A symmetrical image encryption scheme in wavelet and time domain

被引:121
作者
Luo, Yuling [1 ]
Du, Minghui [2 ]
Liu, Junxiu [1 ]
机构
[1] Guangxi Normal Univ, Fac Elect Engn, Guilin 541004, Peoples R China
[2] S China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
The spatiotemporal-chaos system; Image encryption; Integer wavelets transform (IWT); Logistic map; TRANSFORM; SYSTEMS; CHAOS; MAPS;
D O I
10.1016/j.cnsns.2014.05.022
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:447 / 460
页数:14
相关论文
共 31 条
[1]  
Ahmad M, 2011, COMM COM INF SC, V169, P257
[2]  
Ahmed HEDH, 2007, INFORM-J COMPUT INFO, V31, P121
[3]  
[Anonymous], 2006, MODERN IMAGE QUALITY
[4]   Image and Video Encryption based on Dual Space-Filling Curves [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
COMPUTER JOURNAL, 2012, 55 (06) :667-685
[5]   Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2012, 61 (04) :876-887
[6]   Clarifying chaos: Examples and counterexamples [J].
Brown, R ;
Chua, LO .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (02) :219-249
[7]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[8]   Factoring wavelet transforms into lifting steps [J].
Daubechies, I ;
Sweldens, W .
JOURNAL OF FOURIER ANALYSIS AND APPLICATIONS, 1998, 4 (03) :247-269
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]   Image encryption based on a new total shuffling algorithm [J].
Gao, Tiegang ;
Chen, Zengqiang .
CHAOS SOLITONS & FRACTALS, 2008, 38 (01) :213-220