Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Abstract

The increase of cyberattacks in the field of information security leads to high attention in the digitalized environment. There is a demand for well-organised methods to transmit data securely over the Internet. In the proposed algorithm, a greyscale image is secured by an encryption technique by two stages, i.e. confusion and diffusion. Digital images can be expressed in terms of numeric values called pixels. The images are converted by the integer wavelet transform-domain technique, where the images are separated by approximation and detailed sub-bands. The proposed encryption algorithm is implemented for the approximated sub-bands which contain significant information of the digital image. 1D logistic and 2D tent maps generate chaotic random keys. By various statistical and differential analyses, the robustness of the proposed algorithm is examined by achieving a maximum entropy of 7.997, near-zero correlation and larger keyspace of 1080. With the results, it has confirmed that the enhanced chaos-based Integer Wavelet Transform (IWT) encryption has succeeded to resist any cyberattacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 213.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 213.99
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tao RTR, Meng X-YMX-Y, Wang YWY (2010) Image encryption with multiorders of fractional Fourier transforms. IEEE Trans Inf Forensics Secur 5(4):734–738

    Article  Google Scholar 

  2. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRTbased watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process. https://doi.org/10.1016/j.dsp.2010.03.010

    Article  Google Scholar 

  3. Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process. https://doi.org/10.1016/j.dsp.2014.06.012

    Article  Google Scholar 

  4. Aashiq Banu S, Sridevi A, Sivaram R, Rengarajan A, Paramasivam VM (2019) Reciprocal time domain disruption of image for secured communication. In: IEEE international conference on computer communication and informatics (ICCCI), pp 1–4. https://doi.org/10.1109/iccci.2019.8822167

  5. Yuan W, Yang X, Guo W, Hu W (2017) A double-domain image encryption using hyper chaos. In: International conference on transparent optical networks, pp 1–4

    Google Scholar 

  6. Singh DK, Tomar K (2018) A robust color image encryption algorithm in dual-domain using chaotic map. In: IEEE ınternational conference on ınventive communication and computational technologies, pp 931–935

    Google Scholar 

  7. Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using a frequency -domain DNA encoding. IET Image Process 13(9):1535–1539. https://doi.org/10.1049/iet-ipr.2019.0051

  8. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148

    Article  Google Scholar 

  9. Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57(11):2517–2533

    Google Scholar 

  10. Zhang Y (2019) Security analysis of chaos triggered image encryption scheme. Multimed Tools Appl 78(22):31303–31318

    Google Scholar 

  11. Dagadu JC, Li JP, Addo PC (2019) An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation. Multimed Tools Appl 78(17):24979–25000

    Google Scholar 

  12. Ramasamy P, Ranganathan V, Kadry S, Damaševičius R, Blažauskas T (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic-tent map. Entropy 21(7), art. no. 656

    Google Scholar 

  13. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Sig Process 160:45–58

    Article  Google Scholar 

  14. Yavuz E (2019) A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Opt Laser Technol 114:224–239

    Article  Google Scholar 

  15. Manoharan S (2019) A smart image processing algorithm for text recognition, information extraction and vocalization for the visually challenged. J Innov Image Process (JIIP) 1(01):31–38

    Article  Google Scholar 

  16. Parvees MYM, Samath JA, Bose BP (2019) Chaotic sequences are cryptographically secure now-an improved chaotic approach. J Comput Theor Nanosci 16(4):1438–1443

    Google Scholar 

  17. Li B, Liao X, Jiang Y (2019) A novel image encryption scheme based on improved random number generator and its implementation Nonlinear Dyn 95(3):1781–1805

    Google Scholar 

  18. Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22–32

    Article  Google Scholar 

Download references

Acknowledgments

Authors thank the Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, the authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amirtharajan Rengarajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aashiq Banu, S., Sucharita, M.S., Soundarya, Y.L., Nithya, L., Dhivya, R., Rengarajan, A. (2021). Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation