100
Views
1
CrossRef citations to date
0
Altmetric
Articles

Sparse Compression-Based Image Encryption using Data Encryption Standards RC5

, , , , &

References

  • J. Karmakar, D. Nandi, and M. K. Mandal, “A novel hyper-chaotic image encryption with sparse-representation based compression,” Multimed. Tools. Appl., Vol. 79, no. 37, pp. 28277–300, 2020.
  • G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solit. Fract., Vol. 21, no. 3, pp. 749–61, 2004.
  • M. Kar, A. Kumar, D. Nandi, and M. K. Mandal, “Image encryption using DNA coding and hyper chaotic system,” IETE Tech. Rev., Vol. 37, no. 2, pp. 12–23, 2020.
  • A. Jain, and N. Rajpal, “A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps,” Multimed. Tools. Appl., Vol. 75, no. 10, pp. 5455–72, 2016.
  • Q. Zhang, L. Guo, and X. Wei, “Image encryption using DNA addition combining with chaotic maps,” Math. Comput. Model., Vol. 52, no. 11-12, pp. 2028–35, 2010.
  • X. Zhang, W. Nie, Y. Ma, and Q. Tian, “Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box,” Multimed. Tools. Appl., Vol. 76, no. 14, pp. 15641–59, 2017.
  • M. K. Mandal, M. Kar, S. K. Singh, and V. K. Barnwal, “Symmetric key image encryption using chaotic Rossler system,” Secur. Commun. Netw., Vol. 7, no. 11, pp. 2145–52, 2014.
  • A. H. Brahim, A. A. Pacha, and N. H. Said, “A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes,” Inform. Sec. J. Global Persp., Vol. 32, no. 2, pp. 59–75, 2023.
  • M. Zarebnia, and R. Parvaz, “Image encryption algorithm by fractional based chaotic system and framelet transform.,” Chaos Solit. Fract., Vol. 152, pp. 111402, 2021.
  • L. Liu, and S. Miao, “A new image encryption algorithm based on logistic chaotic map with varying parameter,” Springer Plus., Vol. 5, no. 1, pp. 1–12, 2016.
  • Z. Lin, and H. Wang, “Efficient image encryption using a chaos-based PWL memristor,” IETE Tech. Rev., Vol. 27, no. 4, pp. 318–25, 2010.
  • S. Bai, L. Zhou, M. Yan, X. Ji, and X. Tao, “Image cryptosystem for visually meaningful encryption based on fractal graph generating,” IETE Tech. Rev., Vol. 38, no. 1, pp. 130–41, 2021.
  • R. L. Rivest, “The RC5 encryption algorithm,” in International workshop on fast software encryption, Berlin: Springer, 1994, December, pp. 86–96.
  • R. L. Rivivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. “The RC6 Block Cipher.” 1998. http://people.csail.mit.edu/rivest/rc6.pdf.
  • H. Hermassi, A. Belazi, R. Rhouma, and S. M. Belghith, “Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps,” Multimed. Tools. Appl., Vol. 72, no. 2, pp. 2211–24, 2014.
  • A. Kulsoom, D. Xiao, and S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules,” Multimed. Tools. Appl., Vol. 75, no. 1, pp. 1–23, 2016.
  • F. Özkaynak, “Brief review on application of nonlinear dynamics in image encryption,” Nonlinear Dyn., Vol. 92, no. 2, pp. 305–13, 2018.
  • P. Zhen, G. Zhao, L. Min, and X. Jin, “Chaos-based image encryption scheme combining DNA coding and entropy,” Multimed. Tools Appl., Vol. 75, no. 11, pp. 6303–19, 2016.
  • L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Comput. Electr. Eng., Vol. 38, no. 5, pp. 1240–8, 2012.
  • B. Idrees, S. Zafar, T. Rashid, and W. Gao, “Image encryption algorithm using S-box and dynamic Hénon bit level permutation,” Multimed. Tools Appl., Vol. 79, no. 9, pp. 6135–62, 2020.
  • A. Belazi, M. Khan, A. A. A. El-Latif, and S. Belghith, “Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption,” Nonlinear Dyn., Vol. 87, no. 1, pp. 337–61, 2017.
  • X. Zhang, Z. Zhao, and J. Wang, “Chaotic image encryption based on circular substitution box and key stream buffer,” Signal Process. Image Commun., Vol. 29, no. 8, pp. 902–13, 2014.
  • K. M. Hosny, S. T. Kamal, M. M. Darwish, and G. A. Papakostas, “New image encryption algorithm using hyperchaotic system and fibonacci q-matrix,” Electronics, Vol. 10, no. 9, pp. 1066, 2021.
  • K. Guan. “Important notes on lyapunov exponents.” arXiv preprint arXiv:1401.3315, 2014.
