© 2014, IJARCSMS All Rights Reserved 82 | P age ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image Encryption using Hybrid Transform Domain Scrambling of Coefficients Dr. H. B. Kekre 1 Senior Professor Computer Engineering Department MPSTME, NMIMS University Mumbai India Dr. Tanuja Sarode 2 Associate Professor Computer Engineering Department TSEC, Mumbai University Mumbai India Pallavi N. Halarnkar 3 PhD Research Scholar Computer Engineering Department MPSTME, NMIMS University Mumbai India Debkanya Mazumder 4 Student Computer Engineering Department MPSTME, NMIMS University Mumbai India Abstract: Security of Data is very important, when it comes to Digital images the bulkiness of the data makes the standard data security methods unsuitable, so novel techniques have to be proposed to secure the image data. Image scrambling is one of the methods, however it does not change the pixel value rather it just changes its position making it prone to attacks. In this paper we have made use of Image scrambling technique in our framework, which results in encrypting the digital images to make them more secure. Earlier to this Non-sinusoidal transforms were used; here we have explored all the combinations of Hybrid Transforms using Kekre Transform as the base transform with other non sinusoidal transforms. The experimental results obtained are good when compared to individual non-sinusoidal transforms. Keywords: Image Scrambling, Image Encryption, Key Based Scrambling, Hybrid Transforms. I. INTRODUCTION Image scrambling only shuffles the pixel values of a Digital image using some reversible transformation, which may be easy to descramble it from attacker’s point of view. Rather Image Encryption could be a better alternative to protect digital images. Muhammad introduced an Asymmetric Image encryption scheme in gyrator transform domain using Schur decomposition [1]. Firstly the R G and B planes of the color image are separated, then using different random phase masks are multiplied to R G and B planes for modulating them. Convolution is applied to combine the R G and B plane to convert it into grayscale. This grayscale image is gyrator transformed. The gyrator spectrum is then amplitude and phase truncated. The asymmetric keys are generated for R G and B plane. The Phase truncated image is divided into U and T parts by applying Schur Decomposition. These U and T parts are gyrator transformed to obtain the encoded images. Numerical simulation shows the validity and security of the proposed approach. Ch. Samson et al. proposed an Image Compression based Encryption technique [2]. In this method a Wavelet Transform is applied to the RGB image to achieve compression. In order to achieve a further compression lossless predictive coding is applied. This compressed image is encrypted using Secure Advanced Hill Cipher in addition to a pair of Involutory matrices, a function called as mix and XOR operation. Decryption process results in the proper recovery of the original image. The proposed method can be used for a secure and a reliable transmission of data. Narendra Singh et al. proposed a new chaos based image encryption scheme based on canonical transforms [3]. The technique makes use of three different canonical transforms, fractional Fourier transform, the extended fractional Fourier transform and Fresnel transform. The three chaotic maps used to generate random phase masks are the tent map, Kaplan Yorke