Skip to main content

An Image Encryption Scheme Using Chaotic Sequence for Pixel Scrambling and DFrFT

  • Conference paper
  • First Online:
Proceedings of First International Conference on Smart System, Innovations and Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 79))

Abstract

Now a day digitalization is everywhere in the world, and there is a huge amount of data transfer takes place every second on the internet. In this digital world major contribution of data as Images. The entire data transfer will take place on the internet, i.e., a public network, so the security of these Image data is very important. Image encryption can be done through different methods, these are cryptographic algorithms and various transforms were used for Image encryption. In this paper, an innovative Image encryption algorithm is proposed using Image Pixel Scrambling and DFrFT. The Image pixel scrambling operation is performed using the sequence generated by the chaotic function. The scrambled Image is encrypted through DFrFT. The developed algorithm improves the information security and the robustness of the system. The effectiveness and the efficiency of the proposed algorithm are verified from the simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. X. Feng, X. Tian and S. Xia, “A novel Image encryption algorithm based on fractional fourier transform and magic cube rotation,” 2011 4th International Congress on Image and Signal Processing, Shanghai, 2011, pp. 1008–1011. doi:10.1109/CISP.2011.6100319

  2. W. Zheng, Z. G. Cheng and Y. l. Cui, “Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes Decomposition,” 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 2008, pp. 1–4. doi:10.1109/WiCom.2008.773

  3. K. K. Sharmaand Heena Jain, “Image encryption algorithm based on wavelet packet decomposition and discrete linear canonical transform”, Proc. SPIE8760, International Conference on Communication and Electronics System Design, 87601P (January 28, 2013); doi:10.1117/12.2012323

  4. H. Y. Zhang, “A New Image Scrambling Algorithm Based on Queue Transformation,” 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, 2007, pp. 1526–1530. doi:10.1109/ICMLC.2007.4370387

  5. L. Xiang dong, Z. Junxing, Z. Jinhai, H. Xiqin, “Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation”, in International Journal of Computer Science and Network Security, VOL.8 No.1, 2008, pp. 64–68

    Google Scholar 

  6. Hai-Yan Zhang, “A new Image scrambling algorithm,” 2008 International Conference on Machine Learning and Cybernetics, Kunming, 2008, pp. 1088–1092. doi:10.1109/ICMLC.2008.4620566

  7. A. Koc, H. M. Ozaktas, C. Candan and M. A. Kutay, “Digital Computation of Linear Canonical Transforms,” in IEEE Transactions on Signal Processing, vol. 56, no. 6, pp. 2383–2394, June 2008. doi:10.1109/TSP.2007.912890

  8. S. Oraintara, “The generalized DFrFTs,” 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, USA, 2002, pp. II-1185-II-1188. doi:10.1109/ICASSP.2002.5744012

  9. X. Kang, F. Zhang and R. Tao, “Multichannel Random DFrFT,” in IEEE Signal Processing Letters, vol. 22, no. 9, pp. 1340–1344, Sept. 2015. doi:10.1109/LSP.2015.2402395

  10. S. C. Pei and W. L. Hsue, “Random DFrFT,” inIEEE Signal Processing Letters, vol. 16, no. 12, pp. 1015–1018, Dec. 2009. doi:10.1109/LSP.2009.2027646

  11. N. Jindal and K. Singh, “Image Encryption Using Discrete Fractional Transforms,” 2010 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, 2010, pp. 165–167. doi:10.1109/ARTCom.2010.9

  12. Soo-Chang Pei and Wen-Liang Hsue, “The multiple-parameter DFrFT”, in IEEE Signal Processing Letters, vol. 13, no. 6, pp. 329–332, June 2006. doi:10.1109/LSP.2006.871721

  13. Jae Wan Shim and Ren´ee Gatignol, “How to obtain higher-order multivariate Hermite expansion of Maxwell–Boltzmann distribution by using Taylor expansion?” in R. Z. Angew. Math. Phys. (2013) 64: 473. doi:10.1007/s00033-012-0265-1

  14. H. Agrawal, D. Kalot, A. Jain and N. Kahtri, “Image encryption using various transforms-a brief comparative analysis,” 2014 Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), Kottayam, 2014, pp. 1–4. doi:10.1109/AICERA.2014.6908280

  15. N. Khatri and N. Agrawal, “Double Image encryption using double pixel scrambling and linear canonical transform,” 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, 2013, pp. 1–5. doi:10.1109/ICCCNT.2013.6726546

  16. X. Luo, J. Fan and J. Wu, “Single-channel color Image encryption based on the multiple-order DFrFT and chaotic scrambling,” 2012 IEEE International Conference on Information Science and Technology, Hubei, 2012, pp. 780–784. doi:10.1109/ICIST.2012.6221754

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harish Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, H., Khatri, N. (2018). An Image Encryption Scheme Using Chaotic Sequence for Pixel Scrambling and DFrFT. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-10-5828-8_46

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5828-8_46

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5827-1

  • Online ISBN: 978-981-10-5828-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics