Skip to main content

Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2021)

Abstract

Digital image cryptography has the greatest priority with the rise and authenticity of the multimodal data. Encryption is known to be a very critical step in the security of multimedia applications. This paper proposes the Playfair, and OTP based image encryption-compression method using integer Haar transform. Initially, the proposed method encrypts the image using integer Haar transform with the One Time Pad (OTP) algorithm and the Playfair encoding. Finally, Inverse Discrete Wavelet Transform (IDWT) is applied to get the ciphered encoded image. The decoding part is driven automatically by inverting the operations of the encoding part. The quality of encrypted-decrypted images is assessed using Histogram Analysis, NPCR, UACI, PSNR, SSIM, GLCM correlation coefficient and Entropy. It is evident from visual inspection of the images and quality assessment parameters that the proposed method works effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sneha, P.S., Sankar, S., Kumar, A.S.: A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps. J. Ambient Intell. Human. Comput. 11(3), 1289–1308 (2019). https://doi.org/10.1007/s12652-019-01385-0

    Article  Google Scholar 

  2. Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22, 1–23 (2020). https://doi.org/10.3390/e22111253

    Article  MathSciNet  Google Scholar 

  3. Dongare, A.S., Alvi, A.S., Tarbani, P.N.M.: An efficient technique for image encryption and decryption for secured multimedia application. Int. Res. J. Eng. Technol. 4, 3186–3190 (2017)

    Google Scholar 

  4. Ullah, A., Jamal, S.S., Shah, T.: A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 91(1), 359–370 (2017). https://doi.org/10.1007/s11071-017-3874-6

    Article  MathSciNet  Google Scholar 

  5. Aljawarneh, S., Yassein, M.B., Talafha, W.A.: A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools Appl. 76, 22703–22724 (2017). https://doi.org/10.1007/s11042-016-4333-y

    Article  Google Scholar 

  6. Haider, M.I., Ali, A., Shah, D., Shah, T.: Block cipher’s nonlinear component design by elliptic curves: an image encryption application. Multimedia Tools Appl. 80(3), 4693–4718 (2020). https://doi.org/10.1007/s11042-020-09892-5

    Article  Google Scholar 

  7. Sultana, S.F., Shubhangi, D.C.: Video encryption algorithm and key management using perfect shuffle. Int. J. Eng. Res. Appl. 7, 01–05 (2017). https://doi.org/10.9790/9622-0707030105

    Article  Google Scholar 

  8. Abdelfatah, R.I., Nasr, M.E., Alsharqawy, M.A.: Encryption for multimedia based on chaotic map: several scenarios. Multimedia Tools Appl. 79(27–28), 19717–19738 (2020). https://doi.org/10.1007/s11042-020-08788-8

    Article  Google Scholar 

  9. Belazi, A., Abd El-Latif, A.A., Rhouma, R., Belghith, S.: Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference, pp. 606–610 (2015). https://doi.org/10.1109/IWCMC.2015.7289152

  10. Chakravarthy, S., Venkatesan, S.P., Anand, J.M., Ranjani, J.J.: Enhanced playfair cipher for image encryption using integer wavelet transform. Indian J. Sci. Technol. 9 (2016). https://doi.org/10.17485/ijst/2016/v9i39/86519

  11. Vaish, A., Kumar, M.: Color image encryption using MSVD, DWT and Arnold transform in fractional Fourier domain. Optik (Stuttg) 145, 273–283 (2017). https://doi.org/10.1016/j.ijleo.2017.07.041

    Article  Google Scholar 

  12. Sangavi, V., Thangavel, P.: An image encryption algorithm based on fractal geometry. In: Procedia Computer Science, pp. 462–469 (2019)

    Google Scholar 

  13. Wang, C., Zhang, X., Zheng, Z.: An efficient image encryption algorithm based on a novel chaotic map. Multimedia Tools Appl. 76(22), 24251–24280 (2016). https://doi.org/10.1007/s11042-016-4102-y

    Article  Google Scholar 

  14. Chai, X., Yang, K., Gan, Z.: A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools Appl. 76(7), 9907–9927 (2016). https://doi.org/10.1007/s11042-016-3585-x

    Article  Google Scholar 

  15. Huang, X., Ye, G.: An image encryption algorithm based on irregular wave representation. Multimedia Tools Appl. 77(2), 2611–2628 (2017). https://doi.org/10.1007/s11042-017-4455-x

    Article  Google Scholar 

  16. Sheela, S.J., Suresh, K.V., Tandur, D.: Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools Appl. 77(19), 25223–25251 (2018). https://doi.org/10.1007/s11042-018-5782-2

    Article  Google Scholar 

  17. Patro, K.A.K., Acharya, B., Nath, V.: Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsyst. Technol. 25(12), 4593–4607 (2019). https://doi.org/10.1007/s00542-019-04395-2

    Article  Google Scholar 

  18. Sindhu, S.: Cryptographic algorithms : applications in network security. Int. J. New Innov. Eng. Technol. 7, 18–28 (2017)

    Google Scholar 

  19. Fadhel Hamood, S., Mohd Rahim, M.S., Farook Mohammado, O.: Chaos image encryption methods: a survey study. Bull. Electr. Eng. Inform. 6, 99–104 (2017). https://doi.org/10.11591/eei.v6i1.599

