CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Crypto-Compression Image Scheme using DWT and AES-Arnold Transforms

by Asaad Abdul-Kareem Al-hijaj, Muslim Mohsin Khudhair, Luay Abdulwahid Shihab
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 3
Year of Publication: 2017
Authors: Asaad Abdul-Kareem Al-hijaj, Muslim Mohsin Khudhair, Luay Abdulwahid Shihab
10.5120/ijca2017913384

Asaad Abdul-Kareem Al-hijaj, Muslim Mohsin Khudhair, Luay Abdulwahid Shihab . Crypto-Compression Image Scheme using DWT and AES-Arnold Transforms. International Journal of Computer Applications. 162, 3 ( Mar 2017), 45-49. DOI=10.5120/ijca2017913384

@article{ 10.5120/ijca2017913384,
author = { Asaad Abdul-Kareem Al-hijaj, Muslim Mohsin Khudhair, Luay Abdulwahid Shihab },
title = { Crypto-Compression Image Scheme using DWT and AES-Arnold Transforms },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 3 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number3/27227-2017913384/ },
doi = { 10.5120/ijca2017913384 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:52.897949+05:30
%A Asaad Abdul-Kareem Al-hijaj
%A Muslim Mohsin Khudhair
%A Luay Abdulwahid Shihab
%T Crypto-Compression Image Scheme using DWT and AES-Arnold Transforms
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 3
%P 45-49
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the fast evolution of digital data exchange, security of information becomes massively important in data storage and transmission. Due to the increasing use of images in an different process, it is essential to protect the confidential image data from unauthorized access. If encryption is not well performed then there may be possibility of stealing the information. Image compression is also essential where images need to be stored, transmitted or viewed quickly and efficiently. The current paper proposes an efficient technique to compress image by using Daubechies wavelet transforms. Moreover, it uses two algorithms which are advanced encryption standard (AES) and Arnold transform method for encryption the image. Experimental results show efficient technique that is simple in implementation and has high degree of security.

References
  1. Xinpeng Z. 2001. Lossy Compression and Iterative Reconstruction for Encrypted Image. IEEE Transactions On Information Forensics And Security. Vol. 6, No. 1, 53–58.
  2. Miao Z. and Xiaojun T. 2015. A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system. Multimedia Tools and Applications. Vol. 74, No. 24, 11255-11279.
  3. Andrew K. and Floren A. 2008. Lossless image compression via predictive coding of discrete Radon projections. Signal Processing: Image Communication. Vol. 23, No. 4, 313–324.
  4. Woods, R. C. 2008. Digital Image processing, 3rd (Ed.), Pearson Prentice Hall.
  5. Ping S. T. and Ricardo S. 2008. Graphics Image Compression Using JPEG2000. IEEE computer society Congress on Image and Signal Processing.
  6. Charilaos C., Athanassios S., and Touradj E. 2000. The JPEG 2000 still image coding system: an overview. IEEE Transactions on Consumer Electronics. Vol. 46, No. 4, 1103-1127.
  7. Diego, S. C. and Touradj E. 2000. An Analytical Study of JPEG2000 Functionalities. In Proc. of the IEEE International Conference on Image Processing. Vol. 2,49-52.
  8. Sayood, K. 2000. Introduction to data compression, 2nd (Ed.), Morgan Kaufman Publishers, Academic Press.
  9. Sana K., Kaıs O., and Noureddine E. 2009. A novel compression algorithm for electrocardiogram signals based on wavelet transform and SPIHT. International Scholarly and Scientific Research & Innovation. Vol. 3, NO. 11, 342-347.
  10. Marc A., Michel B., Pierre M., and Ingrid D. 1992. Image Coding Using Wavelet Transform. IEEE Transactions on Image Processing, Vol. 1 , No. 2, 205–220.
  11. Acharya T., and Tsai P. S. 2005. JPEG2000 standard for image compression: Concepts, algorithms and VLSI architectures. New York: Wiley.
  12. Thomas W. C. and Pantelimon S. 2009. Cryptographic Boolean Functions and Applications. San Diego, CA 92101-4495, USA.
  13. Kuo H. C., Yi C. C., Chung C. H., Chi W. H., and Chi J. C. 2009. Embedded a Low Area 32-bit AES for Image Encryption/Decryption Application. IEEE Xplore Digital Library. 1922-1925.
  14. Xinmiao Z. and Keshab K. P. 2004. High-Speed VLSI Architectures for the AES Algorithm. IEEE TRANSACTIONS on Very large Scale integration (VLSI) Systems. Vol. 12, No. 9, 957-967.
  15. Muslim M. K. 2016. An Efficient Image Encryption Technique by Using Cascaded Combined Permutation. International Journal of Computer Science and Information Security (IJCSIS). Vol.14, No. 6, 576-588.
  16. Shujun L., Chengqing L., Guanrong C., Nikolaos G. B., and Kwok T. L.o. 2008. A General Quantitative Cryptanalysis of Permutation-only Multimedia Ciphers Against Plaintext Attacks. Signal Processing: Image Communication. Vol. 23, NO. 3, 212–223.
  17. Guanrong C., Yaobi M., and Charles K. C. 2004. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitons and Fractals, Vol. 21, Issue 3, 749–761.
  18. K. S. Thyagarajan. 2011. Still Image and Video Compression with Matlab. John Wiley & Sons, Inc., Hoboken, New Jersey.
  19. Aatthew C. S., and K. J. Ray . 2010. Wavelet-Based Image Compression Anti-Forensics. In Proceedings of IEEE 17th international conference on image processing, Hong Kong, 1737–1740.
  20. Jaspreet S. and Prabhjot K. 2015. Image Encryption and Compression System Using Haar, Daubechies and Coiflet Wavelets. International Journal of Computer Science Engineering and Information Technology Research. Vol. 5, No. 5, 17-26.
  21. Yu K. C., Fan C. C., and Pohsiang T. 2001. A gray-level clustering reduction algorithm with the least PSNR. Expert Systems with Applications. Vol. 38, No.8, 10183–10187.
  22. Alexander T. 2014. Visual-PSNR measure of image quality Journal of Visual Communication and Image Representation. Vol. 25 No.5, 874–878.
  23. Medien Z., Mohsen M., Lazhar K., Adel  B., and Rached Ti. 2007. A Modified AES Based Algorithm for Image Encryption. International Scholarly and Scientific Research & Innovation. Vol. 1, No. 3, 745-750.
  24. Guoji Z. and Qing L. 2011. A novel image encryption method based on total shuffling scheme. Optics Communications. Vol. 284 , No.12, 2775-2780.
Index Terms

Computer Science
Information Sciences

Keywords

encryption compression Daubechies AES Arnold transform.