Chaotic Substitution and Transformation Based Image Encryption. In: Smys S., Tavares J., Balas V., Iliyasu A. (eds) Computational Vision and Bio-Inspired Computing. ICCVBIC 2019. Advances in Intelligent Systems and Computing, vol 1108. Springer, Cham Prajwalasimha S.N., Sidramappa, Kavya S.R., Hema A.S., Anusha H.C. (2020) Modified Gingerbreadman Chaotic Substitution and Transformation Based Image Encryption. In: Smys S., Tavares J., Balas V., Iliyasu A. (eds) Computational Vision and Bio-Inspired Computing. ICCVBIC 2019. Advances in Intelligent Systems and Computing, vol 1108. Springer, Cham
9.
go back to reference Prajwalasimha S N and Pavithra A C, “Digital Image Watermarking based on Successive Division,” Proceedings of IEEE International Conference on Communication and Electronics Systems, pp. 31–35, 2018 Prajwalasimha S N and Pavithra A C, “Digital Image Watermarking based on Successive Division,” Proceedings of IEEE International Conference on Communication and Electronics Systems, pp. 31–35, 2018
10.
go back to reference Prajwalasimha S N et al.,“ Digital Image Watermarking Based on Sine Transformation with Constant Co-Efficient,” Proceedings of the International Conference on Inventive Research in Computing Applications, pp. 21–24, 2018 Prajwalasimha S N et al.,“ Digital Image Watermarking Based on Sine Transformation with Constant Co-Efficient,” Proceedings of the International Conference on Inventive Research in Computing Applications, pp. 21–24, 2018
11.
go back to reference Prajwalasimha S N, et al., “Performance analysis of DCT and successive division based digital image watermarking scheme,” Indonesian Journal of Electrical Engineering and Computer Science, Vol. 15, No. 2, pp. 750–757, 2019CrossRef Prajwalasimha S N, et al., “Performance analysis of DCT and successive division based digital image watermarking scheme,” Indonesian Journal of Electrical Engineering and Computer Science, Vol. 15, No. 2, pp. 750–757, 2019CrossRef
12.
go back to reference S N Prajwalasimha, et al, “Digital Image Encryption based on Transformation and Henon Chaotic Substitution,” 2019 4th IEEE International Conference on Recent Trends on Electronics, Information, Communication and Technology, RTEICT 2019 - Proceedings S N Prajwalasimha, et al, “Digital Image Encryption based on Transformation and Henon Chaotic Substitution,” 2019 4th IEEE International Conference on Recent Trends on Electronics, Information, Communication and Technology, RTEICT 2019 - Proceedings
13.
go back to reference Prajwalasimha S N, et al., “On the Sanctuary of a Combined Confusion and Diffusion based scheme for Image Encryption,” International Journal of Engineering and Advanced Technology, Vol. 9, Issue 1, 3258-3263, 2019CrossRef Prajwalasimha S N, et al., “On the Sanctuary of a Combined Confusion and Diffusion based scheme for Image Encryption,” International Journal of Engineering and Advanced Technology, Vol. 9, Issue 1, 3258-3263, 2019CrossRef
14.
go back to reference Seddik Hassene, Maalaoui Najm Eddine, A new hybrid encryption technique permuting text and image based on hyperchaotic system, Proceedings of 2nd International Conference on Advanced Technologies for Signal and Image Processing, March 2016, pp. 63–68 Seddik Hassene, Maalaoui Najm Eddine, A new hybrid encryption technique permuting text and image based on hyperchaotic system, Proceedings of 2nd International Conference on Advanced Technologies for Signal and Image Processing, March 2016, pp. 63–68
15.
go back to reference Salwa K. Abd-El-Hafiz, Sherif H. AbdElHaleem and Ahmed G. Radwan “Permutation Techniques Based on Discrete Chaos and their Utilization in Image Encryption,” 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), June 2016 Salwa K. Abd-El-Hafiz, Sherif H. AbdElHaleem and Ahmed G. Radwan “Permutation Techniques Based on Discrete Chaos and their Utilization in Image Encryption,” 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), June 2016
16.
go back to reference Prajwalasimha S N and Usha Surendra,” Multimedia Data Encryption based on Discrete Dyadic Transformation,” Proc. IEEE International conference on Signal processing and Communication, pp. 492–496, 2017 Prajwalasimha S N and Usha Surendra,” Multimedia Data Encryption based on Discrete Dyadic Transformation,” Proc. IEEE International conference on Signal processing and Communication, pp. 492–496, 2017
17.
go back to reference Delong Cui, Lei Shu, Yuanfang Chen and Xiaoling Wu, “Image Encryption Using Block Based Transformation With Fractional Fourier Transform,” 8th International Conference on Communications and Networking in China (CHINACOM), Aug 2013 Delong Cui, Lei Shu, Yuanfang Chen and Xiaoling Wu, “Image Encryption Using Block Based Transformation With Fractional Fourier Transform,” 8th International Conference on Communications and Networking in China (CHINACOM), Aug 2013
18.
go back to reference S N Prajwalasimha, et al, “Image Encryption based on Pseudo Hadamard Transformation with Constant Co-efficient,” 2019 4th IEEE International Conference on Recent Trends on Electronics, Information, Communication and Technology, RTEICT 2019 - Proceedings S N Prajwalasimha, et al, “Image Encryption based on Pseudo Hadamard Transformation with Constant Co-efficient,” 2019 4th IEEE International Conference on Recent Trends on Electronics, Information, Communication and Technology, RTEICT 2019 - Proceedings
19.
go back to reference Zhengchao Ni, Xuejing Kang and Lei Wang, “A Novel Image Encryption Algorithm Based on Bit-level Improved Arnold Transform and Hyper Chaotic Map,” IEEE International Conference on signal and Image processing, 2016 Zhengchao Ni, Xuejing Kang and Lei Wang, “A Novel Image Encryption Algorithm Based on Bit-level Improved Arnold Transform and Hyper Chaotic Map,” IEEE International Conference on signal and Image processing, 2016
20.
go back to reference Nitumoni Hazarika, Sagarika Borah and Monjul Saikia “A Wavelet Based Partial Image Encryption using Chaotic Logistic Map,” Proceedings of IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014, pp. 1–5 Nitumoni Hazarika, Sagarika Borah and Monjul Saikia “A Wavelet Based Partial Image Encryption using Chaotic Logistic Map,” Proceedings of IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014, pp. 1–5
24.
go back to reference Xingyuan Wang, Xiaoqiang Zhu and Yingqian Zhang, “An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map,” IEEE Access Lett., vol. 6, 2018, pp. 23733–23746,CrossRef Xingyuan Wang, Xiaoqiang Zhu and Yingqian Zhang, “An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map,” IEEE Access Lett., vol. 6, 2018, pp. 23733–23746,CrossRef
Metadata
Title
3-Dimensional Multi-Linear Transformation Based Multimedia Cryptosystem
Author
S. N. Prajwalasimha
Copyright Year
2020
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-41862-5_1

Premium Partner