Skip to main content
Log in

Image encryption using discrete orthogonal Stockwell transform with fractional Fourier transform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this article, a new image encryption algorithm has been proposed for image security. This algorithm is created with discrete orthogonal Stockwell transform (DOST) and fractional Fourier transform (FrFT). It has been used for image encryption and decryption. The DOST has improved computational efficiency and delivered a spatial time-frequency depiction similar to the other transform like discrete wavelet transform (DWT). In this method, encryption of the image has been used DOST with independent specific keys and its fractional-order and analyzed the effect of DOST. Thereafter, decrypted the image through the inverse process of the image encryption. The encrypted image has been achieved using the correct order and keys. We used different images and plotted their encrypted histogram and scatter, respectively. Then, calculate the correlation coefficient of the original, encryption image, encryption time, and entropy. Moreover, evaluate the variation between encrypted and original images using the number of pixel change rates (NPCR) and unified average changing intensity (UACI). Also, it compared the results of the proposed algorithm with the existing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The manuscript has no associated data. The presented work requires only the published research papers in the area.

References

  1. Ansari N, Shaikh R (2016) A keyless approach for RDH in encrypted images using visual cryptography. Procedia Comput Sci 78:125–131, ISSN 1877-0509. https://doi.org/10.1016/j.procs.2016.02.021

    Article  Google Scholar 

  2. Drabycz S, Stockwell RG, Mitchell JR (2012) Image texture characterization using the discrete orthonormal S-transform. J Digit Imaging 22(6):696

    Article  Google Scholar 

  3. ElkadyMM, Abd Elnaby MMA, Hussein AH, Kader HMA (2016) Chaotic based technique for partial image encryption. In: 2016 26th International Conference on Computer Theory and Applications (ICCTA), pp 20–25. https://doi.org/10.1109/ICCTA40200.2016.9512943

  4. Jiang M, Chen W, Zheng Z, Zhong M (2012) Fringe pattern analysis by S-transform. Opt Commun 285(3):209–217

    Article  Google Scholar 

  5. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17:2943–2959

    Article  MathSciNet  MATH  Google Scholar 

  6. Kumar M, Vaish A (2017) Encryption of color images using MSVD in DCST domain. Opt Lasers Eng 88:51–59

    Article  Google Scholar 

  7. Kumar R et al (2017) A survey on key(s) and keyless image encryption techniques. Cybern Inf Technol 17(4):134–164. https://doi.org/10.1515/cait-2017-0046

    Article  MathSciNet  Google Scholar 

  8. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59:3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Opt Lasers Eng 51(1):8–14

    Article  Google Scholar 

  10. Mamta D, Gupta BB, Li KC, Leung VCM, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Autom Sin 8(12):1877–1890. https://doi.org/10.1109/JAS.2021.1004003

    Article  Google Scholar 

  11. Mukherjee I, Ganguly R (2018) Multiple video clips preservation using folded back audio-visual cryptography scheme. Multimed Tools Appl 77:5281–5301. https://doi.org/10.1007/s11042-017-4431-5

    Article  Google Scholar 

  12. Musheer A, Alsharari HD, Nizam M (2014) Security improvement of an image encryption based on pixel-chaotic-shuffle and pixel-chaotic-diffusion. arXiv preprint arXiv:1403.6626. https://doi.org/10.48550/arXiv.1403.6626

  13. Nguyen N et al (2021) Secure blockchain-enabled cyber-physical systems in healthcare using deep belief network with ResNet model. J Parallel Distrib Comput 153:150–160, ISSN 0743-7315. https://doi.org/10.1016/j.jpdc.2021.03.011

    Article  Google Scholar 

  14. Nithya B, Sankari YB, Manikantan K, Ramachandran S (2015) Discrete orthonormal Stockwell transform based feature extraction for pose invariant face recognition. Procedia Comput Sci 45:290–299

    Article  Google Scholar 

  15. Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76:7445–7471. https://doi.org/10.1007/s11042-016-3319-0

    Article  Google Scholar 

  16. Prasad A, Kumar M, Choudhury DR (2008) Color image encoding using fractional Fourier transformation associated with wavelet transformation. Opt Commun 285(6):1005–1009

    Article  Google Scholar 

  17. Raghunandan KR, Ganesh A, Surendra S, Bhavya K (2020) Key generation using generalized Pell’s equation in public key cryptography based on the prime fake Modulus principle to image encryption and its security analysis. Cybern Inf Technol 20(3):86–101. https://doi.org/10.2478/cait-2020-0030

    Article  Google Scholar 

  18. Ranjan R, Thakur A (2019) Image segmentation and semantic labeling using machine learning. Int J Recent Technol Eng (IJRTE) 1(5S2):2277–3878

  19. Ranjan R, Singh AK, Jindal N (2018) Formulation of some useful theorem for S-transform. Optik- Int J Light Electron Opt 168:913–919. https://doi.org/10.1016/j.ijleo.2018.05.009

  20. Ranjan R, Jindal N, Singh AK (2019) A sampling theorem with error estimation for S-transform. Integr Transforms Spec Funct:1–21. https://doi.org/10.1080/10652469.2019.1590353

  21. Ranjan R, Jindal N, Singh AK (2020) Fractional S-transform and its properties: a comprehensive survey. Wirel Pers Commun 113(4):2519–2541. https://doi.org/10.1007/s11277-020-07339-6

  22. Ranjan R, Jindal N, Singh AK (2022) The identities of n-dimensional s-transform and applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-12757-8

  23. Ranjan R, Jindal N, Singh AK (2018) Multiplicative filter design using S-transform. In: 2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), pp 260–263. https://doi.org/10.1109/ICMETE.2018.00064

  24. Tewari A, Gupta BB Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int J Semant Web Inf Syst 16(3):15. https://doi.org/10.4018/IJSWIS.2020070102

  25. Wang Y, Orchard J (2008) Symmetric discrete orthonormal Stockwell transform. In: AIP Conference Proceedings 1048:585. https://doi.org/10.1063/1.2990992

  26. Wang Y, Orchard J (2009) Fast discrete orthonormal Stockwell transform. SIAM J Sci Comput 31(5):4000–4012

    Article  MathSciNet  MATH  Google Scholar 

  27. Wang Y, Orchard J (2009) On the Stockwell transform for image compression. In: Image Processing: International Society for Optics and Photonics,Proceedings Volume 7245, Image Processing: Algorithms and Systems VII:724504. https://doi.org/10.1117/12.806005

  28. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer-generated hologram. Multimed Tools Appl 77:4585–4608. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

  29. Yue W, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  30. Zheng Q, Wang X, Khurram Khan M, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722. https://doi.org/10.1109/ACCESS.2017.2775038

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajeev Ranjan.

Ethics declarations

Conflict of interests

The authors declare no potential conflicts of interest concerning this article’s research, authorship, and publication. The views expressed in this article are solely those of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ranjan, R., Thakur, A. Image encryption using discrete orthogonal Stockwell transform with fractional Fourier transform. Multimed Tools Appl 82, 18517–18527 (2023). https://doi.org/10.1007/s11042-022-14240-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14240-w

Keywords

Navigation