166
Views
10
CrossRef citations to date
0
Altmetric
Research Articles

A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor

, , ORCID Icon &
Pages 24-40 | Received 25 Jan 2019, Accepted 07 Feb 2020, Published online: 14 Mar 2020

References

  • Chen G, Mao Y, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals. 2004;21(3):749–761. doi: 10.1016/j.chaos.2003.12.022
  • Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifur Chaos. 1998;8(6):1259–1284. doi: 10.1142/S021812749800098X
  • Guan ZH, Huang F, Guan W. Chaos-based image encryption algorithm. Phys Lett Sect A. 2005;346(1–3):153–157. doi: 10.1016/j.physleta.2005.08.006
  • Pareek NK, Patidar V, Sud KK. Image encryption using chaotic logistic map. Image Vis Comput. 2006;24(9):926–934. doi: 10.1016/j.imavis.2006.02.021
  • Belazi A, Abd El-Latif AA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016;128:155–170. doi: 10.1016/j.sigpro.2016.03.021
  • Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Math Comput Model. 2010;52(11–12):2028–2035. doi: 10.1016/j.mcm.2010.06.005
  • Liu H, Wang X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun. 2011;284(16–17):3895–3903. doi: 10.1016/j.optcom.2011.04.001
  • François M, Grosges T, Barchiesi D, et al. Image encryption algorithm based on a chaotic iterative process. Appl Math (Irvine). 2012;3(12):1910. doi: 10.4236/am.2012.312262
  • Norouzi B, Mirzakuchaki S. An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl. 2017;76(11):13681–13701. doi: 10.1007/s11042-016-3769-4
  • Musanna F, Kumar S. A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-d cat map. Multimed Tools Appl. 2019;78(11):14867–14895. doi: 10.1007/s11042-018-6827-2
  • Musanna F, Rani A, Kumar S. Image encryption using chaotic 3-D Arnold's cat map and logistic map. Proceedings of 2nd International Conference on Computer Vision & Image Processing. Springer; 2018. p. 365–378.
  • Chen L, Zhao D, Ge F. Image encryption based on singular value decomposition and arnold transform in fractional domain. Opt Commun. 2013;291:98–103. doi: 10.1016/j.optcom.2012.10.080
  • Prasad A, Kumar M, Choudhury DR. Color image encoding using fractional fourier transformation associated with wavelet transformation. Opt Commun. 2012;285(6):1005–1009. doi: 10.1016/j.optcom.2011.10.019
  • Kumar M, Agrawal S. Color image encoding in dost domain using DWT and SVD. Opt Laser Technol. 2015;75:138–145. doi: 10.1016/j.optlastec.2015.06.022
  • Li C-L, Li H-M, Li F-D, et al. Multiple-image encryption by using robust chaotic map in wavelet transform domain. Optik. 2018;171:277–286. doi: 10.1016/j.ijleo.2018.06.029
  • Liansheng S, Xiao Z, Chongtian H, et al. Silhouette-free interference-based multiple-image encryption using cascaded fractional fourier transforms. Opt Lasers Eng. 2019;113:29–37. doi: 10.1016/j.optlaseng.2018.10.002
  • Li X, Meng X, Yang X, et al. Multiple-image encryption via lifting wavelet transform and xor operation based on compressive ghost imaging scheme. Opt Lasers Eng. 2018;102:106–111. doi: 10.1016/j.optlaseng.2017.10.023
  • Ashino R, Morimoto A, Vaillancourt R. Image compression with multiresolution singular value decomposition and other methods. Math Comput Model. 2005;41(6–7):773–790. doi: 10.1016/j.mcm.2003.12.014
  • Ashino R, Morimoto A, Nagase M, et al. Comparing multiresolution svd with other methods for image compression. Advances in analysis. World Scientific; 2005. p. 457–470.
  • Shaw AK, Majumder S. Multiresolution svd and pixel-wise masking based image watermarking. 2016 2nd International Conference on Control, Instrumentation, Energy & Communication (CIEC). IEEE; 2016. p. 193–196.
  • Akhbari B, Ghaemmaghami S. Watermarking of still images using multiresolution singular value decomposition. ISPACS 2005. Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems. IEEE; 2005. p. 325–328.
