EconPapers    
Economics at your fingertips  
 

Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective

Hemalatha Mahalingam, Thanikaiselvan Veeramalai (), Anirudh Rajiv Menon, Subashanthini S. and Rengarajan Amirtharajan ()
Additional contact information
Hemalatha Mahalingam: Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah 22254, Saudi Arabia
Thanikaiselvan Veeramalai: School of Electronics Engineering, Vellore Institute of Technology, Vellore 632014, India
Anirudh Rajiv Menon: School of Electronics Engineering, Vellore Institute of Technology, Vellore 632014, India
Subashanthini S.: School of Information Technology, Vellore Institute of Technology, Vellore 632014, India
Rengarajan Amirtharajan: School of Electrical & Electronics Engineering, SASTRA Deemed University Thanjavur, Thanjavur 613401, India

Mathematics, 2023, vol. 11, issue 2, 1-23

Abstract: With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them so that such images, even if intercepted, will not be interpreted accurately. Such encryption is proposed with a two-layer image encryption scheme involving bit-level encryption in the time-frequency domain. The top layer consists of a bit of plane slicing the image, and each plane is then scrambled using a chaotic map and encrypted with a key generated from the same chaotic map. Next, image segmentation, followed by a Lifting Wavelet Transform, is used to scramble and encrypt each segment’s low-frequency components. Then, a chaotic hybrid map is used to scramble and encrypt the final layer. Multiple analyses were performed on the algorithm, and this proposed work achieved a maximum entropy of 7.99 and near zero correlation, evidencing the resistance towards statistical attacks. Further, the keyspace of the cryptosystem is greater than 2 128 , which can effectively resist a brute force attack. In addition, this algorithm requires only 2.1743 s to perform the encryption of a 256 × 256 sized 8-bit image on a host system with a Windows 10 operating system of 64-bit Intel(R) Core(TM) i5-7200U CPU at 2.5 GHz with 8 GB RAM.

Keywords: encryption; chaotic maps; integer wavelet transform; statistical attack; keyspace (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/11/2/457/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/2/457/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:2:p:457-:d:1036430

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:11:y:2023:i:2:p:457-:d:1036430