Pseudo-Hadamard Transformation-Based Image Encryption Scheme

  • S. N. Prajwalasimha
Part of the Studies in Computational Intelligence book series (SCI, volume 771)


In this chapter, a pseudo-Hadamard transform (PHT)-based image encryption technique has been proposed. Images are characterized by high interpixel redundancy. This can be varied in two phases: transformation and substitution. Correlation between adjacent pixels can be varied by the transformation phase. Pixel value variation can be made in the substitution phase. Encryption of some standard images has been done, and performance analysis is made based on correlation, entropy, mean square errors, number of pixel change rate (NPCR) and unified average changing intensity (UACI). The results obtained are comparatively better considering those of existing algorithms.


Encryption Redundancy Transformation Substitution 


  1. 1.
    Balouch, Zaheer Abbas, Muhammad Imran Aslam and Irfan Ahmed. 2017. Energy efficient image encryption algorithm. In Proceedings of international conference on innovations in electrical engineering and computational technologies (ICIEECT).Google Scholar
  2. 2.
    Prajwalasimha, S.N., and S.R. Bhagyashree. 2017. Image Encryption using Discrete Radon Transformation and Non chaotic Substitution. In Proceedings of IEEE international conference on electrical, computer and communication technologies (ICECCT), vol. 2, 842–846.Google Scholar
  3. 3.
    Prajwalasimha, S.N., and Usha Surendra. Multimedia data encryption based on discrete dyadic transformation. In Proceedings of IEEE international conference on signal processing and communication, 492–495, July 2017, Coimbatore, Tamil Nadu, India.Google Scholar
  4. 4.
    Liu, Lingfeng, Suoxia Miao, Hanping Hu and Mengfan Cheng. N-phase logistic chaotic sequence and its application for image encryption. IET Signal Processing 10 (9): 1096–1104.CrossRefGoogle Scholar
  5. 5.
    Reddy, P. Venkata Narasa, and Rajasekhar Karumuri. 2016. Image encryption and decryption in RNS domain based on moduli set. In Proceedings of international conference on communication and electronics systems (ICCES).Google Scholar
  6. 6.
    Hou, Jialin, Rui Xi, Ping Liu and Tianliang Liu. The switching fractional order chaotic system and its application to image encryption. IEEE/CAA Journal of Automatica Sinica 4 (2): 381–388.Google Scholar
  7. 7.
    Celİk,Kayhan, and Erol Kurt. 2016. A new image encryption algorithm based on lorenz system. In Proceedings of international conference on electronics, computers and artificial intelligence (ECAI).Google Scholar
  8. 8.
    Zahmoul, Rim, and Mourad Zaied. 2016. Toward new family beta maps for chaotic image encryption. In Proceedings of IEEE international conference on systems, man, and cybernetics (SMC).Google Scholar
  9. 9.
    Slimane, Nabil Ben, Kais Bouallegue, and Mohsen Machhout. 2016. Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1. In 4th international conference on control engineering & information technology (CEIT).Google Scholar
  10. 10.
    Cui, Delong, Lei Shu, Yuanfang Chen, and Xiaoling Wu. Image encryption using block based transformation with fractional Fourier transform. In 8th International conference on communications and networking in China (CHINACOM), Aug 2013.Google Scholar
  11. 11.
    Hazarika, Nitumoni, Sagarika Borah and Monjul Saikia. 2014. A wavelet based partial image encryption using chaotic logistic map. In Proceedings of IEEE international conference on advanced communication control and computing technologies (ICACCCT), 1–5.Google Scholar
  12. 12.
    Goel, Anis, and Kaustubh Chaudhari. 2016. Median based pixel selection for partial image encryption. In Sixth international conference on image processing theory, tools and applications (IPTA).Google Scholar
  13. 13.
    Ni, Zhengchao, Xuejing Kang and Lei Wang. 2016. A novel image encryption algorithm based on bit-level improved Arnold transform and hyper chaotic map. In IEEE international conference on signal and image processing.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of ECEATME College of EngineeringMysoreIndia

Personalised recommendations