Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map
Confidentiality, integrity, authenticity, non-repudiation and storing and transmitting images over the unsecured channel has become a challenging task nowadays. In this scenario, a robust image encryption technique over open network has grasped a great deal of attention. In this paper to meet this c...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2021-07, Vol.80 (18), p.27829-27853 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 27853 |
---|---|
container_issue | 18 |
container_start_page | 27829 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Sabir, Shazia Guleria, Vandana |
description | Confidentiality, integrity, authenticity, non-repudiation and storing and transmitting images over the unsecured channel has become a challenging task nowadays. In this scenario, a robust image encryption technique over open network has grasped a great deal of attention. In this paper to meet this challenge, we have established a new multi-layer robust color image encryption using random matrix affine cipher (RMAC), reality preserving two dimensional discrete fractional Hartley transform (RP2DFrHT) and two dimensional Arnold map. The first stage of encryption is designed through RMAC. RMAC provides security in co-ordinate domain as well as in geometrical domain. So if a hacker has knowledge about all the pixels of an image, but has no information about the mechanism of co-ordinate domain he/she cannot steal any information. The second stage of encryption is obtained incorporating the concept of RP2DFrHT. The reality preserving transform eliminates the complex-valued coefficients and provides the real-valued coefficients of encrypted image. The real-valuedness of data provides convenient platform for display, storage and transmission in digital domain. The third stage of encryption is done using 2D Arnold map, which not only enhances the security but also enlarges key space. Therefore, the proposed technique provides security in geometrical, co-ordinate, frequency and time domains simultaneously. The security of our proposed technique depends upon the secret keys as well as their correct arrangements. Simulation analysis provides the complete visual results of all stages of encrypted and decrypted images. Sensitivity analysis validates that our proposed technique is highly sensitive towards its secret keys and their arrangements. Statistical analysis such as histogram analysis, MSE, PSNR, correlation coefficient, entropy analysis and resistivity of classical attacks validates the effectiveness and feasibility of our proposed work. Moreover, comparison analysis testifies that our proposed technique functions significantly well as compared to existing similar techniques. |
doi_str_mv | 10.1007/s11042-021-11003-x |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2554652018</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2554652018</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-6e84521002d1ac199e7a81ece64ca88a1baca7e2006f7f405ff64881891df1c13</originalsourceid><addsrcrecordid>eNp9kE9PAyEQxYnRxFr9Ap5IvIoy7B_YY9Naa1KjMfWMyELdZgsr7CbttxetiTdPM4ffezPvIXQJ9AYo5bcRgOaMUAYkbTQjuyM0goJnhHMGx2nPBCW8oHCKzmLcUAplwfIRensc2r4hrdqbgLVvfcDNVq0NNk6Hfdc33uEhNm6Ng3K13-Kt6kOzw8raxhmsm-7DhGv88sxm87BY4QRhNsOT4HxbJ7g7RydWtdFc_M4xep3fraYLsny6f5hOlkRnUPWkNCIvWHqd1aA0VJXhSoDRpsy1EkLBu9KKG0ZpabnNaWFtmQsBooLagoZsjK4Ovl3wn4OJvdz4Ibh0UrKiyFNaCiJR7EDp4GMMxsoupLxhL4HK7ybloUmZmpQ_TcpdEmUHUUywW5vwZ_2P6gtqCHXR</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2554652018</pqid></control><display><type>article</type><title>Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map</title><source>SpringerLink Journals - AutoHoldings</source><creator>Sabir, Shazia ; Guleria, Vandana</creator><creatorcontrib>Sabir, Shazia ; Guleria, Vandana</creatorcontrib><description>Confidentiality, integrity, authenticity, non-repudiation and storing and transmitting images over the unsecured channel has become a challenging task nowadays. In this scenario, a robust image encryption technique over open network has grasped a great deal of attention. In this paper to meet this challenge, we have established a new multi-layer robust color image encryption using random matrix affine cipher (RMAC), reality preserving two dimensional discrete fractional Hartley transform (RP2DFrHT) and two dimensional Arnold map. The first stage of encryption is designed through RMAC. RMAC provides security in co-ordinate domain as well as in geometrical domain. So if a hacker has knowledge about all the pixels of an image, but has no information about the mechanism of co-ordinate domain he/she cannot steal any information. The second stage of encryption is obtained incorporating the concept of RP2DFrHT. The reality preserving transform eliminates the complex-valued coefficients and provides the real-valued coefficients of encrypted image. The real-valuedness of data provides convenient platform for display, storage and transmission in digital domain. The third stage of encryption is done using 2D Arnold