International Journal of Communications, Network and System Sciences

Volume 7, Issue 1 (January 2014)

ISSN Print: 1913-3715   ISSN Online: 1913-3723

Google-based Impact Factor: 0.66  Citations  h5-index & Ranking

Image Encryption Scheme Based on Filter Bank and Lifting

HTML  Download Download as PDF (Size: 2848KB)  PP. 43-52  
DOI: 10.4236/ijcns.2014.71006    4,328 Downloads   6,559 Views  Citations

ABSTRACT

In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using the filter bank cipher with one or two rounds. To analyze and evaluate the proposed scheme, many parameters have been employed, such as, histogram analysis, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), compression friendliness, exhaustive key analysis, and key sensitivity test. The simulation results showed that, the quality of the image encryption passes all these tests. Moreover, it reaches or excels the current state-of-the-arts. So that, the proposed image encryption process produces random-like output from the statistical point of views.

Share and Cite:

S. Saraireh, Y. Al-Sbou, J. Al-Saraireh and O. Alsmadi, "Image Encryption Scheme Based on Filter Bank and Lifting," International Journal of Communications, Network and System Sciences, Vol. 7 No. 1, 2014, pp. 43-52. doi: 10.4236/ijcns.2014.71006.

Cited by

[1] Image Cryptography Based on Image Processing Technique and Classification Algorithm
JOURNAL OF ALGEBRAIC …, 2022
[2] Iris biometric feature hidden based on chaotic encryption
2019
[3] HYBRID DIGITAL SIGNATURE SCHEME
2019
[4] A New Image Encryption Algorithm Combining the Meaning of Location with Output Feedback Mode
2018
[5] Authentication Mechanisms in Computer Network Protocols
2018
[6] Bit-Level Image Encryption Algorithm Based on Composite Chaotic Mapping
2016
[7] LHM Filter for Removal Salt and Pepper with Random Noise in Images
International Journal of Computer Applications, 2016
[8] Image encryption algorithm based on chaotic mapping and Chinese remainder theorem.
2015
[9] Image encryption algorithm based on chaotic mapping and Chinese remainder theorem
2015
[10] Multimedia Security Techniques
RJ Shah, BK Pancholi - ijireeice.com, 2014

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.