  • Malini S, Moni RS. Image denoising using multiresolution singular value decomposition transform. Procedia Comput Sci. 2015;46:1708–1715. doi: 10.1016/j.procs.2015.02.114
  • Vaish A, Kumar M. Color image encryption using msvd, dwt and arnold transform in fractional fourier domain. Optik. 2017;145:273–283. doi: 10.1016/j.ijleo.2017.07.041
  • Kumar M, Vaish A. Encryption of color images using msvd in dcst domain. Opt Lasers Eng. 2017;88:51–59. doi: 10.1016/j.optlaseng.2016.07.009
  • Mao Y, Chen G, Lian S. A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifur Chaos. 2004;14(10):3613–3624. doi: 10.1142/S021812740401151X
  • Bihan NL, Mars J. Singular value decomposition of quaternion matrices: a new tool for vector-sensor signal processing. Signal Processing. 2004;84(7):1177–1199. doi: 10.1016/j.sigpro.2004.04.001
  • Golub GH, Reinsch C. Singular value decomposition and least squares solutions. Numer Math. 1970;14(5):403–420. doi: 10.1007/BF02163027
  • Kakarala R, Ogunbona PO. Signal analysis using a multiresolution form of the singular value decomposition. IEEE Trans Image Process. 2001;10(5):724–735. doi: 10.1109/83.918566
  • Thomas R. Deterministic chaos seen in terms of feedback circuits: analysis, synthesis, “labyrinth chaos”. Int J Bifur Chaos. 1999;9(10):1889–1905. doi: 10.1142/S0218127499001383
  • Sprott JC, Chlouverakis KE. Labyrinth chaos. Int J Bifur Chaos. 2007;17(06):2097–2108. doi: 10.1142/S0218127407018245
  • Soto J. Statistical testing of random number generators. Proceedings of the 22nd National Information Systems Security Conference. Vol. 10. NIST Gaithersburg; 1999. p. 12.
  • Wu Y, Noonan JP, Yang G, et al. Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging. 2012;21(1):013014. doi: 10.1117/1.JEI.21.1.013014
  • Zhou Y, Bao L, Chen CLP. Image encryption using a new parametric switching chaotic system. Signal Processing. 2013;93(11):3039–3052. doi: 10.1016/j.sigpro.2013.04.021
  • Wu Y, Noonan JP, Agaian S. A wheel-switch chaotic system for image encryption. 2011 International Conference on System Science and Engineering (ICSSE). IEEE; 2011. p. 23–27.
  • Liao X, Lai S, Zhou Q. A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing. 2010;90(9):2714–2722. doi: 10.1016/j.sigpro.2010.03.022
  • Hua Z, Zhou Y, Pun CM, et al. 2D sine logistic modulation map for image encryption. Inf Sci. 2015;297:80–94. doi: 10.1016/j.ins.2014.11.018
  • Kocarev L, Lian S. Chaos-based cryptography: theory, algorithms and applications. Vol. 354. Springer Science & Business Media; 2011.
  • Zhen W, Xia H, Ning L. Image encryption based on a delayed fractional-order chaotic logistic system. Chin Phys B. 2012;21(5):050506). DOI:10.1088/1674-1056/21/5/050506
  • Wang Z, Bovik AC, Sheikh HR, et al. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–612. doi: 10.1109/TIP.2003.819861
  • Dosselmann R, Yang XD. A formal assessment of the structural similarity index. Department of Computer Science, University of Regina; 2008.
  • Bhatnagar G, Saha A, Wu QMJ, et al. Analysis and extension of multiresolution singular value decomposition. Inf Sci. 2014;277:247–262. doi: 10.1016/j.ins.2014.02.018
  • Teng L, Wang X. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun. 2012;285(20):4048–4054. doi: 10.1016/j.optcom.2012.06.004
  • Hua Z, Zhou Y. Image encryption using 2d logistic-adjusted-sine map. Inf Sci. 2016;339:237–253. doi: 10.1016/j.ins.2016.01.017
  • Xu L, Li Z, Li J, et al. A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng. 2016;78:17–25. doi: 10.1016/j.optlaseng.2015.09.007
  • Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, et al. A rgb image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015;109:119–131. doi: 10.1016/j.sigpro.2014.10.033
  • Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT); 2011. p. 31–38.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.