A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher i
- PDF / 4,623,991 Bytes
- 28 Pages / 439.642 x 666.49 pts Page_size
- 105 Downloads / 201 Views
A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images Farhan Musanna1
· Deepak Dangwal1 · Sanjeev Kumar1
Received: 25 June 2019 / Revised: 16 March 2020 / Accepted: 5 May 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract For secure transmission of digital images, existing cryptographic algorithms transform images into a noise-like appearance. One obvious inference that an adversary could draw is that the noise-like texture is a cipher, prompting to apply classical cryptanalysis. This article proposes an efficient algorithm that produces a visually coherent and meaningful cipher image to bypass the cryptanalysis. In the partial-encryption phase, the Arnold-3D map drives the permutation mechanism, whereas the implementation of the diffusion phase is done by harnessing the iterates of the chaotic Logistic map. The partial cipher is compressed using a Cantor-like pairing function that does a 4 to 1 pixel encoding to facilitate embedding. The embedding phase is implemented in the spatial domain by applying Multiresolution singular value decomposition on the reference image and replacing the vertical, horizontal, diagonal sub-band with the encoded cipher. The encoding of pixels facilitates the transmission of the visually meaningful cipher image to be of the same size as the original image rather than four-times the original image as reported in earlier schemes. Simulation results confirm the security of the scheme. Keywords 3D-Arnold Cat map · Logistic equation · Multi-resolution singular value decomposition · Pairing functions · Pixel-encoding · Visually meaningful cipher image
1 Introduction With the fast-evolving field of multimedia applications and advances in the IT sector, information is being transmitted in bulk all around the world over unsecure channels. Thus the Sanjeev Kumar
[email protected] Farhan Musanna [email protected] Deepak Dangwal [email protected] 1
Department of Mathematics, Indian Institute of Technology, Roorkee, India
Multimedia Tools and Applications
security of these digital transmissions is necessary. The literature is abundant with works by the research community to keep the information secure from eves-dropping. One such source of information transmission nowadays is via the visual medium, i.e., through digital images and videos. The importance of the information content of these digital images/videos may range from being a digital signature, blueprint of a city, classified data, to an individual’s personal snapshots. Preventing this classified information from leakage is a serious question that is being posed in modern-day times, and thus malicious attacks should be taken care of with efficient algorithms. Traditional finite field-theoretic cryptographic algorithms proposed by Zeghid et al. [45] have implemented a modified AES for encrypting images. Apart from these cryptographic algorithms, a different paradigm has focussed on approaches like changing pixe
Data Loading...