Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Double image compression and encryption scheme using logistic mapped convolution and cellular automata

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the availability and increased usage of multimedia applications, features such as compression and security has gained more importance. Here, we propose a key generation algorithm and a double image encryption scheme with combined compression and encryption. The keys for encryption are generated using a novel modified convolution and chaotic mapping technique. First, the four least significant bits of the two images were truncated and then combined after permutation using the proposed logistic mapping. Also, cellular automata based diffusion is performed on the resultant image to strengthen the security further. Here, both confusion and diffusion seem to be integrated thus improvising the encryption scheme. The performance results and the test of randomness of the key and the algorithm were found to be successful. Since two images are compressed and encrypted simultaneously, it is useful in real - time scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abd AA, El-Latif LL, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. doi:10.1007/s11042-012-1173-2

    Article  Google Scholar 

  2. Abdo AA, Shiguo L, Ismail IA, Amin M, Diab H (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18:136–147

    Article  MathSciNet  MATH  Google Scholar 

  3. Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl. 75:13951–13976. doi:10.1007/s11042-015-2973-y

    Article  Google Scholar 

  4. Aljawarneh S (2011) Cloud security Engineering: avoiding security threats the right way. International Journal of Cloud Applications and Computing 1(2):64–70. doi:10.4018/ijcac.2011040105

    Article  Google Scholar 

  5. Aljawarneh S, Masadeh S, Alkhateeb F (2010) A secure wifi system for wireless networks: an experimental evaluation. Netw Secur 2010:6–12

    Article  Google Scholar 

  6. Aljawarneha SA, Moftahb RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77

    Article  Google Scholar 

  7. Annab MH, Rushdi MA, Nehary EA (2016) Image encryption via discrete fractional fourier-type transforms generated by random matrices. Signal Process Image Commun 49:25–46

    Article  Google Scholar 

  8. Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51:665–673

    Article  Google Scholar 

  9. Chen R-J, Horng S-J (2010) Novel SCAN-CA-based security system using SCAN and 2-D von Neumann cellular automata. Signal Process Image Commun 25:413–426

    Article  Google Scholar 

  10. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  11. Hunt BR (1971) A matrix theory proof of the discrete convolution theorem. IEEE Trans Audio Electroacoust 19:285–288

    Article  MathSciNet  Google Scholar 

  12. Kizza JM (2005) Computer network security. Springer, New York

    MATH  Google Scholar 

  13. Kocarev L, Lian S (2011) Chaos-based cryptography: Theory, algorithms and applications. Studies in Computational Intelligence. Springer, Berlin

  14. Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28:1537–1547

    Article  Google Scholar 

  15. Liu Z, Gong M, Dou Y, Liu F, Shen L, Ahamed MA, Dai J, Liu S (2012) Double image encryption by using arnold transform and discrete fractional angular transform. Opt Lasers Eng 50:248–255

    Article  Google Scholar 

  16. Maniccama SS, Bourbakisa NG (2004) Image and video encryption using SCAN patterns. Pattern Recogn 37:725–737

    Article  Google Scholar 

  17. Mount DM, Kanungo T, Netanyahu NS, Piatko C, Silverman R, Wu AY (2001) Approximating large convolutions in digital images. IEEE Trans Image Process 10:1826–1835

    Article  MathSciNet  MATH  Google Scholar 

  18. Nandi S, Kar BK, Pal Chaudhuri P (1994) Theory and applications of cellular automata in cryptography. IEEE Trans Comput 43:1346–1357

    Article  MathSciNet  Google Scholar 

  19. Rukhin J, Soto J, Nechvatal S, Miles E, Barker S, Leigh M, Levenson M, Vangel D, Banks A, Heckert J D (2010) A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800–22 Revision 1a

  20. Shih TK (2002) Distributed multimedia databases: Techniques and Applications. Idea group, USA

  21. Sui L, Lu H, Wang Z, Sung Q (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Lasers Eng 56:1–12

    Article  Google Scholar 

  22. Sui L, Duan K, Liang J (2015) Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt Commun 343:140–149

    Article  Google Scholar 

  23. Tao R, Meng X-Y, Wang Y (2010) Image encryption with multi orders of fractional Fourier transforms, IEEE Trans. Inf Forens Security 5:734–738

    Article  Google Scholar 

  24. Wang Q, Guo Q, Zhou J (2012) Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain. Opt Commun 285:4317–4323

    Article  Google Scholar 

  25. Xia-Wei, Lee I-K (2015) Modified computational integral imaging-based double image encryption using fractional Fourier transform. Opt Lasers Eng 66:112–121

    Google Scholar 

  26. Xu Y, Wang H, Li Y, Pei B (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simul 19:3735–3744

    Article  MathSciNet  Google Scholar 

  27. Zhao T, Ran Q, Lin Y, Chi Y, Ma J (2016) Security of image encryption scheme based on multi-parameter fractional Fourier transform. Opt Commun 376:47–51

    Article  Google Scholar 

  28. Zhizhong JC, Mingguangshan BH (2012) Double image encryption using double pixel scrambling and random phase encoding. Opt Commun 285:584–588

    Article  Google Scholar 

  29. Zhou Y, Bao L, Philip Che CL (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

  30. Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double- image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112–121

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Hanis.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hanis, S., Amutha, R. Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl 77, 6897–6912 (2018). https://doi.org/10.1007/s11042-017-4606-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4606-0

Keywords

Navigation