Please cite this article in press as: Naeem, E.A., et al., Efficient implementation of chaotic image encryption in transform domains. J. Syst.
Software (2014), http://dx.doi.org/10.1016/j.jss.2014.07.026
ARTICLE IN PRESS
G Model
JSS-9358; No. of Pages 10
The Journal of Systems and Software xxx (2014) xxx–xxx
Contents lists available at ScienceDirect
The Journal of Systems and Software
j ourna l ho mepage: www.elsevier.com/locate/jss
Efficient implementation of chaotic image encryption in transform
domains
Ensherah A. Naeem
a
, Mustafa M. Abd Elnaby
a
, Naglaa F. Soliman
b,i
, Alaa M. Abbas
c,d
,
Osama S. Faragallah
e
, Noura Semary
f
, Mohiy M. Hadhoud
f
, Saleh A. Alshebeili
g
,
Fathi E. Abd El-Samie
c,h,∗
a
Department of Electronics and Electrical Communications, Faculty of Engineering, Tanta University, Egypt
b
Faculty of Engineering, Zagazig University, Zagazig, Egypt
c
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, 32952 Menouf, Egypt
d
Faculty of Engineering, Taif University, Taif, Saudi Arabia
e
Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
f
Department of Information Technology, Faculty of Computers and Information, Menoufia University, 32511 Shebin Elkom, Egypt
g
Electrical Engineering Department, KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICS), King Saud University, Saudi Arabia
h
KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICS), King Saud University, Saudi Arabia
i
Faculty of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia
a r t i c l e i n f o
Article history:
Received 21 July 2013
Received in revised form 10 July 2014
Accepted 13 July 2014
Available online xxx
Keywords:
Image encryption
DCT
DWT
a b s t r a c t
The primary goal of this paper is security management in data image transmission and storage. Because of
the increased use of images in industrial operations, it is necessary to protect the secret data of the image
against unauthorized access. In this paper, we introduce a novel approach for image encryption based
on employing a cyclic shift and the 2-D chaotic Baker map in different transform domains. The Integer
Wavelet Transform (IWT), the Discrete Wavelet Transform (DWT), and the Discrete Cosine Transform
(DCT) are exploited in the proposed encryption approach. The characteristics of the transform domains
are studied and used to carry out the chaotic encryption. A comparison study between the transform-
domain encryption approaches in the presence of attacks shows the superiority of encryption in the DWT
domain.
© 2014 Elsevier Inc. All rights reserved.
1. Introduction
The increasing demand for digital imaging applications, such
as secure video conferences, military image communication and
in general all confidential data transmission applications, has
increased the need for reliable and effective security tools to protect
important information in the images from attackers. Advantages
of chaotic maps drew the attention of cryptographers to design
robust encryption techniques. Sensitivity to initial conditions,
∗
Corresponding author at: Department of Electronics and Electrical Communica-
tions, Faculty of Electronic Engineering, Menoufia University, Egypt.
Tel.: +20 482225271.
E-mail addresses: ensherah naeem@yahoo.com (E.A. Naeem),
mnaby@yahoo.com (M.M. Abd Elnaby), nagla soliman@yahoo.com (N.F. Soliman),
aladin abbas@yahoo.com (A.M. Abbas), osam sal@yahoo.com (O.S. Faragallah),
noura semary@yahoo.com (N. Semary), mmhadhoud@yahoo.com (M.M. Hadhoud),
dsaleh@ksu.edu.sa (S.A. Alshebeili), fathi sayed@yahoo.com (F.E. Abd El-Samie).
mixing property, and ergodicity are the main properties of chaotic
maps. These properties are similar to some of the cryptographic
properties of ideal ciphers (for example, balance and confusion).
This paper presents an efficient cryptosystem, which is based
on encrypting digital images in transform domains. The sophisti-
cated advantage gained from the transform domains is the ability
to transform correlated data patterns into transform domains to
carry out the substitution or diffusion in these domains. This pro-
cess can achieve a large degree of randomization, when returning
back to the spatial domain.
The rest of this paper is organized as follows. Section 2 presents
a review of the chaotic Baker map encryption algorithm. In Section
3, the design of the proposed chaos-based image cryptosystem is
introduced. The visual inspection of the encryption results is given
in Section 4. The security analysis of the proposed cryptosystem
including the differential analysis, the statistical analysis, and the
key-space analysis is presented in Section 5. Section 6 studies the
effect of noise on the decryption process. In the last section, the
concluding remarks are given.
http://dx.doi.org/10.1016/j.jss.2014.07.026
0164-1212/© 2014 Elsevier Inc. All rights reserved.