Open Access   Article Go Back

An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain

Tarlok Singh1 , Pammy Manchanda2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1244-1251, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12441251

Online published on Jul 31, 2018

Copyright © Tarlok Singh, Pammy Manchanda . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Tarlok Singh, Pammy Manchanda, “An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1244-1251, 2018.

MLA Style Citation: Tarlok Singh, Pammy Manchanda "An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain." International Journal of Computer Sciences and Engineering 6.7 (2018): 1244-1251.

APA Style Citation: Tarlok Singh, Pammy Manchanda, (2018). An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain. International Journal of Computer Sciences and Engineering, 6(7), 1244-1251.

BibTex Style Citation:
@article{Singh_2018,
author = {Tarlok Singh, Pammy Manchanda},
title = {An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1244-1251},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2593},
doi = {https://doi.org/10.26438/ijcse/v6i7.12441251}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12441251}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2593
TI - An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain
T2 - International Journal of Computer Sciences and Engineering
AU - Tarlok Singh, Pammy Manchanda
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1244-1251
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
527 373 downloads 214 downloads
  
  
           

Abstract

An image encryption plays a significant role in various multimedia applications. An efficient image encryption technique using Discretized Baker Map and Shearlet transform is proposed. Initially, shearlet transform is used to convert an input image into sub-bands. Thereafter, Discretized Baker Map is utilized to design pseudo-random key that encrypts the coefficients of sub-bands. In the end, inverse of Shearlet transform is used to evaluate the ciphered image. Extensive analysis show that the proposed technique outperforms existing techniques in terms of entropy, correlation analysis, and differential analysis.

