Skip to main content

Pseudo-Hadamard Transformation-Based Image Encryption Scheme

  • Chapter
  • First Online:
Integrated Intelligent Computing, Communication and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 771))

Abstract

In this chapter, a pseudo-Hadamard transform (PHT)-based image encryption technique has been proposed. Images are characterized by high interpixel redundancy. This can be varied in two phases: transformation and substitution. Correlation between adjacent pixels can be varied by the transformation phase. Pixel value variation can be made in the substitution phase. Encryption of some standard images has been done, and performance analysis is made based on correlation, entropy, mean square errors, number of pixel change rate (NPCR) and unified average changing intensity (UACI). The results obtained are comparatively better considering those of existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balouch, Zaheer Abbas, Muhammad Imran Aslam and Irfan Ahmed. 2017. Energy efficient image encryption algorithm. In Proceedings of international conference on innovations in electrical engineering and computational technologies (ICIEECT).

    Google Scholar 

  2. Prajwalasimha, S.N., and S.R. Bhagyashree. 2017. Image Encryption using Discrete Radon Transformation and Non chaotic Substitution. In Proceedings of IEEE international conference on electrical, computer and communication technologies (ICECCT), vol. 2, 842–846.

    Google Scholar 

  3. Prajwalasimha, S.N., and Usha Surendra. Multimedia data encryption based on discrete dyadic transformation. In Proceedings of IEEE international conference on signal processing and communication, 492–495, July 2017, Coimbatore, Tamil Nadu, India.

    Google Scholar 

  4. Liu, Lingfeng, Suoxia Miao, Hanping Hu and Mengfan Cheng. N-phase logistic chaotic sequence and its application for image encryption. IET Signal Processing 10 (9): 1096–1104.

    Article  Google Scholar 

  5. Reddy, P. Venkata Narasa, and Rajasekhar Karumuri. 2016. Image encryption and decryption in RNS domain based on moduli set. In Proceedings of international conference on communication and electronics systems (ICCES).

    Google Scholar 

  6. Hou, Jialin, Rui Xi, Ping Liu and Tianliang Liu. The switching fractional order chaotic system and its application to image encryption. IEEE/CAA Journal of Automatica Sinica 4 (2): 381–388.

    Google Scholar 

  7. Celİk,Kayhan, and Erol Kurt. 2016. A new image encryption algorithm based on lorenz system. In Proceedings of international conference on electronics, computers and artificial intelligence (ECAI).

    Google Scholar 

  8. Zahmoul, Rim, and Mourad Zaied. 2016. Toward new family beta maps for chaotic image encryption. In Proceedings of IEEE international conference on systems, man, and cybernetics (SMC).

    Google Scholar 

  9. Slimane, Nabil Ben, Kais Bouallegue, and Mohsen Machhout. 2016. Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1. In 4th international conference on control engineering & information technology (CEIT).

    Google Scholar 

  10. Cui, Delong, Lei Shu, Yuanfang Chen, and Xiaoling Wu. Image encryption using block based transformation with fractional Fourier transform. In 8th International conference on communications and networking in China (CHINACOM), Aug 2013.

    Google Scholar 

  11. Hazarika, Nitumoni, Sagarika Borah and Monjul Saikia. 2014. A wavelet based partial image encryption using chaotic logistic map. In Proceedings of IEEE international conference on advanced communication control and computing technologies (ICACCCT), 1–5.

    Google Scholar 

  12. Goel, Anis, and Kaustubh Chaudhari. 2016. Median based pixel selection for partial image encryption. In Sixth international conference on image processing theory, tools and applications (IPTA).

    Google Scholar 

  13. Ni, Zhengchao, Xuejing Kang and Lei Wang. 2016. A novel image encryption algorithm based on bit-level improved Arnold transform and hyper chaotic map. In IEEE international conference on signal and image processing.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. N. Prajwalasimha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prajwalasimha, S.N. (2019). Pseudo-Hadamard Transformation-Based Image Encryption Scheme. In: Krishna, A., Srikantaiah, K., Naveena, C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-10-8797-4_58

Download citation

Publish with us

Policies and ethics