Open Access Open Access  Restricted Access Subscription Access

Discreat Cosine Transform and Gyrator Transform for Image Encryption

K. Thamizhmaran

Abstract


An image is a picture that is digitally made, duplicated, and saved. Usually, colour Images can be encrypted using hyperchaotic system using DCT and gyrator transform domains the Red, Green, Blue (RGB) components of the original colour image are encoded into two dimensional streams, respectively. In this project work, proposes a new image encryption scheme integrated with DCT and Gyrator transform simultaneously. In particular, complex sequences are synthesized by blending four chaotic sequences produced by a hyperchaotic system into streams. Subsequently we scramble the two dimensional complex streams using Discrete cosine transform and encoded back into image format. Finally the parameters in the hyperchaotic system using DCT and Gyrator Transform are improving the security of proposed scheme.  Theoretical and experimental analysis both confirm the security and the validity of the proposed work.


Full Text:

PDF

References


Refregier and Javidi (1995) “Optical image encryption based on input plane and Fourier plane random encoding”, Optical Letter, Vol. 20, pp. 767–769.

K. Thamizhmaran, R. Santosh Kumar Mahto, and V. Sanjesh Kumar Tripathi, (2012) “Performance Analysis of Secure Routing Protocols in MANET”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, No. 9, pp. 651-654.

K. Thamizhmaran, A. D. Arivazhagan and M. Anitha, "Co-operative analysis of proactive and reactive protocols using dijkstra’s algorithm", 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1-6, Jan. 2015

K. Thamizhmaran and M. Anitha (2015) “A Survey of Routing Protocols in Mobile Ad hoc Network, International Journal of Applied Engineering Research, Vol. 10, No. 1, pp. 490-496.

K. Prabu and K. Thamizhmaran (2016) “Detecting misbehaving nodes in MANET using EA3ACK algorithm, Global Journal of Pure and Applied Mathematics, Vol. 12, No. 4, pp.1-6.

K.Thamizhmaran., M. Anitha and Alamelunachippan (2017) “Performance Analysis of On-demand Routing Protocol for MANET Using EA3ACK Algorithm”, International Journal of Mobile Network Design and Innovation, Vol. 7, No. 2, pp. 88-100.

Lang, (2000) “Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform”, Optical Communication, Vol. 285, pp. 2584–2590.

Rodrigo, et al (2007) “Gyrator transform: Properties and applications”, Opt. Express, Vol. 15, pp. 2190–2230.

Singh and Sinha (2009) “Gyrator transform-based optical image encryption using chaos”, Opt. Lasers Eng, Vol. 47, pp. 539–546.

Li, et al (2013) “Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform”, Opt. Lasers Eng, Vol. 51, pp. 1327–1331.


Refbacks

  • There are currently no refbacks.