An Image Compression - Encryption Hybrid Algorithm Using DWT and Chaos System
An Image Compression - Encryption Hybrid Algorithm Using DWT and Chaos System
Abstract Recent developments of digital image production and applications have increases importance of digital image compression and
security in todays world. The proposed method is developed to combine both compression and security of image. Compression is achieved by
the deletion of redundant data. Discrete Wavelet Transform (DWT) is a in recent times developed compression technique in image compression.
The existing methods to encrypt images usually treat the whole matrix as the key which makes the key too large to distribute and memorize or
store. To solve this problem, in this proposed method key matrix is constructed using the logistic diagram and the Arnold transform is used for
image position scrambling. Initially the original image is decomposed into bands and compressed by level dependent hard threshold technique
and then combined with above encryption algorithms to get compressed-encrypted image. This algorithm produces a cipher for the test image
that has good diffusion and confusion properties. Simulation results of the histogram analysis, key sensitivity analysis of adjacent pixels, PSNR,
are representing the scrambling effect, security of the proposed algorithm and considerable compression performance.
638
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 4 638 - 643
_______________________________________________________________________________________________
Fig.2. showing how the linear diagram stretches the unit
square and how its pieces are rearranged when the modulo
action is performed. The lines with the arrows show the
direction of the toning and increasing eigen spaces.
II. THE PROPOSED IMAGE COMPRESSIONENCRYPTION
ALGORITHM
(3)
639
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 4 638 - 643
_______________________________________________________________________________________________
A. INPUT IMAGE B. DWT
A discrete wavelet transform is used to decompose
the image.
C.
640
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 4 638 - 643
_______________________________________________________________________________________________
IV. EXPERIMENTAL ANALYSIS AND RESULTS
D. KEY MATRIX GENERATION
Chaos system is used to create key matrix for encryption.
Fig.6. (a) Encrypted Image using X01 = 0.11 and X02 = 0.23; (b) encrypted
Image using X01 + = 0.11 + 1 1016 and X02 = 0.23; and (c) difference
between two encrypted images (a) and (b).
Table 1
Correlation coefficients of adjacent pixels.
[1] Correlation
[2] Horizontal [3] Vertical [4] Diagonal
coefficient
Fig.4.3. MEASUREMENT MATRIX
[5] Input image [6] 0.9590 [7] 0.9217 [8] 0.9071
E. ARNOLD TRANSFORM [9] Existing [10] 0.0846 [11] 0.0583 [12] 0.0931
The pixels of the blocks are scrambled by Arnold method
transform. [13] Proposed [14] 0.0624 [15] 0.0108 [16] 0.0608
method
[17] Input image [18] 0.9585 [19] 0.9529 [20] 0.9064
[21] Existing [22] 0.0639 [23] 0.0539 [24] 0.0848
method
[25] Proposed [26] 0.0323 [27] 0.0274 [28] 0.0527
method
F. OUTPUT IMAGE
641
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 4 638 - 643
_______________________________________________________________________________________________
A. Histogram uniform in distribution or the second best when the histograms
of different encrypted images are similar to each other. Fig.
The image histogram is often used to analyze the performance 5(a1), (b1) and (c1) are the histograms of Lena, Cameraman
of the image encryption algorithm. It is the best when the and Peppers, respectively. And Fig. 5(a2), (b2) and (c2) are
values in the histogram of the encrypted image are fairly the histograms of their encrypted images, correspondingly.
Fig.5. Histogram: (a1) Lena; (a2) encrypted Lena; (b1) Cameraman; (b2) encrypted Cameraman; (c1) Peppers; and (c2) encrypted Peppers.
The key space for X01 is equal to (1/ ), where is the value
The histograms of the two original images are obviously
different from each other, while their encrypted images have of for MAE = 0. The simulation results show that comes
similar histograms. After a large number of parallel
out to be 1 10 , i.e., the key space of X01 is 1 1017.
17
experiments, shows that the histograms of the cipher texts of
Similarly, the key space of X02 is 1 1017. Thus, the total key
different original images are similar to Fig. 5(a2), (b2) and
space is as large as 1085. If one wants to construct the correct
(c2). That is to say, the proposed algorithm can frustrate the
measurement matrix by exhausting the keys, she must
statistical analysis attack.
calculate 1085 times which would take much time. Thus the
B. Key space proposed algorithm is secure against brute-force attack.
An image encryption algorithm should be secure even though
everything is known except for the key. Thus a good C. Correlation of two adjacent pixels
encryption algorithm should have a large enough key space. In The correlation of two adjacent pixels in a meaningful image
the proposed algorithm, X01 and X02 are used as keys. Here, ~ is usually close to 1, while that of the encrypted image should
the key space is calculated for X01 as generate two different be close to 0. To measure the correlations between two
sequences and by using X01 and X01 + as initial values adjacent pixels in the horizontal, vertical and diagonal
and both sequences are of length N, and dene mean absolute directions, 16,000 adjacent pixel pairs are selected randomly
error between the two sequences as [14] from original image and encrypted image, correspondingly.