map, which not only enhances the security but also enlarges key space. Therefore, the proposed technique provides security in geometrical, co-ordinate, frequency and time domains simultaneously. The security of our proposed technique depends upon the secret keys as well as their correct arrangements. Simulation analysis provides the complete visual results of all stages of encrypted and decrypted images. Sensitivity analysis validates that our proposed technique is highly sensitive towards its secret keys and their arrangements. Statistical analysis such as histogram analysis, MSE, PSNR, correlation coefficient, entropy analysis and resistivity of classical attacks validates the effectiveness and feasibility of our proposed work. Moreover, comparison analysis testifies that our proposed technique functions significantly well as compared to existing similar techniques.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-11003-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Art exhibits ; Color imagery ; Communication ; Computer Communication Networks ; Computer Science ; Correlation coefficients ; Cryptography ; Data Structures and Information Theory ; Domains ; Encryption ; Histograms ; Image transmission ; Internet ; Multilayers ; Multimedia ; Multimedia Information Systems ; Robustness ; Security ; Sensitivity analysis ; Special Purpose and Application-Based Systems ; Statistical analysis ; Storage ; Wavelet transforms</subject><ispartof>Multimedia tools and applications, 2021-07, Vol.80 (18), p.27829-27853</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-6e84521002d1ac199e7a81ece64ca88a1baca7e2006f7f405ff64881891df1c13</citedby><cites>FETCH-LOGICAL-c319t-6e84521002d1ac199e7a81ece64ca88a1baca7e2006f7f405ff64881891df1c13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-021-11003-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-021-11003-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Sabir, Shazia</creatorcontrib><creatorcontrib>Guleria, Vandana</creatorcontrib><title>Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Confidentiality, integrity, authenticity, non-repudiation and storing and transmitting images over the unsecured channel has become a challenging task nowadays. In this scenario, a robust image encryption technique over open network has grasped a great deal of attention. In this paper to meet this challenge, we have established a new multi-layer robust color image encryption using random matrix affine cipher (RMAC), reality preserving two dimensional discrete fractional Hartley transform (RP2DFrHT) and two dimensional Arnold map. The first stage of encryption is designed through RMAC. RMAC provides security in co-ordinate domain as well as in geometrical domain. So if a hacker has knowledge about all the pixels of an image, but has no information about the mechanism of co-ordinate domain he/she cannot steal any information. The second stage of encryption is obtained incorporating the concept of RP2DFrHT. The reality preserving transform eliminates the complex-valued coefficients and provides the real-valued coefficients of encrypted image. The real-valuedness of data provides convenient platform for display, storage and transmission in digital domain. The third stage of encryption is done using 2D Arnold map, which not only enhances the security but also enlarges key space. Therefore, the proposed technique provides security in geometrical, co-ordinate, frequency and time domains simultaneously. The security of our proposed technique depends upon the secret keys as well as their correct arrangements. Simulation analysis provides the complete visual results of all stages of encrypted and decrypted images. Sensitivity analysis validates that our proposed technique is highly sensitive towards its secret keys and their arrangements. Statistical analysis such as histogram analysis, MSE, PSNR, correlation coefficient, entropy analysis and resistivity of classical attacks validates the effectiveness and feasibility of our proposed work. Moreover, comparison analysis testifies that our proposed technique functions significantly well as compared to existing similar techniques.</description><subject>Algorithms</subject><subject>Art exhibits</subject><subject>Color imagery</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Correlation coefficients</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Domains</subject><subject>Encryption</subject><subject>Histograms</subject><subject>Image transmission</subject><subject>Internet</subject><subject>Multilayers</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Robustness</subject><subject>Security</subject><subject>Sensitivity analysis</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Statistical analysis</subject><subject>Storage</subject><subject>Wavelet