Abstract
Digital image cryptography has the greatest priority with the rise and authenticity of the multimodal data. Encryption is known to be a very critical step in the security of multimedia applications. This paper proposes the Playfair, and OTP based image encryption-compression method using integer Haar transform. Initially, the proposed method encrypts the image using integer Haar transform with the One Time Pad (OTP) algorithm and the Playfair encoding. Finally, Inverse Discrete Wavelet Transform (IDWT) is applied to get the ciphered encoded image. The decoding part is driven automatically by inverting the operations of the encoding part. The quality of encrypted-decrypted images is assessed using Histogram Analysis, NPCR, UACI, PSNR, SSIM, GLCM correlation coefficient and Entropy. It is evident from visual inspection of the images and quality assessment parameters that the proposed method works effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sneha, P.S., Sankar, S., Kumar, A.S.: A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps. J. Ambient Intell. Human. Comput. 11(3), 1289–1308 (2019). https://doi.org/10.1007/s12652-019-01385-0
Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22, 1–23 (2020). https://doi.org/10.3390/e22111253
Dongare, A.S., Alvi, A.S., Tarbani, P.N.M.: An efficient technique for image encryption and decryption for secured multimedia application. Int. Res. J. Eng. Technol. 4, 3186–3190 (2017)
Ullah, A., Jamal, S.S., Shah, T.: A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 91(1), 359–370 (2017). https://doi.org/10.1007/s11071-017-3874-6
Aljawarneh, S., Yassein, M.B., Talafha, W.A.: A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools Appl. 76, 22703–22724 (2017). https://doi.org/10.1007/s11042-016-4333-y
Haider, M.I., Ali, A., Shah, D., Shah, T.: Block cipher’s nonlinear component design by elliptic curves: an image encryption application. Multimedia Tools Appl. 80(3), 4693–4718 (2020). https://doi.org/10.1007/s11042-020-09892-5
Sultana, S.F., Shubhangi, D.C.: Video encryption algorithm and key management using perfect shuffle. Int. J. Eng. Res. Appl. 7, 01–05 (2017). https://doi.org/10.9790/9622-0707030105
Abdelfatah, R.I., Nasr, M.E., Alsharqawy, M.A.: Encryption for multimedia based on chaotic map: several scenarios. Multimedia Tools Appl. 79(27–28), 19717–19738 (2020). https://doi.org/10.1007/s11042-020-08788-8
Belazi, A., Abd El-Latif, A.A., Rhouma, R., Belghith, S.: Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference, pp. 606–610 (2015). https://doi.org/10.1109/IWCMC.2015.7289152
Chakravarthy, S., Venkatesan, S.P., Anand, J.M., Ranjani, J.J.: Enhanced playfair cipher for image encryption using integer wavelet transform. Indian J. Sci. Technol. 9 (2016). https://doi.org/10.17485/ijst/2016/v9i39/86519
Vaish, A., Kumar, M.: Color image encryption using MSVD, DWT and Arnold transform in fractional Fourier domain. Optik (Stuttg) 145, 273–283 (2017). https://doi.org/10.1016/j.ijleo.2017.07.041
Sangavi, V., Thangavel, P.: An image encryption algorithm based on fractal geometry. In: Procedia Computer Science, pp. 462–469 (2019)
Wang, C., Zhang, X., Zheng, Z.: An efficient image encryption algorithm based on a novel chaotic map. Multimedia Tools Appl. 76(22), 24251–24280 (2016). https://doi.org/10.1007/s11042-016-4102-y
Chai, X., Yang, K., Gan, Z.: A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools Appl. 76(7), 9907–9927 (2016). https://doi.org/10.1007/s11042-016-3585-x
Huang, X., Ye, G.: An image encryption algorithm based on irregular wave representation. Multimedia Tools Appl. 77(2), 2611–2628 (2017). https://doi.org/10.1007/s11042-017-4455-x
Sheela, S.J., Suresh, K.V., Tandur, D.: Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools Appl. 77(19), 25223–25251 (2018). https://doi.org/10.1007/s11042-018-5782-2
Patro, K.A.K., Acharya, B., Nath, V.: Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsyst. Technol. 25(12), 4593–4607 (2019). https://doi.org/10.1007/s00542-019-04395-2
Sindhu, S.: Cryptographic algorithms : applications in network security. Int. J. New Innov. Eng. Technol. 7, 18–28 (2017)
Fadhel Hamood, S., Mohd Rahim, M.S., Farook Mohammado, O.: Chaos image encryption methods: a survey study. Bull. Electr. Eng. Inform. 6, 99–104 (2017). https://doi.org/10.11591/eei.v6i1.599
