Abstract
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them so that such images, even if intercepted, will not be interpreted accurately. Such encryption is proposed with a two-layer image encryption scheme involving bit-level encryption in the time-frequency domain. The top layer consists of a bit of plane slicing the image, and each plane is then scrambled using a chaotic map and encrypted with a key generated from the same chaotic map. Next, image segmentation, followed by a Lifting Wavelet Transform, is used to scramble and encrypt each segment’s low-frequency components. Then, a chaotic hybrid map is used to scramble and encrypt the final layer. Multiple analyses were performed on the algorithm, and this proposed work achieved a maximum entropy of 7.99 and near zero correlation, evidencing the resistance towards statistical attacks. Further, the keyspace of the cryptosystem is greater than 2128, which can effectively resist a brute force attack. In addition, this algorithm requires only 2.1743 s to perform the encryption of a 256 × 256 sized 8-bit image on a host system with a Windows 10 operating system of 64-bit Intel(R) Core(TM) i5-7200U CPU at 2.5 GHz with 8 GB RAM.
Funder
Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference54 articles.
1. A Literature Review on Image Encryption Techniques;Khan;3D Res.,2014
2. A Comprehensive Review on Image Encryption Techniques;Kaur;Arch. Comput. Methods Eng.,2018
3. Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane;Jung;J. Real-Time Image Process.,2018
4. Huang, H.-Y., and Chang, S.-H. (July, January 29). A Lossless Data Hiding based on Discrete Haar Wavelet Transform. Proceedings of the IEEE International Conference on Computer and Information Technology, Bradford, UK.
5. Image cryptographic algorithm based on the Haar wavelet transform;Tedmori;Inf. Sci.,2014
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献