Please cite this article in press as: Naeem, E.A., et al., Efficient implementation of chaotic image encryption in transform domains. J. Syst. Software (2014), http://dx.doi.org/10.1016/j.jss.2014.07.026 ARTICLE IN PRESS G Model JSS-9358; No. of Pages 10 The Journal of Systems and Software xxx (2014) xxx–xxx Contents lists available at ScienceDirect The Journal of Systems and Software j ourna l ho mepage: www.elsevier.com/locate/jss Efficient implementation of chaotic image encryption in transform domains Ensherah A. Naeem a , Mustafa M. Abd Elnaby a , Naglaa F. Soliman b,i , Alaa M. Abbas c,d , Osama S. Faragallah e , Noura Semary f , Mohiy M. Hadhoud f , Saleh A. Alshebeili g , Fathi E. Abd El-Samie c,h, a Department of Electronics and Electrical Communications, Faculty of Engineering, Tanta University, Egypt b Faculty of Engineering, Zagazig University, Zagazig, Egypt c Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, 32952 Menouf, Egypt d Faculty of Engineering, Taif University, Taif, Saudi Arabia e Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt f Department of Information Technology, Faculty of Computers and Information, Menoufia University, 32511 Shebin Elkom, Egypt g Electrical Engineering Department, KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICS), King Saud University, Saudi Arabia h KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICS), King Saud University, Saudi Arabia i Faculty of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia a r t i c l e i n f o Article history: Received 21 July 2013 Received in revised form 10 July 2014 Accepted 13 July 2014 Available online xxx Keywords: Image encryption DCT DWT a b s t r a c t The primary goal of this paper is security management in data image transmission and storage. Because of the increased use of images in industrial operations, it is necessary to protect the secret data of the image against unauthorized access. In this paper, we introduce a novel approach for image encryption based on employing a cyclic shift and the 2-D chaotic Baker map in different transform domains. The Integer Wavelet Transform (IWT), the Discrete Wavelet Transform (DWT), and the Discrete Cosine Transform (DCT) are exploited in the proposed encryption approach. The characteristics of the transform domains are studied and used to carry out the chaotic encryption. A comparison study between the transform- domain encryption approaches in the presence of attacks shows the superiority of encryption in the DWT domain. © 2014 Elsevier Inc. All rights reserved. 1. Introduction The increasing demand for digital imaging applications, such as secure video conferences, military image communication and in general all confidential data transmission applications, has increased the need for reliable and effective security tools to protect important information in the images from attackers. Advantages of chaotic maps drew the attention of cryptographers to design robust encryption techniques. Sensitivity to initial conditions, Corresponding author at: Department of Electronics and Electrical Communica- tions, Faculty of Electronic Engineering, Menoufia University, Egypt. Tel.: +20 482225271. E-mail addresses: ensherah naeem@yahoo.com (E.A. Naeem), mnaby@yahoo.com (M.M. Abd Elnaby), nagla soliman@yahoo.com (N.F. Soliman), aladin abbas@yahoo.com (A.M. Abbas), osam sal@yahoo.com (O.S. Faragallah), noura semary@yahoo.com (N. Semary), mmhadhoud@yahoo.com (M.M. Hadhoud), dsaleh@ksu.edu.sa (S.A. Alshebeili), fathi sayed@yahoo.com (F.E. Abd El-Samie). mixing property, and ergodicity are the main properties of chaotic maps. These properties are similar to some of the cryptographic properties of ideal ciphers (for example, balance and confusion). This paper presents an efficient cryptosystem, which is based on encrypting digital images in transform domains. The sophisti- cated advantage gained from the transform domains is the ability to transform correlated data patterns into transform domains to carry out the substitution or diffusion in these domains. This pro- cess can achieve a large degree of randomization, when returning back to the spatial domain. The rest of this paper is organized as follows. Section 2 presents a review of the chaotic Baker map encryption algorithm. In Section 3, the design of the proposed chaos-based image cryptosystem is introduced. The visual inspection of the encryption results is given in Section 4. The security analysis of the proposed cryptosystem including the differential analysis, the statistical analysis, and the key-space analysis is presented in Section 5. Section 6 studies the effect of noise on the decryption process. In the last section, the concluding remarks are given. http://dx.doi.org/10.1016/j.jss.2014.07.026 0164-1212/© 2014 Elsevier Inc. All rights reserved.