1,361
Views
1
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

A partial image encryption scheme based on DWT and texture segmentation

& | (Reviewing editor)
Article: 2026555 | Received 12 Sep 2021, Accepted 26 Dec 2021, Published online: 07 Feb 2022

References

  • Abdmouleh, M. K., Khalfallah, A., & Bouhlel, M. S. (2017). A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm. Procedia Computer Science, 112, 369–15. https://doi.org/10.1016/j.procs.2017.08.026
  • Amin, M., & Abd El-Latif, A. A. (2010). Efficient modified RC5 based on chaos adapted to image encryption. Journal of Electronic Imaging, 19(1), 1–10. https://doi.org/10.1117/1.3360179
  • Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Partial image encryption using RC4 stream cipher approach and embedded in an image. Academic Journal of Nawroz University (AJNU), 6(3), 40–45. https://doi.org/10.25007/ajnu.v6n3a76
  • Ayoup, A. M., Hussein, A. H., & Attia, M. A. (2015). Efficient selective image encryption using pseudo random number sequences and AES technique. American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 12(1), 187–198.https://www.researchgate.net/publication/284068157_Efficient_Selective_Image_Encryption_using_Pseudo_Random_Sequences_and_AES_Technique
  • Belazi, A., Abd El-Latif, A., Rhouma, R., & Belghith, S., Selective image encryption scheme based on DWT, AES S-Box ans chaotic permutation, 11th International wireless communications and mobile computing conference, Dubrovnik, Croatia, IEEE (2015) 606–610.
  • Benrhouma, O., Mannai, O., & Hermassi, H., Digital images watermarking and partial encryption based on DWT and chaotic maps, 12th International multi-conference on systems, signals & devices, Mahdia, Tunisia, IEEE (2015).
  • Dhall, S., Pal, S. K., & Sharma, K. (2022). A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University - Computer and Information Sciences, 34(1), 1533–1543. https://doi.org/10.1016/j.jksuci.2018.09.015
  • Elkady, M. M., Abd Elnaby, M. M., Hussein, A. H., & Abdul Kader, H. M., Chaotic based technique for partial image encryption, International Conference on Computer and Technology Applications (ICCTA), Alexandria, Egypt, IEEE, (2016).
  • Farsana, J., Devi, V. R., & Gopakumar, K. (2020). An audio encryption scheme based on fast walsh hadamard transform and mixed chaotic keystreams. Applied Computing and Informatics, ahead-of-print(ahead–of–print). https://doi.org/10.1016/j.aci.2019.10.001
  • Forouzan, B. A. (2008). Cryptography and network security. Tata McGraw-Hill.
  • Huang, Y., Bortoli, V. D., Zhou, F., & Gilles, J. (2015). Review of wavelet-based unsupervised texture segmentation, advantage of adaptive wavelets. IET Research J, 12(9), 1–11. doi:10.1049/iet-ipr.2017.1005
  • Ismail, S. M., Said, L. A., Radwan, A. G., Madian, A. H., & Abu-Elyazeed, M. F. (2018). Generalized double-humped logistic map-based medical image encryption. Journal of Advanced Research, 10, 85–98. https://doi.org/10.1016/j.jare.2018.01.009
  • Jain, K., & Farrokhnia, F. (1991). Unsupervised texture segmentation using Gabor filters. Pattern Recognition, 24(12), 1167–1186. https://doi.org/10.1016/0031-3203(91)90143-S
  • Jawad, L. M., & Sulong, G. (2015). A survey on emerging challenges in selective color image encryption techniques. Indian Journal of Science and Technology, 8(27), 1–12. https://doi.org/10.17485/ijst/2015/v8i27/71241
  • K. Ahmed, R., & Mohammed, I. J. (2017). Developing a new hybrid cipher algorithm using DNA and RC4. International Journal of Advanced Computer Science and Applications (IJACSA), 8(10), 171–176. https://thesai.org/Downloads/Volume8No10/Paper_23-Developing_a_New_Hybrid_Cipher_Algorithm.pdf
  • Kachouie, N. N., & Alirezaie, J., Texture segmentation using Gabor filter and multi-layer perceptron, SMC’03 conference proceedings. 2003 IEEE International conference on systems, Washington, D.C., USA; Man and Cybernetics, (2003) 2897–2902.
  • Khan, E.;. S., Hussain, M., Aboalsamh, H., Mathkour, H., Bebis, G., & Zakariah, M. (2016). Optimized Gabor features for mass classification in mammography. Applied Soft Computing, 44(C), 267–280. https://doi.org/10.1016/j.asoc.2016.04.012
  • Kumar, S. H. C., Venugopal, K. R., Raja, K. B., & Patnaik, L. M. (2009, February). Automatic image segmentation using wavelets. IJCSNS International Journal of Computer Science and Network Security, 9(2), 305–313. https://www.researchgate.net/publication/255671386.