Kumar, M., Saxena, A., Vuppala, S.S.: A survey on chaos based image encryption techniques. In: Hosny, K.M. (ed.) Multimedia Security Using Chaotic Maps: Principles and Methodologies. SCI, vol. 884, pp. 1–26. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-38700-6_1
Roy, M., Mali, K., Chatterjee, S., Chakraborty, S., Debnath, R., Sen, S.: A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019, pp. 881–886. Institute of Electrical and Electronics Engineers Inc. (2019)
Malik, M.G.A., Bashir, Z., Iqbal, N., Imtiaz, M.A.: Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8, 88093–88107 (2020). https://doi.org/10.1109/ACCESS.2020.2990170
Bagul, A., Sonawane, P., Sawant, L., Doshi, R.: Advance security in cloud computing for military weapons. Int. Res. J. Eng. Technol. 4, 1511–1513 (2017)
Fuqua, P.B.: Dear Author. Int. J. Psychoanal. Self Psychol. 4, 398–400 (2009). https://doi.org/10.1080/15551020902995363
Wang, X., Su, Y.: Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform. Sci. Rep. 10, 1–19 (2020). https://doi.org/10.1038/s41598-020-75562-z
Mathur, S.K., Srivastava, S.: Extended 16x16 playfair cipher algorithm for secure key exchange using RSA algorithm. Int. J. Sci. Innov. Res. 5, 75–81 (2017)
Xu, Q., Sun, K., He, S., Zhu, C.: An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt. Lasers Eng. 134, 106178 (2020). https://doi.org/10.1016/j.optlaseng.2020.106178
Yao, S., Chen, L., Zhong, Y.: An encryption system for color image based on compressive sensing. Opt. Laser Technol. 120, 105703 (2019). https://doi.org/10.1016/j.optlastec.2019.105703
Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019). https://doi.org/10.1016/j.sigpro.2019.02.016
Alshoura, W.H., Zainol, Z., Teh, J.S., Alawida, M.: A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8, 43391–43406 (2020). https://doi.org/10.1109/ACCESS.2020.2978186
Alawida, M., Teh, J.S., Samsudin, A., Alshoura, W.H.: An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164, 249–266 (2019). https://doi.org/10.1016/j.sigpro.2019.06.013
Zhang, D., Liao, X., Yang, B., Zhang, Y.: A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimedia Tools Appl. 77(2), 2191–2208 (2017). https://doi.org/10.1007/s11042-017-4370-1
Albahrani, E.A., Maryoosh, A.A., Lafta, S.H.: Block image encryption based on modified playfair and chaotic system. J. Inf. Secur. Appl. 51 (2020). https://doi.org/10.1016/j.jisa.2019.102445
Ghrare, S.E., Ali, M.A.M., Ismail, M., Jumari, K.: Diagnostic quality of compressed medical images: objective and subjective evaluation. In: 2008 Second Asia International Conference on Modelling & Simulation (AMS), pp. 923–927. IEEE (2008)
Elahi, S., kaleem, M., Omer, H.: Compressively sampled MR image reconstruction using generalized thresholding iterative algorithm. J. Magn. Reson. 286, 91–98 (2018). https://doi.org/10.1016/j.jmr.2017.11.008
Nanni, L., Brahnam, S., Ghidoni, S., Menegatti, E., Barrier, T.: Different approaches for extracting information from the co-occurrence matrix. PLoS One 8, 83554 (2013). https://doi.org/10.1371/journal.pone.0083554
Chai, H.Y., Wee, L.K., Swee, T.T., Hussain, S.: Gray-level co-occurrence matrix bone fracture detection. WSEAS Trans. Syst. 10, 7–16 (2011)
Samhita, P., Prasad, P., Abhimanyu Kumar Patro, K., Acharya, B.: A secure chaos-based image encryption and decryption using crossover and mutation operator. Int. J. Control Theory Appl. 9, 17–28 (2016)
Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52, 563–571 (2013). https://doi.org/10.1007/s11235-011-9461-0
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput. 24(5), 3829–3848 (2019). https://doi.org/10.1007/s00500-019-04151-8
Zhang, X., Wang, L., Cui, G., Niu, Y.: Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int. J. Opt. 2019 (2019). https://doi.org/10.1155/2019/3594534
Verma, O.P., Nizam, M., Ahmad, M.: Modified multi-chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9, 271–286 (2013). https://doi.org/10.3745/JIPS.2013.9.2.271
Mondal, B., Kumar, P., Singh, S.: A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools Appl. 77(23), 31177–31198 (2018). https://doi.org/10.1007/s11042-018-6214-z
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shakir, H.R., Yassir, S.A. (2021). Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-16-8059-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8058-8
Online ISBN: 978-981-16-8059-5
eBook Packages: Computer ScienceComputer Science (R0)