  • M. Elad. Sparse and redundant representations: From theory to applications in signal and image processing. pp. 1094-7. New York: springer, 2010.
  • D. Nandi, J. Karmakar, and A. Kumar, “Sparse representation based multi-frame image super-resolution reconstruction using adaptive weighted features,” IET Image Proc., Vol. 13, no. 4, pp. 663–72, 2019.
  • T. Ogawa, and M. Haseyama, “Image inpainting based on sparse representations with a perceptual metric,” EURASIP J. Adv. Signal Process., Vol. 2013, no. 1, pp. 1–26, 2013.
  • M. Elad, M. A. Figueiredo, and Y. Ma, “On the role of sparse and redundant representations in image processing,” Proc. IEEE, Vol. 98, no. 6, pp. 972–82, 2010.
  • M. Elad, and M. Aharon, “Image denoising via sparse and redundant representations over learned dictionaries,” IEEE Trans. Image Process., Vol. 15, no. 12, pp. 3736–45, 2006.
  • B. Shen, W. Hu, Y. Zhang, and Y. J. Zhang. “Image inpainting via sparse representation”, In 2009 IEEE international conference on acoustics, speech and signal processing, pp. 697–700, April 2009. IEEE.
  • M. Chang, and L. Zhang, “Image restoration based on sparse representation using feature classification learning,” EURASIP J. Image Video Process., Vol. 1, pp. 1–18, 2020.
  • K. E. Psannis, and Y. Ishibashi, “Impact of video coding on delay and jitter in 3G wireless video multicast services,” EURASIP J. Wirel. Commun. Netw., Vol. 2006, pp. 1–7, 2006.
  • C. Stergiou, and K. E. Psannis, “Efficient and secure big data delivery in cloud computing,” Multimed. Tools Appl., Vol. 76, no. 21, pp. 22803–22, 2017.
  • A. M. Taheri, and H. Mahdavi-Nasab, “Sparse representation based facial image compression via multiple dictionaries and separated ROI,” Multimed. Tools. Appl., Vol. 77, no. 23, pp. 31095–114, 2018.
  • B. Stergiou, K. E. Psannis, A. P. Plageras, Y. Ishibashi, and B. G. Kim. “Algorithms for efficient digital media transmission over IoT and cloud networking.” 2018.
  • S. Pal, A. Mahanty, A. Pathak, J. Karmakar, H. Mondal, and M. Mandal, “A novel image encryption technique with four stage bit-interspersing and a 4D-hyperchaotic system,” ECTI Trans. Comp. Inform. Technol., Vol. 17, no. 1, pp. 105–16, 2023.
  • K. Zhan, D. Wei, J. Shi, and J. Yu, “Cross-utilizing hyperchaotic and DNA sequences for image encryption,” J. Electron. Imag., Vol. 26, no. 1, pp. 013021, 2017.
  • H. Wang, D. Xiao, M. Li, Y. Xiang, and X. Li, “A visually secure image encryption scheme based on parallel compressive sensing,” Signal. Process., Vol. 155, pp. 218–32, 2019.
  • W. J. Jun, and T. S. Fun, “A New image encryption algorithm based on single S-Box and dynamic encryption step,” IEEE Access, Vol. 9, pp. 120596–612, 2021.
  • H. Mahalingam, T. Veeramalai, A. R. Menon, and R. Amirtharajan, “Dual-domain image encryption in unsecure medium – a secure communication perspective,” Mathematics, Vol. 11, no. 2, pp. 457, 2023.
  • H. Mahalingam, et al., “Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments,” Mathematics, Vol. 11, no. 8, pp. 1769, 2023.
  • X. Huang, and G. Ye, “An image encryption algorithm based on hyper-chaos and DNA sequence,” Multimed. Tools. Appl., Vol. 72, no. 1, pp. 57–70, 2014.
  • T. Hashim, A. Nathim, and G. Saeed Mahdi, “Modification of RC5 algorithm for image encryption,” Iraqi J. Comp. Commun. Contr. Syst. Eng., Vol. 14, no. 2, pp. 62–71, 2014.
  • Y. Luo, M. Du, and J. Liu, “A symmetrical image encryption scheme in wavelet and time domain,” Commun. Nonlinear Sci. Numer. Simul., Vol. 20, no. 2, pp. 447–60, 2015.
  • C. Fu, W. J. Li, Z. Y. Meng, T. Wang, and P. X. Li. “A symmetric image encryption scheme using chaotic baker map and Lorenz system,”. IEEE Ninth International Conference on Computational Intelligence and Security, pp. 724–728, December. 2013.
  • W. Zhang, H. Yu, Y. L. Zhao, and Z. L. Zhu, “Image encryption based on three-dimensional bit matrix permutation,” Signal. Process., Vol. 118, pp. 36–50, 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.