  • Li, C., Lin, D., Lu, J., & Hao, F. (2018). Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia, 25(4), 46–56. https://doi.org/10.1109/MMUL.2018.2873472
  • Li, M., Fan, H., Xiang, Y., Li, Y., & Zhang, Y. (2018). Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system. IEEE Multimedia, 25(3), 92–101. https://doi.org/10.1109/MMUL.2018.112142439
  • Lian, S., & Chen, X. (2013). On the design of partial encryption scheme for multimedia content. Mathematical and Computer Modelling, 57(11–12), 2613–2624. https://doi.org/10.1016/j.mcm.2011.06.007
  • Liu, Y., Luo, Y., Song, S., Cao, L., Liu, J., & Harkin, J. (2017). Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation. International Journal of Bifurcation and Chaos, 27(3), 1–14. doi:10.1142/S021812741750033X
  • Mistry, D. (2013). Discrete wavelet transform using matlab. International Journal of Computer Engineering & Technology (IJCET), 4(2), 252–259. https://www.researchgate.net/publication/236154829
  • Okaynak, F. (2018). Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dynamics, 92(2), 305–313. https://doi.org/10.1007/s11071-018-4056-x
  • Parameshachari, B. D., & Soyjaudah, K. M. S., A new approach to partial image encryption, Proceedings of International Conference on Advances in Computing (ICAdC), MSRIT, Bangalore, AISC 174 (2012) 1005–1010.
  • Pardhu, T. (2015). Medical image retrieval using discrete wavelet transform. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), 10(3), 26–30. doi:10.9790/2834-10332630
  • Rao, Y. V. S., Mitra, A., & Prasanna, S. R. M. (2006). A partial image encryption method with pseudo random sequences. International Conference on Information Systems Security (ICISS) 4332, 315–325. doi:10.1007/11961635_22
  • Sag, T., & Cunkas, M. (2015). Color image segmentation based on multiobjective artificial bee colony optimization. Applied Soft Computing, 34, 389–401. https://doi.org/10.1016/j.asoc.2015.05.016
  • Sajasi, S., & Moghadam, A. E. (2015). An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method. Applied Soft Computing, 30, 375–389. https://doi.org/10.1016/j.asoc.2015.01.032
  • Somaraj, S., & Hussain, M. A. (2015). Performance and security analysis for image encryption using key image. Indian Journal of Science and Technology, 8(35), 1–4. https://doi.org/10.17485/ijst/2015/v8i35/73141
  • Somna, S., & Senb, S. (2013). A non-adaptive partial encryption of grayscale images based on Chaos. Procedia Technology, 10, 663–671. https://doi.org/10.1016/j.protcy.2013.12.408
  • Sreelajaa, N. K., & Vijayalakshmi Paib, G. A. (2012). Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Applied Soft Computing, 12(9), 2879–2895. https://doi.org/10.1016/j.asoc.2012.04.002
  • Stallings, W. (2011). Cryptography and network security principles and practice (Fifth ed.). Pearson.
  • Subudhi, P., & Mukhopadhyay, S. (2019). An efficient graph reduction framework for interactive texture segmentation, signal processing. Image Communication, 74, 42–53. doi:10.1016/j.image.2019.01.010
  • Sunil, J., Suhas, H. S., Sumanth, B. K., & Santhameena, S., Implementation of AES algorithm on FPGA and on software, International conference for innovation in technology (INOCON), Bangluru, India, IEEE, (2020).
  • Wang, J. (2009). Computer network security theory and practice. Springer Berlin Heidelberg.
  • Wu, X., Wang, D., Kurths, J., & Kan, H. (2016). A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Information Sciences, 349 (C), 137–153. https://doi.org/10.1016/j.ins.2016.02.041
  • Xie, H., Zhang, L., Lim, C. P., Yu, Y., Liu, C., Liu, H., & Walters, J. (2019). Improving K-means clustering with enhanced firefly algorithms. Applied Soft Computing J, 84, 105763. https://doi.org/10.1016/j.asoc.2019.105763
  • Ying-Qian, Z., & Xing-Yuan, W. (2015). A new image encryption algorithm based on non-adjacent coupled map lattices. Applied Soft Computing, 26, 10–20. https://doi.org/10.1016/j.asoc.2014.09.039
  • Yuen, C., & Wong, K. (2011). A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Applied Soft Computing, 11(8), 5092–5098. https://doi.org/10.1016/j.asoc.2011.05.050
  • Zhu, C., & Sun, K. (2018). Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access, 6, 18759–18770. https://doi.org/10.1109/ACCESS.2018.2817600