  20. Kumar, M., Saxena, A., Vuppala, S.S.: A survey on chaos based image encryption techniques. In: Hosny, K.M. (ed.) Multimedia Security Using Chaotic Maps: Principles and Methodologies. SCI, vol. 884, pp. 1–26. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-38700-6_1

    Chapter  Google Scholar 

  21. Roy, M., Mali, K., Chatterjee, S., Chakraborty, S., Debnath, R., Sen, S.: A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019, pp. 881–886. Institute of Electrical and Electronics Engineers Inc. (2019)

    Google Scholar 

  22. Malik, M.G.A., Bashir, Z., Iqbal, N., Imtiaz, M.A.: Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8, 88093–88107 (2020). https://doi.org/10.1109/ACCESS.2020.2990170

    Article  Google Scholar 

  23. Bagul, A., Sonawane, P., Sawant, L., Doshi, R.: Advance security in cloud computing for military weapons. Int. Res. J. Eng. Technol. 4, 1511–1513 (2017)

    Google Scholar 

  24. Fuqua, P.B.: Dear Author. Int. J. Psychoanal. Self Psychol. 4, 398–400 (2009). https://doi.org/10.1080/15551020902995363

    Article  Google Scholar 

  25. Wang, X., Su, Y.: Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform. Sci. Rep. 10, 1–19 (2020). https://doi.org/10.1038/s41598-020-75562-z

    Article  Google Scholar 

  26. Mathur, S.K., Srivastava, S.: Extended 16x16 playfair cipher algorithm for secure key exchange using RSA algorithm. Int. J. Sci. Innov. Res. 5, 75–81 (2017)

    Google Scholar 

  27. Xu, Q., Sun, K., He, S., Zhu, C.: An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt. Lasers Eng. 134, 106178 (2020). https://doi.org/10.1016/j.optlaseng.2020.106178

    Article  Google Scholar 

  28. Yao, S., Chen, L., Zhong, Y.: An encryption system for color image based on compressive sensing. Opt. Laser Technol. 120, 105703 (2019). https://doi.org/10.1016/j.optlastec.2019.105703

    Article  Google Scholar 

  29. Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019). https://doi.org/10.1016/j.sigpro.2019.02.016

    Article  Google Scholar 

  30. Alshoura, W.H., Zainol, Z., Teh, J.S., Alawida, M.: A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8, 43391–43406 (2020). https://doi.org/10.1109/ACCESS.2020.2978186

    Article  Google Scholar 

  31. Alawida, M., Teh, J.S., Samsudin, A., Alshoura, W.H.: An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164, 249–266 (2019). https://doi.org/10.1016/j.sigpro.2019.06.013

    Article  MATH  Google Scholar 

  32. Zhang, D., Liao, X., Yang, B., Zhang, Y.: A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimedia Tools Appl. 77(2), 2191–2208 (2017). https://doi.org/10.1007/s11042-017-4370-1

    Article  Google Scholar 

  33. Albahrani, E.A., Maryoosh, A.A., Lafta, S.H.: Block image encryption based on modified playfair and chaotic system. J. Inf. Secur. Appl. 51 (2020). https://doi.org/10.1016/j.jisa.2019.102445

  34. Ghrare, S.E., Ali, M.A.M., Ismail, M., Jumari, K.: Diagnostic quality of compressed medical images: objective and subjective evaluation. In: 2008 Second Asia International Conference on Modelling & Simulation (AMS), pp. 923–927. IEEE (2008)

    Google Scholar 

  35. Elahi, S., kaleem, M., Omer, H.: Compressively sampled MR image reconstruction using generalized thresholding iterative algorithm. J. Magn. Reson. 286, 91–98 (2018). https://doi.org/10.1016/j.jmr.2017.11.008

  36. Nanni, L., Brahnam, S., Ghidoni, S., Menegatti, E., Barrier, T.: Different approaches for extracting information from the co-occurrence matrix. PLoS One 8, 83554 (2013). https://doi.org/10.1371/journal.pone.0083554

    Article  Google Scholar 

  37. Chai, H.Y., Wee, L.K., Swee, T.T., Hussain, S.: Gray-level co-occurrence matrix bone fracture detection. WSEAS Trans. Syst. 10, 7–16 (2011)

    MATH  Google Scholar 

  38. Samhita, P., Prasad, P., Abhimanyu Kumar Patro, K., Acharya, B.: A secure chaos-based image encryption and decryption using crossover and mutation operator. Int. J. Control Theory Appl. 9, 17–28 (2016)

    Google Scholar 

  39. Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52, 563–571 (2013). https://doi.org/10.1007/s11235-011-9461-0

    Article  Google Scholar 

  40. Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput. 24(5), 3829–3848 (2019). https://doi.org/10.1007/s00500-019-04151-8

    Article  Google Scholar 

  41. Zhang, X., Wang, L., Cui, G., Niu, Y.: Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int. J. Opt. 2019 (2019). https://doi.org/10.1155/2019/3594534

  42. Verma, O.P., Nizam, M., Ahmad, M.: Modified multi-chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9, 271–286 (2013). https://doi.org/10.3745/JIPS.2013.9.2.271

    Article  Google Scholar 

  43. Mondal, B., Kumar, P., Singh, S.: A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools Appl. 77(23), 31177–31198 (2018). https://doi.org/10.1007/s11042-018-6214-z

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haidar Raad Shakir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shakir, H.R., Yassir, S.A. (2021). Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8059-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8058-8

  • Online ISBN: 978-981-16-8059-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics