Abstract
Due to the availability and increased usage of multimedia applications, features such as compression and security has gained more importance. Here, we propose a key generation algorithm and a double image encryption scheme with combined compression and encryption. The keys for encryption are generated using a novel modified convolution and chaotic mapping technique. First, the four least significant bits of the two images were truncated and then combined after permutation using the proposed logistic mapping. Also, cellular automata based diffusion is performed on the resultant image to strengthen the security further. Here, both confusion and diffusion seem to be integrated thus improvising the encryption scheme. The performance results and the test of randomness of the key and the algorithm were found to be successful. Since two images are compressed and encrypted simultaneously, it is useful in real - time scenarios.
Similar content being viewed by others
References
Abd AA, El-Latif LL, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. doi:10.1007/s11042-012-1173-2
Abdo AA, Shiguo L, Ismail IA, Amin M, Diab H (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18:136–147
Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl. 75:13951–13976. doi:10.1007/s11042-015-2973-y
Aljawarneh S (2011) Cloud security Engineering: avoiding security threats the right way. International Journal of Cloud Applications and Computing 1(2):64–70. doi:10.4018/ijcac.2011040105
Aljawarneh S, Masadeh S, Alkhateeb F (2010) A secure wifi system for wireless networks: an experimental evaluation. Netw Secur 2010:6–12
Aljawarneha SA, Moftahb RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77
Annab MH, Rushdi MA, Nehary EA (2016) Image encryption via discrete fractional fourier-type transforms generated by random matrices. Signal Process Image Commun 49:25–46
Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51:665–673
Chen R-J, Horng S-J (2010) Novel SCAN-CA-based security system using SCAN and 2-D von Neumann cellular automata. Signal Process Image Commun 25:413–426
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157
Hunt BR (1971) A matrix theory proof of the discrete convolution theorem. IEEE Trans Audio Electroacoust 19:285–288
Kizza JM (2005) Computer network security. Springer, New York
Kocarev L, Lian S (2011) Chaos-based cryptography: Theory, algorithms and applications. Studies in Computational Intelligence. Springer, Berlin
Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28:1537–1547
Liu Z, Gong M, Dou Y, Liu F, Shen L, Ahamed MA, Dai J, Liu S (2012) Double image encryption by using arnold transform and discrete fractional angular transform. Opt Lasers Eng 50:248–255
Maniccama SS, Bourbakisa NG (2004) Image and video encryption using SCAN patterns. Pattern Recogn 37:725–737
Mount DM, Kanungo T, Netanyahu NS, Piatko C, Silverman R, Wu AY (2001) Approximating large convolutions in digital images. IEEE Trans Image Process 10:1826–1835
Nandi S, Kar BK, Pal Chaudhuri P (1994) Theory and applications of cellular automata in cryptography. IEEE Trans Comput 43:1346–1357
Rukhin J, Soto J, Nechvatal S, Miles E, Barker S, Leigh M, Levenson M, Vangel D, Banks A, Heckert J D (2010) A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800–22 Revision 1a
Shih TK (2002) Distributed multimedia databases: Techniques and Applications. Idea group, USA
Sui L, Lu H, Wang Z, Sung Q (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Lasers Eng 56:1–12
Sui L, Duan K, Liang J (2015) Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt Commun 343:140–149
Tao R, Meng X-Y, Wang Y (2010) Image encryption with multi orders of fractional Fourier transforms, IEEE Trans. Inf Forens Security 5:734–738
Wang Q, Guo Q, Zhou J (2012) Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain. Opt Commun 285:4317–4323
Xia-Wei, Lee I-K (2015) Modified computational integral imaging-based double image encryption using fractional Fourier transform. Opt Lasers Eng 66:112–121
Xu Y, Wang H, Li Y, Pei B (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simul 19:3735–3744
Zhao T, Ran Q, Lin Y, Chi Y, Ma J (2016) Security of image encryption scheme based on multi-parameter fractional Fourier transform. Opt Commun 376:47–51
Zhizhong JC, Mingguangshan BH (2012) Double image encryption using double pixel scrambling and random phase encoding. Opt Commun 285:584–588
Zhou Y, Bao L, Philip Che CL (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double- image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112–121
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hanis, S., Amutha, R. Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl 77, 6897–6912 (2018). https://doi.org/10.1007/s11042-017-4606-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4606-0