(5) original image and the disordered distribution reflects the
642
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 4 638 - 643
_______________________________________________________________________________________________
weak correlation between two adjacent pixels in the encrypted [4] Swastik Das and Rashmi Ranjan Sethy, A Thesis on
image. And the distributions of vertical and diagonal Image Compression using Discrete Cosine Transform and
directions share the similar modality. The correlation Discrete Wavelet Transform, Guided By: Prof. R.
coefficient is Baliarsingh, dept of Computer Science & Engineering,
National Institute of Rourkela.
[5] Pavan Kumar Goswami, Namita Tiwari, Meenu Chawla,
(6) Block Based Image Encryption Using Iterative Arnold
Transformation, International Journal of Advanced
Where and . Research in Computer Science and Software Engineering
The quantitative evaluation on correlation is compiled in Table 3(8), August - 2013, pp. 273-278
1. That shows that the proposed algorithm removes the tight [6] Karen Lees Image compression using Wavelets, Report
relationship between adjacent pixels of the original image of M.S. 2002.
successfully. The results demonstrate that the attackers cannot [7] B. Bhargava, C. Shi, and S. Y.Wang, MPEG video
obtain useful information by statistical analysis and the encryption algorithms, Multimedia Tools and
proposed algorithm can resist statistical analysis. Applications, vol. 24, no. 1, pp. 5779, 2004.
analysis the mean square error (MSE) [13] between decrypted [8] A. Cohen and J. Kovacevic, Wavelets: the mathematical
image and original image is calculated as background, Proceedings of the IEEE, vol. 84, no. 4, pp.
514522, 1996.
(7)
[9] Wangsheng Fang1, Lulu Wu1,Rong Zhang1, A
where M N represents the total number of image pixels, I(x, Watermark Preprocessing Algorithm Based on Arnold
y) and D(x, y) denote the values of input image and output Transformation and Logistic Chaotic Map, Advanced
image at the pixel (x , y), respectively. The sensitivity can also Materials Research Vols. 341-342 (2012) pp 720-724
be tested by comparing two encrypted images obtained by [10] Pavan Kumar Goswami, Namita Tiwari, Meenu Chawla,
using neighbor keys. Fig. 7(a) and (b) shows the encrypted its Block Based Image Encryption Using Iterative Arnold
Transformation, International Journal of Advanced
neighbor keys X01 = 0.21 + 1 1016, X02 = 0.35, respectively.
Research in Computer Science and Software Engineering
And the difference between these two encrypted images is 3(8), August - 2013, pp. 273-278
shown in Fig. 7(c). The tiny change in the keys results in great
[11] Lu P, Xu ZY, Lu X, Liu XY. Digital image information
changes in the encrypted image. From the above two cases, the encryption based on compressive sensing and double
proposed algorithm is sensitive enough to the keys. random-phase encoding technique. Optik-Int J Light
Electron Opt 2013;124:25148.
V. CONCLUSION
[12] Takanori N, Bahram J. Optical encryption system with a
In this paper a hybrid algorithm for compression-encryption binary key code. Appl Opt 2000;39:47837.
has been proposed which based on key matrix and chaos [13] Chu Hui Lee and Zheng Wei Zhou, Comparison of Image
system with Arnold transform. The image is decomposed into Fusion based on DCT-STD and DWT-STD, IMECS Vol I,
4 bands to compress and encrypt. Then the compressed image March 14-15, 2012, Kong Kong.
is encrypted by chaos system with Arnold transform. By using [14] Hennelly BM, Sheridan JT. Image encryption and the
the chaos system the original key circulant matrix is fractional Fourier trans-form. Proc SPIE Int Soc Opt Eng
constructed and controlled, the proposed method is secure. By 2003;5202:7687
using Arnold transform the compressed and encrypted image
is scrambled, the security is enhanced further. The encrypted
image is analysised from histogram, key sensitivity, PSNR and
correlation of adjacent pixels, which shows that the proposed
method resists to different attacks. Since this algorithm uses
the number of Arnold transformation and the initial value of
Logistic chaos system as the key, the key space is big, and has
a strong sensitivity. From the simulation results the proposed
algorithm is secure and can provide good compression.
VI. REFERENCES
[1] Nanrun Zhou, Aidi Zhang, Fen Zheng, Lihua Gong Novel
image compressionencryption hybrid algorithm based on
key-controlled measurement matrix in compressive
sensing, Optics & Laser Technology 62 (2014)152160 .
[2] Rafael C. Gonzalez, Richard E. Woods. (1992), Digital
Image Processing(2nd edition), NJ:Prentice Hall
[3] Locker Gnome (2011), Real World Application Of Image
Compression,
http://www.lockergnome.com/nexus/windows/2006/12/25/r
eal-world-applications-of- image compression/ [accesed 11
Dec 2011].
643
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________