Abstract
In this chapter, a pseudo-Hadamard transform (PHT)-based image encryption technique has been proposed. Images are characterized by high interpixel redundancy. This can be varied in two phases: transformation and substitution. Correlation between adjacent pixels can be varied by the transformation phase. Pixel value variation can be made in the substitution phase. Encryption of some standard images has been done, and performance analysis is made based on correlation, entropy, mean square errors, number of pixel change rate (NPCR) and unified average changing intensity (UACI). The results obtained are comparatively better considering those of existing algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Balouch, Zaheer Abbas, Muhammad Imran Aslam and Irfan Ahmed. 2017. Energy efficient image encryption algorithm. In Proceedings of international conference on innovations in electrical engineering and computational technologies (ICIEECT).
Prajwalasimha, S.N., and S.R. Bhagyashree. 2017. Image Encryption using Discrete Radon Transformation and Non chaotic Substitution. In Proceedings of IEEE international conference on electrical, computer and communication technologies (ICECCT), vol. 2, 842–846.
Prajwalasimha, S.N., and Usha Surendra. Multimedia data encryption based on discrete dyadic transformation. In Proceedings of IEEE international conference on signal processing and communication, 492–495, July 2017, Coimbatore, Tamil Nadu, India.
Liu, Lingfeng, Suoxia Miao, Hanping Hu and Mengfan Cheng. N-phase logistic chaotic sequence and its application for image encryption. IET Signal Processing 10 (9): 1096–1104.
Reddy, P. Venkata Narasa, and Rajasekhar Karumuri. 2016. Image encryption and decryption in RNS domain based on moduli set. In Proceedings of international conference on communication and electronics systems (ICCES).
Hou, Jialin, Rui Xi, Ping Liu and Tianliang Liu. The switching fractional order chaotic system and its application to image encryption. IEEE/CAA Journal of Automatica Sinica 4 (2): 381–388.
Celİk,Kayhan, and Erol Kurt. 2016. A new image encryption algorithm based on lorenz system. In Proceedings of international conference on electronics, computers and artificial intelligence (ECAI).
Zahmoul, Rim, and Mourad Zaied. 2016. Toward new family beta maps for chaotic image encryption. In Proceedings of IEEE international conference on systems, man, and cybernetics (SMC).
Slimane, Nabil Ben, Kais Bouallegue, and Mohsen Machhout. 2016. Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1. In 4th international conference on control engineering & information technology (CEIT).
Cui, Delong, Lei Shu, Yuanfang Chen, and Xiaoling Wu. Image encryption using block based transformation with fractional Fourier transform. In 8th International conference on communications and networking in China (CHINACOM), Aug 2013.
Hazarika, Nitumoni, Sagarika Borah and Monjul Saikia. 2014. A wavelet based partial image encryption using chaotic logistic map. In Proceedings of IEEE international conference on advanced communication control and computing technologies (ICACCCT), 1–5.
Goel, Anis, and Kaustubh Chaudhari. 2016. Median based pixel selection for partial image encryption. In Sixth international conference on image processing theory, tools and applications (IPTA).
Ni, Zhengchao, Xuejing Kang and Lei Wang. 2016. A novel image encryption algorithm based on bit-level improved Arnold transform and hyper chaotic map. In IEEE international conference on signal and image processing.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Prajwalasimha, S.N. (2019). Pseudo-Hadamard Transformation-Based Image Encryption Scheme. In: Krishna, A., Srikantaiah, K., Naveena, C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-10-8797-4_58
Download citation
DOI: https://doi.org/10.1007/978-981-10-8797-4_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8796-7
Online ISBN: 978-981-10-8797-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)