Skip to main content
Log in

Image encryption using adaptive multiband signal decomposition

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Due to the rapid growth of multimedia transmission over the internet, the challenges of image security have become an important research topic. In this paper, an Adaptive Multiband Signal Decomposition (AMSD) is proposed and its application for image encryption is explored. Like the conventional multiband wavelet transform, the AMSD can decompose the original image into multiband subimages. The perfect reconstruction of the original image from the decomposed multibands is achieved. In addition, a novel image encryption algorithm based on the adaptive multiband image decomposition with three dimensional discrete chaotic maps is developed and its performance is evaluated using common security analysis methods. Simulation results show that the proposed encryption algorithm has great degree of security and can resist various typical attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Aboughalia, R. A., & Alkishriwo, O. A. (2018). Color image encryption based on chaotic block permutation and XOR operation. In Libyan international conference on electrical engineering and technologies (LICEET2018) (pp. 492–497). Libya: Tripoli.

  • Alkishriwo, O. A. (2018). An image encryption algorithm based on chaotic maps and discrete linear chirp transform. Almadar Journal for Communications Information Technology and Applications, 5(1), 14–19.

    Google Scholar 

  • Alzreghi, H. S., & Alkishriwo, O. A. (2018). Color Image Encryption in the Spatial Domain Using 3-D Chaotic System. In AIJR publisher in proceedings of first conference for engineering sciences and technology (CEST-2018) (vol. 1, pp. 81–86).

  • Cavusoglu, U., Kacar, S., Pehlivan, I., & Zengin, A. (2017). Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons and Fractals, 95, 92–101.

    Article  Google Scholar 

  • Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21, 749–761.

    Article  MathSciNet  Google Scholar 

  • Diab, H., & Elsemary, A. (2018). Secure image cryptosystem with unique key streams via hyper-chaotic system. Signal Processing, 142, 53–68.

    Article  Google Scholar 

  • Kanso, A., & Ghebleh, M. (2012). A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2943–2959.

    Article  MathSciNet  Google Scholar 

  • Kassim, S., Hamiche, H., Djennoune, S., & Bettayeb, M. (2017). A novel secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems. Nonlinear Dynamics, 88(4), 2473–2489.

    Article  MathSciNet  Google Scholar 

  • Khan, S., Han, L., Lu, H., Butt, K., Bachira, G., & Khan, N. (2019). A new hybrid image encryption algorithm based on 2D-CA. FSM-DNA rule generator, and FSBI. IEEE Acess, 7, 81333–81350.

    Article  Google Scholar 

  • Lisungu, O., & Ambe, M. (2019). A selective image encryption scheme based on 2D DWT, Henon map, and 4D Qi hyper-chaos. IEEE Access, 7, 103463–103472.

    Article  Google Scholar 

  • Liu, H., & Wang, X. (2013). Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. Journal of Systems and Software, 86(3), 826–834.

    Article  Google Scholar 

  • Liu, L., Miao, S., Hu, H., et al. (2016). N-phase logistic chaotic sequence and its application for image encryption. IET Signal Processing, 10(9), 1096–1104.

    Article  Google Scholar 

  • Liu, Y., Wang, J., Fan, J., & Gong, L. (2016). Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimedia Tools and Applications, 75, 4363–4382.

    Article  Google Scholar 

  • Luo, Y., Du, M., & Liu, J. (2015). A symmetrical image encryption scheme in wavelet and time domain. Communications in Nonlinear Science and Numerical Simulation, 20(2), 447–460.

    Article  Google Scholar 

  • Murugan, B., Gounden, A., & Gounder, N. (2016). Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Computer Vison, 10(6), 593–602.

    Article  Google Scholar 

  • Pak, C., & Huang, L. (2017). A new color image encryption using combination of the 1D chaotic map. Signal Processing, 138, 129–137.

    Article  Google Scholar 

  • Xu, L., Gou, X., Li, Z., & Li, J. (2017). A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Optics and Lasers in Engineering, 91, 41–52.

    Article  Google Scholar 

  • Xu, L., Li, Z., Li, J., & Hua, W. (2016). A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering, 78, 17–25.

    Article  Google Scholar 

  • Ye, G., & Huang, X. (2017). An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing, 251, 45–53.

    Article  Google Scholar 

  • Zhu, H., Zhang, X., Yu, H., Zhao, C., & Zhu, Z. (2016). A novel image encryption scheme using the composite discrete chaotic system. Entropy, 18(8), 1–27.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama A. S. Alkishriwo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alkishriwo, O.A.S. Image encryption using adaptive multiband signal decomposition. Multidim Syst Sign Process 32, 993–1004 (2021). https://doi.org/10.1007/s11045-021-00770-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-021-00770-3

Keywords

Navigation