Open Access   Article Go Back

An Image Encryption Using Chaos Algorithm Based on GLCM and PCA

Jyotsna 1 , Anubhooti Papola2

  1. Computer Science and Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
  2. Computer Science and Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 76-81, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.7681

Online published on Mar 30, 2018

Copyright © Jyotsna, Anubhooti Papola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jyotsna, Anubhooti Papola, “An Image Encryption Using Chaos Algorithm Based on GLCM and PCA,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.76-81, 2018.

MLA Style Citation: Jyotsna, Anubhooti Papola "An Image Encryption Using Chaos Algorithm Based on GLCM and PCA." International Journal of Computer Sciences and Engineering 6.3 (2018): 76-81.

APA Style Citation: Jyotsna, Anubhooti Papola, (2018). An Image Encryption Using Chaos Algorithm Based on GLCM and PCA. International Journal of Computer Sciences and Engineering, 6(3), 76-81.

BibTex Style Citation:
@article{Papola_2018,
author = {Jyotsna, Anubhooti Papola},
title = {An Image Encryption Using Chaos Algorithm Based on GLCM and PCA},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {76-81},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1763},
doi = {https://doi.org/10.26438/ijcse/v6i3.7681}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.7681}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1763
TI - An Image Encryption Using Chaos Algorithm Based on GLCM and PCA
T2 - International Journal of Computer Sciences and Engineering
AU - Jyotsna, Anubhooti Papola
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 76-81
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
574 449 downloads 267 downloads
  
  
           

Abstract

The Image encryption is the technique which can hide the sensitive text data. In the past times, various techniques has been proposed for image encryption which are broadly into wavelet transformation and discrete transformation, In this research paper, novel technique has been proposed which is based on textual feature extraction, selection and encryption. The GLCM algorithm is applied for the textual feature analysis, PCA algorithm is used for feature selection and block wise encryption is applied to generate final stego image. The proposed algorithm is implemented in MATLAB and it has been analyzed that it performs well in terms of PSNR and MSE.

Key-Words / Index Term

Chaos algorithms, GLCM, PCA, stego image

References

[1] A Shamir, “How to Share a Secret”, 1979, Communications of the ACM, vol. 22, no. 11, pp. 612-613
[2] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps”, 1998, Int J Bifurcat Chaos, vol. 8, no. 6, pp. 1259–1284
[3] Jiri Fridrich, “SYMMETRIC CIPHERS BASED ON TWO-DIMENSIONAL CHAOTIC MAPS”, 1998, International Journal of Bifurcation and Chaos, Vol. 8, No. 6, 1259-1284
[4] L. Kocarev, “Chaos-based cryptography: a brief overview”, 2001, IEEE Circ Syst Mag, vol. 1, no 3, pp.6–21
[5] G. Chen, Y. Mao and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps”, 2004, Chaos, Solitons & Fractals; vol. 21, pp. 749–761
[6] M. Naor and A. Shamir, “Visual Cryptography”, 2006, Advances in Cryptography-Eurocrypt, LNCS, vol. 950, pp. 1-12
[7] S. Mohammad, R. Farshchi and I. D. Ebrahimi, “A Novel Encryption Algorithm for Transmitting Secure Data based on Genetic Hyper Chaos Map”, 2011, Proc. of International Conference on Computer Communication and Management, Singapore, vol. 5, pp. 623-627
[8] D. Chattopadhyay, M. K. Mondal and D. Nandi, “Symmetric key chaotic image encryption using circle map”, 2011, Indian Journal of Science and Technology, vol. 4, no. 5, pp. 593-599
[9] Guoji Zhang, Qing Liu, “A novel image encryption method based on total shuffling scheme”, 2011, Optics Communications 284 2775–2780
[10] J. Mohamedmoideen Kader Mastan, G. A. Sathishkumar, K. Bhoopathy Bagan, “A Color Image Encryption Technique Based on a Substitution- Permutation Network”, 2011, Proc of First International Conference ACC Kochi, India, vol.193, no. 3, pp. 524-533
[11] S. V. Sathyanarayana, M. A. Kumar and K. N. Hari Bhat, “Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points”, 2011, International Journal of Network Security, vol.12, no.2, pp.166–179
[12] Y. Wu, J. P. Noonan and S. Agaian, “NPCR and UACI Randomness Tests for Image Encryption”, 2011, Cyber Journals: Multidisciplinary Journals in Science and Technology, April Ed. pp. 31-38
[13] Taneja, N., Raman, B., Gupta, I., “Selective image encryption in fractional wavelet domain”, 2011, Int. J. Electron. Commun., 65, pp. 338–344
[14] Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., "Performance Analysis of Self Adaptive Image Encryption Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.44-58, 2017.
[15] R. Afarin and S. Mozaffari, “Image encryption using genetic algorithm”, 2013, Proc. 8th Iranian Conference on Machine Vision and Image Processing
[16] L. Abraham and N. Daniel,”Secure Image Encryption Algorithms: A Review”, 2013, International Journal of Scientific & Technology Research Vol. 2, no. 4, pp. 186-189
[17] M. A. Mokhtar, S. N. Gobran and E. A. El-Badawy, “Colored Image Encryption Algorithm Using DNA Code and Chaos Theory”, 2014, International Conference on Computer and Communication Engineering (ICCCE), pp. 12-15
[18] S. Rohith, K. N. H. Bhat and A. N. Sharma, “Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register”, 2014, International Conference on Advances in Electronics, Computers and Communications (ICAECC)
[19] S. Sowmya and S. V. Sathyanarayana, “Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)”, 2014, International Conference on Contemporary Computing and Informatics (IC3I)
[20] Guosheng Gu, Jie Ling, “A fast image encryption method by using chaotic 3D cat maps”, 2014 Elsevier GmbH. All rights reserved
[21] Venkata Krishna Pavan Kalubandi, Hemanth Vaddi, Vishnu Ramineni, Agilandeeswari Loganathan, “A Novel Image Encryption Algorithm using AES and Visual Cryptography”, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT-2016)
[22] Abul Hasnat, Dibyendu Barman, Satyendra Nath Mandal, “A Novel Image Encryption Algorithm Using Pixel Shuffling and Pixel Intensity Reversal”, 2016, IEEE
[23] Xingyuan Wang, Chuanming Liu, Huili Zhang, “An effective and fast image encryption algorithm based on Chaos and interweaving of ranks”, 2016, Springer Science+Business Media Dordrecht
[24] Wiam Zamrani, Esmail Ahouzi, Angel Lizana, Juan Campus and Maria Josefa Yzuel, “Towards the Growth of Optical Security Systems for Image Encryption by Polarized Light”, 2016, IEEE