Advertisement

Partial Image Scrambling Using Walsh Sequency in Sinusoidal Wavelet Transform Domain

  • H. B. Kekre
  • Tanuja Sarode
  • Pallavi N. Halarnkar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 384)

Abstract

Information security is a major concern. Several methods are proposed for securing digital images by either encrypting or scrambling them. As digital images are huge in size, scrambling the entire image would be a time consuming process. To overcome this constraint, partial image scrambling method has been proposed in this paper. The proposed method has been rigorously tested so as to find out which components in the wavelet domain can be removed from scrambling process at the cost of quality in descrambled images. A number of experimental parameters have been used for analysis and it has been observed that DCT and Hartley wavelet transforms are the best performers.

Keywords

Partial image encryption Wavelet Kekre’s walsh sequency 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fengxia, Y.: DCT Domain Color Image Block Encryption Algorithm Based on Three-Dimension Arnold Mappin. In: Fifth International Conference on Computational and Information Sciences (ICCIS), pp. 682–685. IEEE (2013)Google Scholar
  2. 2.
    Pareek, N.K., Patidar, V., Sud, K.K.: Diffusion- substitution based gray image encryption scheme. Digital Signal Processing 23, 894–901 (2013)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Bhatnagar, G., Jonathan Wu, Q.M., Raman, B.: Discrete fractional wavelet transform and its application to multiple encryption. Information Sciences 223, 297–316 (2013)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Jing-yu, P.E.N.G.: Efficient Color Image Encryption and Decryption Algorithm. International Journal of Digital Content Technology & its Applications 7(6) (2013)Google Scholar
  5. 5.
    Kaur, T., Sharma, R.: Image Cryptography by TJ-SCA: Supplementary Cryptographic Algorithm for Color Images. International Journal of Scientific & Engineering Research (IJSER) 4 (2013)Google Scholar
  6. 6.
    Liu, Z., Li, S., Liu, W., Wang, Y., Liu, S.: Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Optics and Lasers in Engineering 51(1), 8–14 (2013)CrossRefGoogle Scholar
  7. 7.
    Lima, J.B., Lima, E.A.O., Madeiro, F.: Image encryption based on the finite field cosine transform. Signal Processing: Image Communication 28(10), 1537–1547 (2013)Google Scholar
  8. 8.
    Behnia, S., Akhavan, A., Akhshani, A., Samsudin, A.: Image encryption based on the Jacobian elliptic maps. Journal of Systems and Software 86(9), 2429–2438 (2013)CrossRefGoogle Scholar
  9. 9.
    Bao, L., Zhou, Y., Chen, C.L.P.: Image encryption in the wavelet domain. In: SPIE Defense, Security, and Sensing, pp. 875502–875502. International Society for Optics and Photonics (2013)Google Scholar
  10. 10.
    Nichat, S.P., Sikchi, S.S.: Image Encryption using Hybrid Genetic Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, 3(1) (2013)Google Scholar
  11. 11.
    Shreef, M.A., Hoomod, H.K.: Image Encryption Using Lagrange-Least Squares Interpolation. International Journal of Advanced Computer Science and Information Technology (IJACSIT) 2, 35–55 (2013)MATHGoogle Scholar
  12. 12.
    Wadi, S.M., Zainal, N.: Rapid Encryption Method based on AES Algorithm for Grey Scale HD Image Encryption. Procedia Technology 11, 51–56 (2013)CrossRefGoogle Scholar
  13. 13.
    Sharma, D.: Robust Technique for Image Encryption and Decryption Using Discrete Fractional Fourier Transform with Random Phase Masking. Procedia Technology 10, 707–714 (2013)CrossRefGoogle Scholar
  14. 14.
    Abraham, L., Daniel, N.: Secure image encryption algorithms: A review. Entropy 100 (2013)Google Scholar
  15. 15.
    Kumar, M., Mishra, D.C., Sharma, R.K.: A first approach on an RGB image encryption. Optics and Lasers in Engineering 52, 27–34 (2014)CrossRefGoogle Scholar
  16. 16.
    Wu, Y., Zhou, Y., Agaian, S., Noonan, J.P.: A symmetric image cipher using wave perturbations. Signal Processing 102, 122–131 (2014)CrossRefGoogle Scholar
  17. 17.
    Zhang, Y.-Q., Wang, X.-Y.: A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Information Sciences 273, 329–351 (2014)CrossRefGoogle Scholar
  18. 18.
    Abuturab, M.R.: An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain. Optics and Lasers in Engineering 58, 39–47 (2014)CrossRefGoogle Scholar
  19. 19.
    Sun, Y., Chen, L., Xu, R., Kong, R.: An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves. PloS one 9(1) (2014)Google Scholar
  20. 20.
    Zhang, Y., Xiao, D.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Communications in Nonlinear Science and Numerical Simulation 19, 74–82 (2014)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using latin squares. Information Sciences 264, 317–339 (2014)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Zanin, M., Pisarchik, A.N.: Gray code permutation algorithm for high-dimensional data encryption. Information Sciences 270, 288–297 (2014)CrossRefGoogle Scholar
  23. 23.
    Tedmori, S., Al-Najdawi, N.: Image cryptographic algorithm based on the Haar wavelet transform. Information Sciences 269, 21–34 (2014)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Kekre, H.B., Sarode, T., Halarnkar, P.N.: Symmetric Key image Encryption using continuous distributions with MOD operator. International Journal of Engineering Science and Technology 6(6), 316–330 (2014)Google Scholar
  25. 25.
    Kekre, H.B., Mishra, D.: Performance Comparison of Density Distribution and Sector mean of sal and cal functions in Walsh Transform Sectors as Feature Vectors for Image Retrieval. International Journal Of Image Processing (IJIP) 4(3), 205–217 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • H. B. Kekre
    • 1
  • Tanuja Sarode
    • 2
  • Pallavi N. Halarnkar
    • 1
  1. 1.MPSTMENMIMS UniversityMumbaiIndia
  2. 2.TSECMumbai UniversityMumbaiIndia

Personalised recommendations