© 2014, IJARCSMS All Rights Reserved 82 | P age
ISSN: 2321-7782 (Online)
Volume 2, Issue 6, June 2014
International Journal of Advance Research in
Computer Science and Management Studies
Research Article / Survey Paper / Case Study
Available online at: www.ijarcsms.com
Image Encryption using Hybrid Transform Domain Scrambling
of Coefficients
Dr. H. B. Kekre
1
Senior Professor
Computer Engineering Department
MPSTME, NMIMS University
Mumbai – India
Dr. Tanuja Sarode
2
Associate Professor
Computer Engineering Department
TSEC, Mumbai University
Mumbai – India
Pallavi N. Halarnkar
3
PhD Research Scholar
Computer Engineering Department
MPSTME, NMIMS University
Mumbai – India
Debkanya Mazumder
4
Student
Computer Engineering Department
MPSTME, NMIMS University
Mumbai – India
Abstract: Security of Data is very important, when it comes to Digital images the bulkiness of the data makes the standard
data security methods unsuitable, so novel techniques have to be proposed to secure the image data. Image scrambling is one
of the methods, however it does not change the pixel value rather it just changes its position making it prone to attacks. In
this paper we have made use of Image scrambling technique in our framework, which results in encrypting the digital
images to make them more secure. Earlier to this Non-sinusoidal transforms were used; here we have explored all the
combinations of Hybrid Transforms using Kekre Transform as the base transform with other non sinusoidal transforms.
The experimental results obtained are good when compared to individual non-sinusoidal transforms.
Keywords: Image Scrambling, Image Encryption, Key Based Scrambling, Hybrid Transforms.
I. INTRODUCTION
Image scrambling only shuffles the pixel values of a Digital image using some reversible transformation, which may be
easy to descramble it from attacker’s point of view. Rather Image Encryption could be a better alternative to protect digital
images. Muhammad introduced an Asymmetric Image encryption scheme in gyrator transform domain using Schur
decomposition [1]. Firstly the R G and B planes of the color image are separated, then using different random phase masks are
multiplied to R G and B planes for modulating them. Convolution is applied to combine the R G and B plane to convert it into
grayscale. This grayscale image is gyrator transformed. The gyrator spectrum is then amplitude and phase truncated. The
asymmetric keys are generated for R G and B plane. The Phase truncated image is divided into U and T parts by applying Schur
Decomposition. These U and T parts are gyrator transformed to obtain the encoded images. Numerical simulation shows the
validity and security of the proposed approach.
Ch. Samson et al. proposed an Image Compression based Encryption technique [2]. In this method a Wavelet Transform is
applied to the RGB image to achieve compression. In order to achieve a further compression lossless predictive coding is
applied. This compressed image is encrypted using Secure Advanced Hill Cipher in addition to a pair of Involutory matrices, a
function called as mix and XOR operation. Decryption process results in the proper recovery of the original image. The
proposed method can be used for a secure and a reliable transmission of data.
Narendra Singh et al. proposed a new chaos based image encryption scheme based on canonical transforms [3]. The
technique makes use of three different canonical transforms, fractional Fourier transform, the extended fractional Fourier
transform and Fresnel transform. The three chaotic maps used to generate random phase masks are the tent map, Kaplan –Yorke