A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain

  • Musheer Ahmad
  • Bashir Alam
  • Arpit Jain
  • Vipul Khare
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)


The advancements in the network and multimedia technologies have made information security more exigent and demanding. It brings new challenges to develop security methods that are credential enough to encrypt a number of images and generate a single encrypted image containing the information of all plain-images. Here, we propose a novel image encryption algorithm which has the efficacy of encrypting eight distinct plain-images simultaneously. Low frequency components of plain-images are selected and processed. The algorithm makes use of three chaotic systems to get visual effect of disorder, distorted and indistinguishable single encrypted image. The encryption/decryption processing operations such as chaos-based circular rotation and random mixing of pixels are carried out in wavelet domains. The one-dimensional chaotic maps are used to generate two chaotic key images needed for circular rotation. A two-dimensional chaotic map is employed for randomly shuffling the coefficients matrix received after mixing. The performance of proposed algorithm is analyzed through experimentation against pixels correlation, peak signal to noise ratio, key sensitivity and key space. It is found that the simulation results validate the effectiveness of the proposed octuple images encryption algorithm.


Octuple image encryption Security Chaotic systems Circular rotation Wavelet domain 


  1. 1.
    Javidi B (2005) Optical and digital techniques for information security. Springer, New YorkCrossRefGoogle Scholar
  2. 2.
    Chang CC, Hwang MS, Chen TS (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 58(2):83–91CrossRefGoogle Scholar
  3. 3.
    Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759–765MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35(2):408–419MathSciNetMATHCrossRefGoogle Scholar
  5. 5.
    Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769CrossRefGoogle Scholar
  6. 6.
    Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46(2):117–123CrossRefGoogle Scholar
  7. 7.
    Hennelly BM, Sheridan JT (2003) Image encryption and the fractional Fourier transform. Optik 114(6):251–265CrossRefGoogle Scholar
  8. 8.
    Zhao J, Lu H, Song XJ, Li J, Ma Y (2005) Optical image encryption based on multi- stage fractional Fourier transforms and pixel scrambling technique. Opt Commun 249(4–6):493–499.Google Scholar
  9. 9.
    Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29(14):1584–1586CrossRefGoogle Scholar
  10. 10.
    Joshi M, Chandrashakher Singh K (2008) Color image encryption and decryption for twin images in fractional Fourier domain. Opt Commun 281(23):5713–5720CrossRefGoogle Scholar
  11. 11.
    Singh N, Sinha A (2010) Chaos based multiple image encryption using multiple canonical transforms. Opt Laser Technol 42(5):724–731CrossRefGoogle Scholar
  12. 12.
    Liu Z, Dai J, Sun X, Liu S (2009) Triple image encryption scheme in fractional Fourier transform domains. Opt Commun 282(4):518–522CrossRefGoogle Scholar
  13. 13.
    Liu Z, Liu S (2007) Double image encryption based on iterative fractional Fourier transform. Opt Commun 275:324–329CrossRefGoogle Scholar
  14. 14.
    Situ G, Zhang J (2005) Multiple-image encryption by wavelength multiplexing. Opt Lett 30(11):1306–1308CrossRefGoogle Scholar
  15. 15.
    Amaya D, Tebaldi M, Torroba R, Bolognini N (2009) Wavelength multiplexing encryption using joint transform correlator architecture. Appl Opt 48(11):2099–2104CrossRefGoogle Scholar
  16. 16.
    He M, Cai L, Liu Q, Wang X, Meng X (2005) Multiple image encryption and watermarking by random phase matching. Opt Commun 247(1–3):29–37CrossRefGoogle Scholar
  17. 17.
    Situ G, Zhang J (2006) Position multiplexing for multiple-image encryption. J Opt A 8(5):391–397.Google Scholar
  18. 18.
    Tao R, Xin Y, Wang Y (2007) Double image encryption based on random phase encoding in the fractional Fourier domain. Opt Express 15(24):16067–16079CrossRefGoogle Scholar
  19. 19.
    Amaya D, Tebaldi M, Torroba R, Bolognini N (2008) Multi-channeled encryption via a joint transform correlator architecture. Appl Opt 47(31):5903–5907CrossRefGoogle Scholar
  20. 20.
    Liang XY, Xin Z, Sheng Y, Yao CY (2010) Multiple-image parallel optical encryption. Opt Commun 283(14):2789–2793CrossRefGoogle Scholar
  21. 21.
    Liu Z, Zhang Y, Zhao H, Ahmad MA, Liu S (2011) Optical multi-image encryption based on frequency shift. Optik 122(11):1010–1013CrossRefGoogle Scholar
  22. 22.
    Lin QH, Yin FL, Mei TM, Liang H (2008) A blind source separation-based method for multiple images encryption. Image Vis Comput 26(6):788–798CrossRefGoogle Scholar
  23. 23.
    Chen T H, Tsao KH, Wei KC (2008) Multiple-image encryption by rotating random grids. In: Eighth international conference on intelligent systems design and applications, 252–256 2008.Google Scholar
  24. 24.
    Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcat Chaos 15(10):3119–3151MathSciNetMATHCrossRefGoogle Scholar
  25. 25.
    May RM (1967) Simple Mathematical Model with very Complicated Dynamics. Nature 261:459–467CrossRefGoogle Scholar
  26. 26.
    Wang XY, Shi QJ (2005) New type crisis, hysteresis and fractal in coupled logistic map. Chin J Appl Mech 23:501–506Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Musheer Ahmad
    • 1
  • Bashir Alam
    • 1
  • Arpit Jain
    • 2
  • Vipul Khare
    • 3
  1. 1.Department of Computer Engineering, Faculty of Engineering and TechnologyJamia Millia IslamiaNew DelhiIndia
  2. 2.Department of Computer and Information Science and EngineeringUniversity of FloridaFloridaUSA
  3. 3.Department of Computer Science and Information TechnologyJaypee Institute of Information TechnologyNoidaIndia

Personalised recommendations