Loading…

Efficient implementation of chaotic image encryption in transform domains

•Investigation of transform domain encryption.•IWT encryption study.•Study of chaotic Baker map permutation. The primary goal of this paper is security management in data image transmission and storage. Because of the increased use of images in industrial operations, it is necessary to protect the s...

Full description

Saved in:
Bibliographic Details
Published in:The Journal of systems and software 2014-11, Vol.97, p.118-127
Main Authors: Naeem, Ensherah A., Abd Elnaby, Mustafa M., Soliman, Naglaa F., Abbas, Alaa M., Faragallah, Osama S., Semary, Noura, Hadhoud, Mohiy M., Alshebeili, Saleh A., Abd El-Samie, Fathi E.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•Investigation of transform domain encryption.•IWT encryption study.•Study of chaotic Baker map permutation. The primary goal of this paper is security management in data image transmission and storage. Because of the increased use of images in industrial operations, it is necessary to protect the secret data of the image against unauthorized access. In this paper, we introduce a novel approach for image encryption based on employing a cyclic shift and the 2-D chaotic Baker map in different transform domains. The Integer Wavelet Transform (IWT), the Discrete Wavelet Transform (DWT), and the Discrete Cosine Transform (DCT) are exploited in the proposed encryption approach. The characteristics of the transform domains are studied and used to carry out the chaotic encryption. A comparison study between the transform-domain encryption approaches in the presence of attacks shows the superiority of encryption in the DWT domain.
ISSN:0164-1212
1873-1228
DOI:10.1016/j.jss.2014.07.026