transforms</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE9PAyEQxYnRxFr9Ap5IvIoy7B_YY9Naa1KjMfWMyELdZgsr7CbttxetiTdPM4ffezPvIXQJ9AYo5bcRgOaMUAYkbTQjuyM0goJnhHMGx2nPBCW8oHCKzmLcUAplwfIRensc2r4hrdqbgLVvfcDNVq0NNk6Hfdc33uEhNm6Ng3K13-Kt6kOzw8raxhmsm-7DhGv88sxm87BY4QRhNsOT4HxbJ7g7RydWtdFc_M4xep3fraYLsny6f5hOlkRnUPWkNCIvWHqd1aA0VJXhSoDRpsy1EkLBu9KKG0ZpabnNaWFtmQsBooLagoZsjK4Ovl3wn4OJvdz4Ibh0UrKiyFNaCiJR7EDp4GMMxsoupLxhL4HK7ybloUmZmpQ_TcpdEmUHUUywW5vwZ_2P6gtqCHXR</recordid><startdate>20210701</startdate><enddate>20210701</enddate><creator>Sabir, Shazia</creator><creator>Guleria, Vandana</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20210701</creationdate><title>Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map</title><author>Sabir, Shazia ; Guleria, Vandana</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-6e84521002d1ac199e7a81ece64ca88a1baca7e2006f7f405ff64881891df1c13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Art exhibits</topic><topic>Color imagery</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Correlation coefficients</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Domains</topic><topic>Encryption</topic><topic>Histograms</topic><topic>Image transmission</topic><topic>Internet</topic><topic>Multilayers</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Robustness</topic><topic>Security</topic><topic>Sensitivity analysis</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Statistical analysis</topic><topic>Storage</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sabir, Shazia</creatorcontrib><creatorcontrib>Guleria, Vandana</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sabir, Shazia</au><au>Guleria, Vandana</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-07-01</date><risdate>2021</risdate><volume>80</volume><issue>18</issue><spage>27829</spage><epage>27853</epage><pages>27829-27853</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Confidentiality, integrity, authenticity, non-repudiation and storing and transmitting images over the unsecured channel has become a challenging task nowadays. In this scenario, a robust image encryption technique over open network has grasped a great deal of attention. In this paper to meet this challenge, we have established a new multi-layer robust color image encryption using random matrix affine cipher (RMAC), reality preserving two dimensional discrete fractional Hartley transform (RP2DFrHT) and two dimensional Arnold map. The first stage of encryption is designed through RMAC. RMAC provides security in co-ordinate domain as well as in geometrical domain. So if a hacker has knowledge about all the pixels of an image, but has no information about the mechanism of co-ordinate domain he/she cannot steal any information. The second stage of encryption is obtained incorporating the concept of RP2DFrHT. The reality preserving transform eliminates the complex-valued coefficients and provides the real-valued coefficients of encrypted image. The real-valuedness of data provides convenient platform for display, storage and transmission in digital domain. The third stage of encryption is done using 2D Arnold map, which not only enhances the security but also enlarges key space. Therefore, the proposed technique provides security in geometrical, co-ordinate, frequency and time domains simultaneously. The security of our proposed technique depends upon the secret keys as well as their correct arrangements. Simulation analysis provides the complete visual results of all stages of encrypted and decrypted images. Sensitivity analysis validates that our proposed technique is highly sensitive towards its secret keys and their arrangements. Statistical analysis such as histogram analysis, MSE, PSNR, correlation coefficient, entropy analysis and resistivity of classical attacks validates the effectiveness and feasibility of our proposed work. Moreover, comparison analysis testifies that our proposed technique functions significantly well as compared to existing similar techniques.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-11003-x</doi><tpages>25</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-07, Vol.80 (18), p.27829-27853 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2554652018 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Art exhibits Color imagery Communication Computer Communication Networks Computer Science Correlation coefficients Cryptography Data Structures and Information Theory Domains Encryption Histograms Image transmission Internet Multilayers Multimedia Multimedia Information Systems Robustness Security Sensitivity analysis Special Purpose and Application-Based Systems Statistical analysis Storage Wavelet transforms |
title | Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T01%3A43%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Multi-layer%20color%20image%20encryption%20using%20random%20matrix%20affine%20cipher,%20RP2DFrHT%20and%202D%20Arnold%20map&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Sabir,%20Shazia&rft.date=2021-07-01&rft.volume=80&rft.issue=18&rft.spage=27829&rft.epage=27853&rft.pages=27829-27853&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-11003-x&rft_dat=%3Cproquest_cross%3E2554652018%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2554652018&rft_id=info:pmid/&rfr_iscdi=true |