Skip to main content
Log in

A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a selective image encryption algorithm based on square-wave shuffling in the orthogonal polynomials domain is proposed. This algorithm is adaptive to the user device’s computing power, as it can operate in the spatial/frequency/hybrid domain. Simultaneous confusion and diffusion is performed on important regions, while in unimportant regions, shuffling is conducted; chaotic maps are used for both. To obtain the encrypted image, a new shuffling method, called square-wave shuffling, is proposed and applied. Extensive experiments have been conducted in PCs and in smart-phones with the Android programming environment. Its suitability to these devices is verified, and the superiority of the proposed method in comparison to other contemporary methods is also reported.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Chen Wei-bin, Zhang Xin (2009) Image Encryption Algorithm Based on Henon Chaotic System. International Conference on Image Analysis and Signal Processing 94–97. doi:10.1109/IASP.2009.5054653.

  2. Chong F, Lin B-b, Miao Y-s, Liu X, Chen J-j (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423

    Article  Google Scholar 

  3. Chun-jiang pang (2009) An image encryption algorithm based on discrete wavelet transform and two dimension cat mapping. International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC’09), pp 711–714.

  4. Ensherah A. Naeem, Mustafa M. Abd Elnaby, Mohiy M. Hadhoud (2009) Chaotic Image Encryption in Transform Domains. International Conference on Computer Engineering & Systems (ICCES’2009), pp 71–76.

  5. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  6. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  7. Gaurav B, Wu QMJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Proc 22(4):648–663

    Article  MathSciNet  Google Scholar 

  8. Guan Z-H, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153–157

    Article  MATH  Google Scholar 

  9. Hongjuan Liu, Zhilang Zhu, Huiyan Jiang, Beilei Wang (2008) A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. The 9th International Conference for Young Computer Scienctists 3016–3021. Doi:10.1109/ICYCS.2008.449.

  10. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dynamics 67:2411–2417

    Article  MathSciNet  Google Scholar 

  11. Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57

    Google Scholar 

  12. Krishnamoorthy R, Bhattarcharya P (1998) Color edge extraction using orthogonal polynomials based zero crossings scheme. Inf Sci 112(4):51–65

    Article  MathSciNet  Google Scholar 

  13. Krishnamoorthy R, Devi SS (2012) A multiresolution approach for rotation invariant texture image retrieval with orthogonal polynomials model. J Vis Commun Image Represent 23:18–30

    Article  Google Scholar 

  14. Krishnamoorthy R, Kannan N (2009) A new integer image coding technique based on orthogonal polynomials. Image Vis Comput 27(8):999–1006

    Article  Google Scholar 

  15. Krishnamoorthy R, Malarchelvi PDSK (2008) Selective combinational encryption of gray scale image using orthogonal polynomials based transformation. Int J Comput Sci Network Security 8(5):195–204

    Google Scholar 

  16. Krishnamoorthy R, Murali P (2014) Chaos based image encryption with orthogonal polynomials model and bit shuffling. 2014 International Conference on Signal processing and Integrated Networks (SPIN), pp 107–112, Noida, India. DOI:10.1109/SPIN.2014.6776931

  17. Li S, Chen G, Zheng X (2004) Chaos-based encryption for digital images and videos. In: multimedia security handbook. CRC Press, Boca Raton, pp 133–67

    Google Scholar 

  18. Marc Van Droogenbroeck (2004) Partial encryption of images for real-time applications. In proceedings of the 4th IEEE Benelux signal processing symposium, Hilvarenbeek, The Netherlands, pp 11–5.

  19. Mark M. Fisch, Herbert Stogner, Andreas Uhl (2004) Layered Encryption Techniques for DCT-coded visual data. In European Signal Processing Conference (EUSIPCO) pp 6–10.

  20. Matthews R (1989) On the derivation of a ‘chaotic’ encryption algorithm. Cryptologia 13(1):29–41

    Article  MathSciNet  Google Scholar 

  21. Nahla A. Flayh, Syed I.Ahson (2008) Wavelet Based Image Encryption. 9th International Conference on Signal Processing pp 797–800.

  22. Nidhi Taneja, Bala Subramanian Raman, Indra Gupta (2011) Combinational domain encryption for still visual data. Multimedia Tools and Applications (Springer-Verlag), pp 1–19.

  23. Saga H (1994) Space-filling curves. Springer, New York

    Book  Google Scholar 

  24. Schneier B (1996) Applied cryptography-protocols, algorithms and source code, 2nd edn. Wiley, New York

    MATH  Google Scholar 

  25. Shiguo Lian, Zhiquan Wang (2003) Comparison of Several Wavelet Coefficient Confusion Methods Applied in Multimedia Encryption. Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing (ICCNIMC’03) pp 372–376.

  26. Shuo Zhang, Ruhua Cai, Yingchun Jiang, Shiping Guo (2009) An Image Encryption Algorithm Based on Multiple Chaos and Wavelet Transform. 2nd International Congress on Image and Signal Processing, pp 1–5.

  27. Van Marc D, Raphael B (2002) Techniques for a selective encryption of uncompressed and compressed images. Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS), Belgium, pp 90–97

    Google Scholar 

  28. W.Puech, J.M.Rodrigues (2005) Crypto-Compression of medical images by selectiveencryption of DCT. European Signal Processing Conference (EUSIPCO’05), Antalya (Turkey).

  29. Wang Y, Wong K-W, Lia X, Xiang T, Chen G (2009) A chaos- based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4):1773–1783

    Article  MATH  Google Scholar 

  30. Wang, L., Ye, Q., Xiao, Y.Q., Zou, Y.X., Zhang, B. (2008) An image encryption scheme based on cross chaotic map. In: Proceeding of 1st International Congress on Image and Signal Processing, Sanya, China, 3:22–26.

  31. William Stallings (2006) Cryptography and Network Security, fourth edition. Pearson Education.

  32. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354

    Article  Google Scholar 

  33. Ye R (2011) A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284(22):5290–5298

    Article  Google Scholar 

  34. Zhou Wang (2004) Alan Conrad Bovik, Hamid Rahim Sheikh and Eero P. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing 13(4):600–612.

  35. Zhu Z-l, Zhang W, Wong K-w, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  36. Zhu Yu, Zhou Zhe, Yang haibing, Pan Wenjie, Zhang Yunpeng (2010) A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. 2nd International Conference on Advanced Computer Control (ICACC), pp 217–222.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Krishnamoorthi.

Appendix A

Appendix A

Spectral Distortion (SD)

It is defined as the spectral similarity between the images. The mathematical formula is defined as

$$ SD\left(x,y\right)=\frac{1}{MN}{\displaystyle \sum_{i=1}^M{\displaystyle \sum_{j=1}^N{x}_{i,j}-{y}_{i,j}}} $$
(31)

where M, N denote the total number of pixels in the image, and x i,j and y i,j denote the original image and encrypted image, respectively. The higher value of SD denotes the complete difference of the images.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krishnamoorthi, R., Murali, P. A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices. Multimed Tools Appl 76, 1217–1246 (2017). https://doi.org/10.1007/s11042-015-3027-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3027-1

Keywords

Navigation