149
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Colour image encryption scheme based on the real-valued discrete Gabor transform

, &
Pages 511-522 | Received 23 Sep 2021, Accepted 11 Mar 2022, Published online: 01 Apr 2022

References

  • Wang H, Han Z-z, Xie Q-y, et al. Finite-time chaos synchronization of unified chaotic system with uncertain parameters. Commun Nonlinear Sci Numer Simul. 2009;14(5):2239–2247.
  • Guan ZH, Huang FJ, Guan WJ. Chaos-based image encryption algorithm. Phys Lett A. 2005;346(1-3):153–157.
  • Wang XY, Yang L. A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Opt Commun. 2012;285(20):4033–4042.
  • Li JH, Liu H. Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf Secur. 2013;7(4):265–270.
  • Hua ZY, Zhou YC. Image encryption using 2D logistic-adjusted-sine map. Inf Sci. 2016;339:237–253.
  • Huang XL, Ye GD. An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simul. 2014;19(12):4094–4104.
  • Guo XC, Xiang F, Liu W. An image encryption algorithm based on multiple chaotic mapping. Comput Eng. 2012;38(20):93–96.
  • Zheng JM, Gao WZ. Color image encryption algorithm based on chaotic map. Comput Eng Design. 2011;32(9):2934–2937.
  • Zhu Z-l, Zhang W, Wong K-w, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci. 2011;181(6):1171–1186.
  • Wang XY, Zhang YQ, Zhao YY. A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. Nonlinear Dyn. 2015;82(3):1269–1280.
  • Deng XH, Liao CL, Zhu CX, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit. J Commun. 2014;35(3):216–223.
  • Fu C, Lin B-b, Miao Y-s, et al. A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun. 2011;284(23):5415–5423.
  • Zhou YC, Cao WJ, Chen CLP. Image encryption using binary bitplane. Signal Process. 2014;100:197–207.
  • Xie GB, Wang T. A novel hyperchaotic image encryption algorithm based on bit scrambling. Microelectron Comput. 2016;33(7):28–32.
  • Sun SL. A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 2018;10(2):1–14.
  • Xue J, Yuan BZ. A novel approach to the optimal biorthogonal analysis window sequence of the discrete Gabor expansion. Signal Process. 1997;63(1):65–72.
  • Li R, Liu JB. Fast approach for analysis windows computation of multiwindow discrete Gabor transform. IEEE Access. 2018;6:45681–45689.
  • Li R, Kwan HW. Weighted multiwindow discrete Gabor transform. Digit Signal Process. 2021;117: 103155.
  • Ibrahim A, AzimiSadjadi MR. A fast learning algorithm for Gabor transformation. IEEE Trans Image Process. 1996;5(1):171–175.
  • Lu C, Joshi S, Morris JM. Parallel lattice structure of block time-recursive generalized Gabor transforms. Signal Process. 1997;57(2):195–203.
  • Li R, Kwan HK. Parallel lattice structure for dual windows computation in multiwindow Gabor transform. IEEE Access. 2019;7:152722–152728.
  • Li R, Tao L, Kwan HK. Multiwindow discrete Gabor transform using parallel lattice structures. IET Signal Proc. 2020;14(7):420–426.
  • Qian S, Chen DP. Signal representation using adaptive normalized Gaussian functions. Signal Process. 1994;36(1):1–11.
  • Zhang WC, Wang YF, Pan ZG. SAR raw data compression based on 2D real-valued discrete Gabor transform. J Electron Inf Technol. 2008;30(3):569–572.
  • Yan CJ. Face image gender recognition based on Gabor transform and SVM. Commun Comput Inf Sci. 2011;144:420–425.
  • Tao L, Zhuang ZQ. Unified parallel lattice structures for block time-recursive real-valued discrete Gabor transforms. J Comput Sci Technol. 2003;18(1):90–96.
  • Wang YZ, Tao L. 2D Real-valued discrete Gabor transform based on DCT. Comput Eng Appl. 2007;43(8):37–39.
  • Yuan SW, Fan JL, Zhu MT. Color image encryption based on three-dimensional tent map. Appl Res Comput. 2009;26(12):4780–4783.
  • Yavuz E, Yazici R, Kasapbasi MC, et al. A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng. 2016;54:471–483.
  • Hua ZY, Jin F, Xu BX, et al. 2D logistic-sine-coupling map for image encryption. Signal Process. 2018;149:148–161.
  • Zaman JKMSU, Ghosh R. Review on fifteen statistical tests proposed by NIST. J Theor Phys Crypt. 2012;1:18–31.
  • Ravichandran D, Praveenkumar P, Rayappan JBB, et al. Chaos based crossover and mutation for securing DICOM image. Comput Biol Med. 2016;72:170–184.
  • Wu Y, Zhou YC, Saveriades G, et al. Local Shannon entropy measure with statistical tests for image randomness. Inf Sci. 2013;222:323–342.
  • Liu ZJ, Zhao HF, Liu ST. A discrete fractional random transform. Opt Commun. 2005;255(4-6):357–365.
  • Wu XJ, Wang KS, Wang XY, et al. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 2018;148:272–287.
  • Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol. J Sel Areas Telecommun. 2011;1(2):31–38.
  • Gong LH, Du J, Wan J, et al. Image encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation. Secur Commun Netw. 2021;2021: 6627005.
  • Yavuz E. A new parallel processing architecture for accelerating image encryption based on chaos. J Inf Secur Appl. 2021;63:103056.
  • Amina S, Mohamed FK. An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul. 2018;60:12–32.
  • Yavuz Z. A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Opt Laser Technol. 2019;114:224–239.
  • Kadir A, Hamdulla A, Guo WQ. Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik. 2014;125(5):1671–1675.
  • Pak C, An K, Jang P, et al. A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Appl. 2019;78(9):12027–12042.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.