CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Dual Tree Complex Wavelet Transform for Image Security using Arnold Method

by Arjun Verma, Abhinav Jain, Beerendra Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 1
Year of Publication: 2015
Authors: Arjun Verma, Abhinav Jain, Beerendra Kumar
10.5120/20709-3024

Arjun Verma, Abhinav Jain, Beerendra Kumar . Dual Tree Complex Wavelet Transform for Image Security using Arnold Method. International Journal of Computer Applications. 118, 1 ( May 2015), 16-19. DOI=10.5120/20709-3024

@article{ 10.5120/20709-3024,
author = { Arjun Verma, Abhinav Jain, Beerendra Kumar },
title = { Dual Tree Complex Wavelet Transform for Image Security using Arnold Method },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 1 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number1/20709-3024/ },
doi = { 10.5120/20709-3024 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:29.815020+05:30
%A Arjun Verma
%A Abhinav Jain
%A Beerendra Kumar
%T Dual Tree Complex Wavelet Transform for Image Security using Arnold Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 1
%P 16-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing globalization led to the transmission of vast amount of digital documents like texts, images, videos or audios over the internet from one point to another. However, some of these documents might be highly confidential and its transmission over the internet must be protected from unauthorized access. In this paper, we have proposed a novel hybrid Arnold transform scheme based on dual tree complex wavelet transform with block shuffling internally as well as externally. In this scheme, we have provided double layer of security by utilizing the multi-resolution property of wavelet using Arnold transform andblock shuffling. In contrast to the discrete wavelet transform (DWT), the design of Dual Tree Complex Wavelet Transform poses good directional properties for diagonal features and is rugged to shift Invariance. Our scheme provides high security as even after the extraction of first layer, without knowing the extraction algorithm, original image cannot be recovered in its entirety. The proposed scheme is tested on various test images and the obtained results show the effectiveness of the proposed scheme.

References
  1. C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images", IEEE Transactions, Image Processing, Vol. 10, pp. 767-782, May 2001.
  2. C. Li and G. Chen, "On the security of a class of image encryption schemes," Proceedings of the IEEE International Symposium on Circuits and Systems, 2008.
  3. S. Li, C. Li, G. Chen, and X. Mou, "Cryptanalysis of the RCES/RSES image encryption scheme," available online at http://eprint. iacr. org/2004/376 on 15 Oct. 2008.
  4. Jui-Cheng Yen, Jiun-In Guo, "A new chaotic image encryption algorithm" Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
  5. M. A. BaniYounes and AmanJantan, "Image Encryption Using Block-Based Transformation Algorithm"IAENG, 35:1, IJCS_35_1_03, February 2008.
  6. IsmetOzturk and AbrahimSogukpinar, "Analysis and Comparison of Image Encryption Algorithms", World Academy of Science, Engineering and Technology 3 2005.
  7. K. C. Ravishankar, M. G. Venkateshmurthy "Region Based Selective Image Encryption" 1-424-0220-4/06 ©2006 IEEE.
  8. W. Stallings,Cryptography and network security:Principles and Practice. Prentice hall,2010,vol. 998.
  9. I. J. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling", Proceedings of Electronic Imaging'97, February 1997.
  10. J. Fridrich, 2 Lt Arnold C. Baldoza, and Richard J. Simard "Robust digital watermarking based on key-dependent basis functions" 2nd Information Hiding Workshop, Portland OR, April 15–17, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Arnold transforms block shuffling Dual-tree complex wavelet transform.