Open Access Open Access  Restricted Access Subscription or Fee Access

Secured Color Image Compression and Efficient Reconstruction Using Arnold Transform with Chaos Encoding Technique

D. Venugopal, M. Gunasekaran, A. Sivanatharaja

Abstract


Secured image compression is the key issue in image transmission applications. This paper proposes the idea of combining both compression and security of an image. In the existing methods to encrypt images, the key size is too large since the whole matrix is considered as the key. To solve this problem, encryption through key controlled matrix is constructed using the logistic map in this proposed method. Then Arnold transform is used for image location scrambling. First the input image is decomposed into bands and compressed by level dependent hard threshold method and then combined with above encryption algorithms to get compressed-encrypted image. This algorithm produces a cipher for test images that have good diffusion and confusion properties. Simulation results of histogram analysis, key sensitivity analysis of adjacent pixels and PSNR shows the enhanced security and effectiveness of the proposed algorithm and reasonable increase in compression performance.


Keywords


Arnold Transforms, Chaos System, Encryption, Image Compression.

Full Text:

PDF

References


Nanrun Zhou, Aidi Zhang, Fen Zheng, and Lihua Gong, “Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing,” Optics & Laser Technology, pp 152–160, 2014.

C. Rafael Gonzalez, E. Richard Woods, “Digital Image Processing (2nd edition),” NJ, Prentice Hall, 1992.

S.Anitha, “Image Compression using Discrete Cosine Transform and Discrete Wavelet Transform,” International Journal of Scientific & Engineering Research. 2(8), 1-6, 2011.

Pavan Kumar, Goswami, Namita Tiwari, and Meenu Chawla, “Block Based Image Encryption Using Iterative Arnold Transformation,” International Journal of Advanced Research in Computer Science and Software Engineering. 3(8), 273-278, 2013.

Karl Martin, RastislavLukac, and Konstantinos N. Plataniotis, “Efficient Encryption of Compressed Color Images,” IEEE ISIE 2005, Dubrovnik, Croatia, 1245-1250, 2005.

Hilton de Oliveira Motaa, Leonardo Chaves Dutra da Rochaa, Thiago Cunha de MouraSalles, and Flávio Henrique Vasconcelos, “Partial discharge signal denoising with spatially adaptive wavelet thresholding and support vector machines,” Elsevier.81, 644–659, 2011.

Fei Xiaoa, Yungang Zhang, “A Comparative Study on Thresholding Methods in Wavelet based Image Denoising,” Elsevier.15, 1877-7058, 2011.

Wang Sheng Fang, Lu Lu Wu, and Rong Zhang, “A Watermark Preprocessing Algorithm Based on Arnold Transformation and Logistic Chaotic Map,” Advanced Materials Research. 341-342, 720-724, 2012.

Lu P, Xu ZY, Lu X, and Liu XY, “Digital image information encryption based on compressive sensing and double random-phase encoding technique,” Optik-International Journal for Light and Electron Optics. 124(16), 2514–2518, 2013.

Liu XY, Cao YP, Lu P, Lu X, and Li Y, “Optical image encryption technique based on compressed sensing and Arnold transformation,” Optik-International Journal for Light and Electron Optics.124, 6590–3, 2013.

R. Huang, K.Sakurai, “A robust and compression-combined digital image encryption method based on compressive sensing,” In: Proceedings of the 7th international conference on intelligent information hiding and multimedia signal processing (IIHMSP). pp 105–8, 2011.

BM. Hennelly, JT. Sheridan, “Image encryption and the fractional Fourier trans-form,” Proc SPIE –IntSoc Opt Eng, 5202: 76-8, 2003.

A. Cohen, J. Kovacevic,“Wavelets: the mathematical background,” Proceedings of the IEEE. 84(4), pp 514–522,1996.

M. Mozammel Hoque Chowdhury, Amina Khatun, “Image Compression Using Discrete Wavelet Transform,” IJCSI 9, pp 327-330 ,2012.

M. S. Azzaz, C. Tanougast, S. Sadoudi, A. Dandache, and F. A. Monteiro, “Real-time image encryption based chaotic synchronized embedded cryptosystems,” IEEE International NEWCAS Conference (NEWCAS ’10), pp 61–64,2010. doi: 10.1109/NEWCAS.2010.5603717.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.