Skip to main content

Encryption and Decryption of Image for Secured Data Transmission

  • Conference paper
  • First Online:
Futuristic Communication and Network Technologies (VICFCNT 2020)

Abstract

This work combines Arnold transform method with the spatial domain to encrypt a covered image and also recovers the covered image by the application of inverse Arnold transform. First, transform a cover image into subparts which consists of eight binary images by decimal value to eight-digit binary operation. Then, transform eight binary images into sub-blocks of eight binary scrambled images by the Arnold transform, respectively. Further, recombine the sequence of the eight binary scrambled matrices into a scrambled matrix with 256 Gy levels according to the specific club. Discrete wavelet transform (DWT) is used to perform image compression on the input image and secretly hidden image which is done using alpha blending. Finally, derive an encrypted image from the scrambled image by the Hartley transform. Second, decode the encrypted image using inverse Arnold Transform. Inverse DWT is performed to regain the compressed images. Simulations indicate that the hybrid new technique has more security, more robustness counter to occlusion and attacks about with high degree of image scrambling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 449.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wei Z, Hai Y, Zhiliang Z, Wong K (2013) A symmetric color tionalgorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584–600

    Article  MathSciNet  Google Scholar 

  2. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutationbased on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998–4006

    Article  MathSciNet  Google Scholar 

  3. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

  4. Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based oncycle shift and chaotic system. Opt Lasers Eng 68(Supplemrnt C):126–134

    Article  Google Scholar 

  5. Wang X, Dapeng (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075–3085

    Google Scholar 

  6. Enayatifar R, Abdullah AH, Sadaei HJ, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribo nucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Article  Google Scholar 

  7. Wang L, Song H, Ping (2016) A novel hybrid color imageencryption algorithm using twocomplex chaotic systems. Opt Lasers Eng 77:118–125

    Google Scholar 

  8. Liu H, Kadir A (2015) A symmetric color image encryption scheme using 2d discrete-time map. Signal Process 113(Supplement C):104–112

    Article  Google Scholar 

  9. Boora M, Gambhir M (2013) Arnold Transform Based Steganography. Int J Soft Comput Eng (IJSCE) 3(4):2231–2307

    Google Scholar 

  10. Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compressionen cryption hybridalgorithm based on key-controlled measurement matrix in compressive sensing. Optics Laser Technol 62:152–160

    Article  Google Scholar 

  11. Lu Xu, Li Z, Li J, Hua W (2016) A novel bit level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  12. Belazi A, Abd El-Latif AA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based onlinear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  13. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dnasequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  14. Abdo AA, Lian S, Ismail IA, Amin M, Diab H (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18(1):136–147

    Article  MathSciNet  Google Scholar 

  15. Gu G, Ling J (2014) A fast imageencryption method by using chaotic 3D cat maps. OptikInternational Journal for Light and Electron Optics. Int J Pure Appl Math Special Issue 125(17):4700–4705

    Google Scholar 

  16. Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82(Supplement C):79–86

    Article  Google Scholar 

  17. Dong C (2014) Color image encryption using one time keys and coupled chaotic systems. Sig Process: Image Commun 29(5):628–640

    Google Scholar 

  18. Hosseini SM, Karimi H, Jahan MV (2014) Generating pseudo-random numbersby combining two systems with complex behaviors. J Inf Security Appl 19(2):149–162

    Google Scholar 

  19. Reya K, Monika R (2018) Hybrid hyper chaotic system and cellular automata-based color image block wise encryption and decryption. Int J Pure Appl Math 118(22):33–40

    Google Scholar 

  20. Rengarajan A (2016) Datar hiding in encrypted images using arnold transform. ICTACT J Image Video Process 7(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Thirumarai Selvi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thirumarai Selvi, C., Sankarasubramanian, R.S., MuthuKrishnan, M. (2022). Encryption and Decryption of Image for Secured Data Transmission. In: Sivasubramanian, A., Shastry, P.N., Hong, P.C. (eds) Futuristic Communication and Network Technologies. VICFCNT 2020. Lecture Notes in Electrical Engineering, vol 792. Springer, Singapore. https://doi.org/10.1007/978-981-16-4625-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-4625-6_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-4624-9

  • Online ISBN: 978-981-16-4625-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics