Discrete Wavelet Transform based Cryptosystem
Main Article Content
Abstract
In this article, the authors proposed, implemented and analysed a symmetric key cryptographic algorithm that can be considered as a lossless encryption and decryption technique, advantageous especially in situations where, even a slight marginal distortion is not tolerable. In the proposed system, Haar wavelet is used initially, to transform the original target image into its frequency domain, followed by encrypting the resulting sub-bands, so as to obtain a secure and reliable encrypted image. The resulting coefficients after Haar decomposition is scattered using a reversible weighing factor, suitably reversed and swapped to get the secure encrypted image. The encrypted image is then correspondingly decrypted, by the reverse process to get back the original decrypted image. Statistical testing and security methods were used to evaluate and analyse the proposed cryptosystem and the results showed that the proposed system is cryptographically resistant to attacks and is also highly secure when compared to other cryptographic systems in the frequency domain.
Article Details
References
Y. Chen, Comment on ‘‘Cheating prevention in visual cryptography’’, IEEE Trans. Image Process; vol.21 no.7, 3319–3323, 2012
X. Zhang, Scalable coding of encrypted images, IEEE Trans. Image Process;vol.21, no.6, 3108–3114, 2012.
G. Zhang, Q. Liu, A novel image encryption method based on total shuffling scheme, Elsevier Opt. Commun. vol.284, no.12, 2775–2780, 2011.
A. Kanso, M. Ghebleh, A novel image encryption algorithm based on a 3D chaotic map, Elsevier Commun. Nonlinear Sci. Numer. Simul., vol.17 , no.7, 2943–2959, 2012
M. Bani-Younes, A. Jantan, Image encryption using block-based transformation algorithm, Int. J. Comput. Sci. ,vol. 35, no. 1,pp. 15–23, 2008.
C. Samson and V. Sastry, “A Novel Image Encryption Supported by Compression Using Multilevel Wavelet Transform”, Int.l J. of Advanced Comput. Sci. App, Vol. 3, no. 9, pp. 178-183, 2012.
C. Pang, An image encryption algorithm based on discrete wavelet transform and two dimension cat mapping, in: Int. Conf. on Networks Security, Wireless Communications and Trusted Computing, vol. 2, IEEE Xplore digital library, pp. 711–714, 2009
L. Krikor, S. Baba, T. Arif, Z. Shaaban, Image encryption using DCT and stream cipher, Eur. J. Sci. Res, vol. 32, no.1, 47–57, 2009.
S. Tedmori and N. Al-Najdawi, “Image Cryptographic Algorithm Based on the Haar Wavelet Transform”, Elsevier Information Sciences, vol. 269, pp. 21-34, 2014
Z. Liu, J. Dai, X. Sun, S. Liu, Triple image encryption scheme in fractional Fourier transform domains, Elsevier Opt. Commun., vol.282, no. 4, pp.518–522, 2009.
M. Khan and F. Masood, ‘‘A novel chaotic image encryption technique based on multiple discrete dynamical maps,’’ Multimedia Tools Appl., vol. 78, no. 18, pp. 26203–26222, 2019.
R. Ye, A novel chaos-based image encryption scheme with an efficient permutation–diffusion mechanism, Elsevier Opt. Commun., vol. 284, pp.5290– 5298, 2011.
N. Sethi, D. Sharma, Novel method of image encryption using logistic mapping, Int. J. Comput. Sci. Eng., vol.1, no.2, 115–119, 2012.
Kaur, M.; Kumar, V. A comprehensive review on image encryption techniques. Arch. Comput. Methods Eng., vol.27, pp.15–43, 2020.
Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process., vol.30, pp. 943–961, 2019.