Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM |
| |
Authors: | Heping Wen Zefeng Chen Jiehong Zheng Yiming Huang Shuwei Li Linchao Ma Yiting Lin Zhen Liu Rui Li Linhao Liu Wenxing Lin Jieyi Yang Chongfu Zhang Huaide Yang |
| |
Affiliation: | 1.School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China;2.School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China;3.School of Electronic Information, Dongguan Polytechnic, Dongguan 523808, China |
| |
Abstract: | In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient. Then, the chaotic sequence is used to encrypt the LF coefficient with the structure of “confusion-permutation”. We perform the permutation operation on HF coefficient, and we reconstruct the image of the processed LF coefficient and HF coefficient to obtain the frequency-domain ciphertext image. Finally, the ciphertext is dynamically diffused using the chaotic sequence to obtain the final ciphertext. Theoretical analysis and simulation experiments show that the algorithm has a large key space and can effectively resist various attacks. Compared with the spatial-domain algorithms, this algorithm has great advantages in terms of computational complexity, security performance, and encryption efficiency. At the same time, it provides better concealment of the encrypted image while ensuring the encryption efficiency compared to existing frequency-domain methods. The successful implementation on the embedded device in the optical network environment verifies the experimental feasibility of this algorithm in the new network application. |
| |
Keywords: | image encryption DWT frequency-domain analysis |
|
|