Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
Hemalatha Mahalingam,
Thanikaiselvan Veeramalai (),
Anirudh Rajiv Menon,
Subashanthini S. and
Rengarajan Amirtharajan ()
Additional contact information
Hemalatha Mahalingam: Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah 22254, Saudi Arabia
Thanikaiselvan Veeramalai: School of Electronics Engineering, Vellore Institute of Technology, Vellore 632014, India
Anirudh Rajiv Menon: School of Electronics Engineering, Vellore Institute of Technology, Vellore 632014, India
Subashanthini S.: School of Information Technology, Vellore Institute of Technology, Vellore 632014, India
Rengarajan Amirtharajan: School of Electrical & Electronics Engineering, SASTRA Deemed University Thanjavur, Thanjavur 613401, India
Mathematics, 2023, vol. 11, issue 2, 1-23
Abstract:
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them so that such images, even if intercepted, will not be interpreted accurately. Such encryption is proposed with a two-layer image encryption scheme involving bit-level encryption in the time-frequency domain. The top layer consists of a bit of plane slicing the image, and each plane is then scrambled using a chaotic map and encrypted with a key generated from the same chaotic map. Next, image segmentation, followed by a Lifting Wavelet Transform, is used to scramble and encrypt each segment’s low-frequency components. Then, a chaotic hybrid map is used to scramble and encrypt the final layer. Multiple analyses were performed on the algorithm, and this proposed work achieved a maximum entropy of 7.99 and near zero correlation, evidencing the resistance towards statistical attacks. Further, the keyspace of the cryptosystem is greater than 2 128 , which can effectively resist a brute force attack. In addition, this algorithm requires only 2.1743 s to perform the encryption of a 256 × 256 sized 8-bit image on a host system with a Windows 10 operating system of 64-bit Intel(R) Core(TM) i5-7200U CPU at 2.5 GHz with 8 GB RAM.
Keywords: encryption; chaotic maps; integer wavelet transform; statistical attack; keyspace (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/11/2/457/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/2/457/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:2:p:457-:d:1036430
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().