A new cryptology approach for image encryption

In this paper, we propose a new method to develop secure image-encryption techniques using a logistics -based encryption algorithm. In this technique, a Haar wavelet transform was used to decompose the image and decorrelate its pixels into averaging and differencing components. [3] The logistic based encryption algorithm produces a cipher of the test image that has good diffusion and confusion properties [5]. The remaining components (the differencing components) are compressed using a wavelet transform. Many test images are used to demonstrate the validity of the proposed algorithm. The results of several experiments show that the proposed algorithm for image cryptosystems provides an efficient and secure approach to real-time image encryption and transmission. To send the keys in secure form stenography will be used. Steganography is a technique that allows one application to communicate information to another application without a third party even knowing that the communication is occurring. Many tests like NPCR, UACI, PSNR etc. have been done on the sample images to prove the results.

[1]  Hualou Liang,et al.  Wavelet Analysis , 2014, Encyclopedia of Computational Neuroscience.

[2]  P. Raviraj The Modified 2D-Haar Wavelet Transformation in Image Compression , 2007 .

[3]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[4]  Ahmad T. Al-Taani,et al.  A Novel Steganographic Method for Gray-Level Images , 2009 .

[5]  Sunil Kumar Muttoo,et al.  DATA HIDING IN JPEG IMAGES , 2008 .

[6]  Mayank Mishra,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .

[7]  Guanrong Chen,et al.  On the security of a class of image encryption schemes , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  S. Mishra,et al.  Image Compression Using Wavelet Packet Tree , 2010 .

[10]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  Hong-Ye Gao,et al.  Wavelet analysis [for signal processing] , 1996 .

[13]  Musheer Ahmad,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2009 .

[14]  Musheer Ahmad,et al.  Chaotic image encryption algorithm based on frequency domain scrambling , 2010 .

[15]  William Puech,et al.  A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.