Skip to main content

A Novel Image Encryption Technique for Grey and Color Digital Images

  • Conference paper
  • First Online:
Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing (ICCIC 2022)

Part of the book series: Cognitive Science and Technology ((CSAT))

Included in the following conference series:

  • 195 Accesses

Abstract

Digital images require a high level of security while being sent over a transmission medium. If the data in these images is vulnerable to unauthorized use, this could lead to major problems. There are several techniques for protecting digital images. Encryption is the effective approach for protecting digital images. In encryption methods, confusion and diffusion are the two major stages. This paper introduces a novel chaotic map-based encryption technique for the encryption of digital images. Discrete wavelet transform (DWT)-based image blocks are the basis of a novel method for decomposing images is introduced. Then, the image blocks were permutated randomly, rotated, and arranged in a zigzag pattern to scramble the image blocks. The encrypted image is decrypted using a key generated from a chaotic logistic map. Through the use of security analysis, PSNR, and MSME, we are able to determine how effective our proposed method is at encrypting digital images. When compared to other methods, the results show that the proposed technique attain significant amount of performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320–329

    Article  Google Scholar 

  2. Usman MA, Usman MR (2018) Using image steganography for providing enhanced medical data security. In: Proceedings 15th IEEE annual consumer communication network conference (CCNC)

    Google Scholar 

  3. Hosny KM, Darwish MM, Li K, Salah A (2018) Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6:77212–77225

    Article  Google Scholar 

  4. Hosny KM, Darwish MM (2018) Robust color image watermarking using invariant quaternion Legendre-Fourier moments. Multim Tools Appl 77(19):24727–24750

    Article  Google Scholar 

  5. Hosny KM, Darwish MM (2019) Resilient color image watermarking using accurate quaternion radial substituted Chebyshev moments. ACM Trans Multim Comput Commun Appl 15(2):1–25

    Google Scholar 

  6. Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643–650

    Article  Google Scholar 

  7. Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multim Tools Appl 77(17):22787–22808

    Article  Google Scholar 

  8. Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimensional Syst Signal Process 30(4):1637–1657

    Article  MATH  Google Scholar 

  9. Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154

    Article  Google Scholar 

  10. Chen J, Chen L, Zhang LY, Zhu Z-L (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96(1):301–322

    Article  Google Scholar 

  11. Ke G, Wang H, Zhou S, Zhang H (2019) Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement 135:385–391

    Article  Google Scholar 

  12. Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667–36681

    Article  Google Scholar 

  13. Mishra Z, Acharya B (2020) High throughput and low area architectures of secure IoT algorithm for medical image encryption. J Inf Secur Appl 53, Art no 102533

    Google Scholar 

  14. Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik 147:88–102

    Article  Google Scholar 

  15. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144

    Article  Google Scholar 

  16. Chen M, Ma G, Tang C, Lei Z (2020) Generalized optical encryption framework based on Shearlets for medical image. Opt Lasers Eng 128, Art no 106026

    Google Scholar 

  17. Cao W, Zhou Y, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109

    Google Scholar 

  18. Munson DC (1996) A note on Lena. In: IEEE Trans Image Process 5(1):3–3. https://doi.org/10.1109/TIP.1996.8100841

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaik Kashif Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hussain, S.K., Saheb Basha, S. (2023). A Novel Image Encryption Technique for Grey and Color Digital Images. In: Kumar, A., Ghinea, G., Merugu, S. (eds) Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. ICCIC 2022. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-99-2742-5_66

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-2742-5_66

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-2741-8

  • Online ISBN: 978-981-99-2742-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics