An ILM-cosine transform-based improved approach to image encryption

被引:21
|
作者
Dua, Mohit [1 ]
Suthar, Arun [1 ]
Garg, Arpit [1 ]
Garg, Vaibhav [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
CT-ILM; Random order substitution; Image encryption; CC; MSE; MAP; CRYPTANALYSIS;
D O I
10.1007/s40747-020-00201-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The chaos-based cryptography techniques are used widely to protect digital information from intruders. The chaotic systems have some of special features that make them suitable for the purpose of encryption. These systems are highly unpredictable and are highly sensitive or responsive to the initial conditions, also known as butterfly effect. This sensitive dependence on initial conditions make these systems to exhibit an intricate dynamical behaviour. However, this dynamical behaviour is not much complex in simple one-dimensional chaotic maps. Hence, it becomes easy for an intruder to predict the contents of the message being sent. The proposed work in this paper introduces an improved method for encrypting images, which uses cosine transformation of 3-D Intertwining Logistic Map (ILM). The proposed approach has been split into three major parts. In the first part, Secure Hash Function-256 (SHA-256) is used with cosine transformed ILM (CT-ILM) to generate the chaotic sequence. This chaotic sequence is used by high-efficiency scrambling to reduce the correlations between the adjacent pixels of the image. In the second part, the image is rotated to move all the pixels away from their original position. In the third part, random order substitution is applied to change the value of image pixels. The effectiveness of the proposed method has been tested on a number of standard parameters such as correlation coefficient, Entropy and Unified average change in intensity. The proposed approach has also been tested for decryption parameters like mean square error and peak signal to noise ratio. It can easily be observed from the obtained results that the proposed method of image encryption is more secure and time efficient than some earlier proposed techniques. The approach works for both color and grey scale images.
引用
收藏
页码:327 / 343
页数:17
相关论文
共 50 条
  • [1] An ILM-cosine transform-based improved approach to image encryption
    Mohit Dua
    Arun Suthar
    Arpit Garg
    Vaibhav Garg
    Complex & Intelligent Systems, 2021, 7 : 327 - 343
  • [2] A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption
    Lima, Juliano B.
    da Silva, Edmar S.
    Campello de Souza, Ricardo M.
    2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 1071 - 1075
  • [3] Cosine-transform-based chaotic system for image encryption
    Hua, Zhongyun
    Zhou, Yicong
    Huang, Hejiao
    INFORMATION SCIENCES, 2019, 480 : 403 - 419
  • [4] Image encryption based on the finite field cosine transform
    Lima, J. B.
    Lima, E. A. O.
    Madeiro, F.
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (10) : 1537 - 1547
  • [5] Image Double Encryption Based on Parametric Discrete Cosine Transform
    Cao, Han
    Zhou, Yicong
    Chen, C. L. Philip
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [6] Light field image encryption based on steerable cosine number transform
    Lima, V. S.
    Ferreira, F. A. B. S.
    Madeiro, F.
    Lima, J. B.
    SIGNAL PROCESSING, 2023, 202
  • [7] Image encryption/decryption accelerator based on Fast Cosine Number Transform
    Xu, Zhiqiang
    Li, Zhenmin
    Han, Feng
    Wang, Xiaolei
    Du, Gaoming
    INTEGRATION-THE VLSI JOURNAL, 2025, 103
  • [8] Image Encryption with Discrete Fractional Cosine Transform and Chaos
    Zhang, Lin
    Wu, Jianhua
    Zhou, Nanrun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 61 - 64
  • [9] On the security of gyrator transform-based image encryption by chosen-plaintext attack
    Sang, Jun
    Alam, Mohammad. S.
    Cai, Bin
    OPTICAL PATTERN RECOGNITION XXVII, 2016, 9845
  • [10] Image encryption based on the multiple-order discrete fractional cosine transform
    Wu, Jianhua
    Zhang, Lin
    Zhou, Nanrun
    OPTICS COMMUNICATIONS, 2010, 283 (09) : 1720 - 1725