Key-Words / Index Term

Image Encryption, Discretized Baker Map, Shearlet Transform, Security

References

[1] M. Kaur and V. Kumar, "Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain," in IET Image Processing, vol. 12, no. 7, pp. 1273-1283, 7 2018a.
[2] M. Kaur and V. Kumar, "Efficient image encryption method based on improved Lorenz chaotic system," in Electronics Letters, vol. 54, no. 9, pp. 562-564, 5 3 2018b.
[3] J. Wang, Q. H. Wang and Y. Hu, "Image Encryption Using Compressive Sensing and Detour Cylindrical Diffraction," in IEEE Photonics Journal, vol. 10, no. 3, pp. 1-14, June 2018.
[4] X. Q. Fu, B. C. Liu, Y. Y. Xie, W. Li and Y. Liu, "Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos," in IEEE Photonics Journal, vol. 10, no. 3, pp. 1-15, June 2018.
[5] Z. Gao, D. Chen, W. Zhang and S. Cai, "Colour image encryption algorithm using one-time key and FrFT," in IET Image Processing, vol. 12, no. 4, pp. 472-478, 4 2018.
[6] C. Zhu and K. Sun, "Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps," in IEEE Access, vol. 6, pp. 18759-18770, 2018.
[7] S. Sun, "A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling," in IEEE Photonics Journal, vol. 10, no. 2, pp. 1-14, April 2018.
[8] M. Preishuber, T. Hütter, S. Katzenbeisser and A. Uhl, "Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2137-2150, Sept. 2018.
[9] X. Wang, X. Zhu and Y. Zhang, "An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map," in IEEE Access, vol. 6, pp. 23733-23746, 2018.
[10] L. Liu, S. Hao, J. Lin, Z. Wang, X. Hu and S. Miao, "Image block encryption algorithm based on chaotic maps," in IET Signal Processing, vol. 12, no. 1, pp. 22-30, 2 2018.
[11] Y. Zhang, "A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm," in Chinese Journal of Electronics, vol. 26, no. 5, pp. 1022-1031, 9 2017.
[12] A. Abd El-Latif, B. Abd-El-Atty and M. Talha, "Robust Encryption of Quantum Medical Images," in IEEE Access, vol. 6, pp. 1073-1081, 2018.
[13] L. Bao, S. Yi and Y. Zhou, "Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing," in IEEE Transactions on Image Processing, vol. 26, no. 12, pp. 5618-5631, Dec. 2017.
[14] C. Li, D. Lin and J. Lü, "Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits," in IEEE MultiMedia, vol. 24, no. 3, pp. 64-71, 2017.
[15] D. Kong, L. Cao, X. Shen, H. Zhang and G. Jin, "Image Encryption Based on Interleaved Computer-Generated Holograms," in IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 673-678, Feb. 2018.
[16] H. Liu, A. Kadir and X. Sun, "Chaos-based fast colour image encryption scheme with true random number keys from environmental noise," in IET Image Processing, vol. 11, no. 5, pp. 324-332, 4 2017.
[17] L. Liu, S. Miao, H. Hu and M. Cheng, "N-phase logistic chaotic sequence and its application for image encryption," in IET Signal Processing, vol. 10, no. 9, pp. 1096-1104, 12 2016.
[18] X. Wu, B. Zhu, Y. Hu and Y. Ran, "A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps," in IEEE Access, vol. 5, pp. 6429-6436, 2017.
[19] H. Huang and S. Yang, "Colour image encryption based on logistic mapping and double random-phase encoding," in IET Image Processing, vol. 11, no. 4, pp. 211-216, 4 2017.
[20] L. Y. Zhang et al., "On the Security of a Class of Diffusion Mechanisms for Image Encryption," in IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1163-1175, April 2018.
[21] X. Wang, G. Zhou, C. Dai and J. Chen, "Optical Image Encryption With Divergent Illumination and Asymmetric Keys," in IEEE Photonics Journal, vol. 9, no. 2, pp. 1-8, April 2017.
[22] J. Hou, R. Xi, P. Liu and T. Liu, "The switching fractional order chaotic system and its application to image encryption," in IEEE/CAA Journal of Automatica Sinica, vol. 4, no. 2, pp. 381-388, April 2017.
[23] Y. Abanda and A. Tiedeu, "Image encryption by chaos mixing," in IET Image Processing, vol. 10, no. 10, pp. 742-750, 10 2016.
[24] Y. Xie, J. Li, Z. Kong, Y. Zhang, X. Liao and Y. Liu, "Exploiting Optics Chaos for Image Encryption-Then-Transmission," in Journal of Lightwave Technology, vol. 34, no. 22, pp. 5101-5109, Nov.15, 15 2016.
[25] B. Murugan and A. G. Nanjappa Gounder, "Image encryption scheme based on block-based confusion and multiple levels of diffusion," in IET Computer Vision, vol. 10, no. 6, pp. 593-602, 9 2016.
[26] A. M. Elshamy et al., "Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding," in Journal of Lightwave Technology, vol. 31, no. 15, pp. 2533-2539, Aug.1, 2013.
[27] H. Kawaguchi, "Evaluation of the Lorentz group Lie algebra map using the Baker-Cambell-Hausdorff formula," in IEEE Transactions on Magnetics, vol. 35, no. 3, pp. 1490-1493, May 1999.
[28] J. F. van Diejen, "The dynamics of zeros of the solitonic Baker-Akhiezer function for the Toda chain," in International Mathematics Research Notices, vol. 2000, no. 5, pp. 253-270, 2000.
[29] Ye, Guodong, and Xiaoling Huang. "Spatial image encryption algorithm based on chaotic map and pixel frequency." Science China Information Sciences 61, no. 5 (2018): 058104.
[30] Teng, Lin, Xingyuan Wang, and Juan Meng. "A chaotic color image encryption using integrated bit-level permutation." Multimedia Tools and Applications 77, no. 6 (2018): 6883-6896.
[31] Ghebleh, M., A. Kanso, and D. Stevanović. "A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation." Multimedia Tools and Applications 77, no. 6 (2018): 7305-7326.
[32] Ran, Qiwen, Ling Wang, Jing Ma, Liying Tan, and Siyuan Yu. "A quantum color image encryption scheme based on coupled hyper-chaotic Lorenz system with three impulse injections." Quantum Information Processing 17, no. 8 (2018): 188.