Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.73MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms
H. B. Kekre, Tanuja Sarode, Pallavi N Halarnkar, Debkanya Mazumder
Pages - 49 - 65     |    Revised - 24-02-2014     |    Published - 19-03-2014
Volume - 8   Issue - 2    |    Publication Date - March 2014  Table of Contents
MORE INFORMATION
KEYWORDS
Scrambling, Key Based Scrambling, Sinusoidal Transforms, DCT, DST, DFT, Real Fourier, Discrete Hartley.
ABSTRACT
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
CITED BY (4)  
1 Sarode, T., Pillai, D., Pokale, S., & Prabhu, T. (2016). Image Encryption in Transform Domain using Circular Shift. International Journal of Computer Applications, 140(11).
2 Sarode, T., Pillai, D., Pokale, S., & Prabhu, T. (2016). Image Encryption in Transform Domain using Circular Shift. International Journal of Computer Applications, 140(11).
3 Kekre, H. B., Sarode, T., Halarnkar, P. N., & Mazumder, D. (2014). Image Encryption using Hybrid Transform Domain Scrambling of Coefficients. International Journal of Advance Research in Computer Science and Management Studies, 2(6).
4 Kekre, H. B., Sarode, T., Halarnkar, P. N., & Mazumder, D. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS).
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 SlideShare
6 PdfSR
1 J.-L. Fan and X.-F. Zhang, “Image encryption algorithm based on chaotic system,” in International Conference on Computer-Aided Industrial Design and Conceptual Design.CAIDCD, 2006, pp. 1–6.
2 Chen, C.L.P, Tong Zhang , Yicong Zhou, “Image encryption algorithm based on a new combined chaotic system”, IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012, pp. 2500 – 2504
3 M. Jian-liang, P. Hui-jing, and G. Wan-qing, “New color image encryption algorithm based on chaotic sequences ranking,” in Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP ’08, August 2008, pp.1348–1351.
4 Lei Li-hong; Bai Feng-ming; Han Xue-hui, "New Image Encryption Algorithm Based on Logistic Map and Hyper-Chaos," Fifth International Conference on Computational and Information Sciences (ICCIS), 2013, vol., no., pp.713,716, 21-23 June 2013
5 Naeem, E.A.; Elnaby, M.M.A.; Hadhoud, M.M., "Chaotic image encryption in transform domains," International Conference on Computer Engineering & Systems, 2009. ICCES 2009., vol., no., pp.71-76, 14-16 Dec. 2009.
6 Sapna Anoop, Anoop Alakkaran, “A Full Image Encryption Scheme Based on Transform Domains and Stream Ciphers”, International Journal of Advanced Information Science and Technology (IJAIST), Vol. 17, pp. 5-10, September 2013
7 Long Bao , Yicong Zhou , C. L. Philip Chen, “Image encryption in the wavelet domain”, in Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013
8 Taranjit Kaur, Reecha Sharma, “Image Cryptography by TJ-SCA: Supplementary Cryptographic Algorithm for Color Images”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, pp 1355-1360, July-2013.
9 Y. Zhou, K. Panetta, S. Agaian, and C. L. P. Chen, "Image encryption using P- Fibonacci transform and decomposition," Optics Communications, vol. 285, pp. 594-608, 2012.
10 K. Wong and K Tanaka, “Scalable Image Scrambling Method Using Unified Constructive Permutation Function on Diagonal Blocks,” IEEE Proc. 28th Picture Coding Symposium PCS,pp. 138-141, 2010.
11 Liu, S., Sheridan, J.T.: Optical Information Hiding by Combining Image Scrambling Techniques in Fractional Fourier Domains. In: Irish Signal and Systems Conference, pp.249–254, 2001.
12 C. Li, G. Xu?, C.Song and J. Jing, “Evaluation of Image Scrambling Degree with Intersecting Cortical Model Neural Network”, International Journal of Hybrid Information Technology, Vol.5, No. 2, pp. 31-40, 2012.
13 M François, T Grosges, D Barchiesi, R Erra,“ Image Encryption Algorithm Based on a Chaotic Iterative Process”, Applied Mathematics, Vol. 3, No. 12, 2012, pp. 1910-1920.
14 Mishra, Minati, Priyadarsini Mishra, M. C. Adhikary, and Sunit Kumar. "Image Encryption Using Fibonacci-Lucas Transformation." International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012 pp 131-141.
15 Zhu, Guiliang, Weiping Wang, Xiaoqiang Zhang, and Mengmeng Wang. "Digital image encryption algorithm based on pixels." In Intelligent Computing and Intelligent Systems(ICIS), 2010 IEEE International Conference on, vol. 1, pp. 769-772. IEEE, 2010.
16 Feng, Yong, and Xinghuo Yu. "A novel symmetric image encryption approach based on an invertible two-dimensional map." In Industrial Electronics, 2009. IECON'09. 35th Annual Conference of IEEE, pp. 1973-1978. IEEE, 2009.
17 H.B.Kekre and J.K.Solanki, “Comparative performance of various trigonometric unitary transforms for transform image coding” , International Journal of Electronics, Vol. 44, No. 3.pp. 305-315, 1978.
18 P. Premaratne & M. Premaratne, "Key-based scrambling for secure image communication,"in Emerging Intelligent Computing Technology and Applications, P. Gupta, D. Huang, P.Premaratne & X. Zhang, Ed. Berlin: Springer, 2012, pp.259-263.
19 H.B.Kekre, Tanuja Sarode, Pallavi Halarnkar, Debankya Mazumder, “Image Scrambling using Non Sinusoidal transforms and Key based Scrambling Technique”, International Journal of Computer Technology (IJCT), Volume 12 issue no 8, pp. 3809- 3822. February 2014.
Dr. H. B. Kekre
NMIMS UNIVERSITY - India
hbkekre@yahoo.com
Dr. Tanuja Sarode
TSEC - India
Miss Pallavi N Halarnkar
MPSTME - India
Miss Debkanya Mazumder
Student, Computer Engg. MPSTME, NMIMS University Mumbai, 400056, India - India