scispace - formally typeset
Search or ask a question
Author

Dhanesh Kumar

Bio: Dhanesh Kumar is an academic researcher from University of Lucknow. The author has contributed to research in topics: Encryption & Digital image. The author has an hindex of 4, co-authored 10 publications receiving 44 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The statistical analyses like histogram, correlation and entropy confirm the robustness of the proposed method against statistical attacks and experimental results show that the method is resistant to occlusion attack.

55 citations

Journal ArticleDOI
TL;DR: The proposed cryptosystem provides the security of the digital images using the cryptographic algorithm in the frequency domain of the image using 2D discrete Haar wavelet transform (DHWT) and 3D logistic chaotic map.
Abstract: This paper proposes a new lossless encryption and decryption method for digital colour-image using 2D discrete Haar wavelet transform (DHWT) and 3D logistic chaotic map. The proposed cryptosystem p...

38 citations

Journal ArticleDOI
01 Nov 2020
TL;DR: The proposed encryption and decryption method for optical and digital double color-images using 2D-multiple parameter fractional discrete cosine transform and 3D-logistic chaotic map has the ability to resist the occlusion attack, differential attack, and Gaussian random noise attack.
Abstract: This paper proposes a new encryption and decryption method for optical and digital double color-images using 2D-multiple parameter fractional discrete cosine transform (MPFrDCT) and 3D-logistic chaotic map (3D-LCM). The double color-images to be encrypted are converted to their indexed formats by extracting their color maps. A 3D-LCM is used for generate a keystream and this keystream is used in scrambling the indexed images. The second scrambled image is normalized and then multiplied by a random phase mask (RPM) generated by 3D-LCM. The first scrambled image and the second modified image are treated as amplitude and phase of a complex signal and this complex signal is encrypted using 2D-MPFrDCT. The Encrypted image is obtained after separating the amplitude and phase parts of this signal. To enhance security, a substitution method is applied in the intermediate image using another keystream generated by 3D-LCM. The decryption method is the same but in reverse order. We have also given a setup for the encryption and decryption of optical double images using this method. The keyspace for the proposed method is also discussed in this paper. The experimental results and the security analysis of the proposed method are given to validate the feasibility and robustness of the proposed method. The statistical analysis like histogram, correlation, entropy analysis, and randomness test confirm the robustness of the proposed method against statistical attacks. The experimental results also show that the proposed method is resistant to a brute-force attack. The proposed method has the ability to resist the occlusion attack, differential attack, and Gaussian random noise attack.

15 citations

Journal ArticleDOI
TL;DR: A new scheme of digital image encryption and decryption method based on three-dimensional (3D) Arnold cat map (ACM) and elliptic curve and a mapping inverting method is proposed to convert the pixels of the image as points on the elliptic Curve.
Abstract: Security of digital data is an important task in the present era. In this paper, we propose a new scheme of digital image encryption and decryption method based on three-dimensional (3D) Arnold cat...

7 citations

Journal ArticleDOI
TL;DR: In this paper, a new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed.
Abstract: A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups. After representation, these three groups are converted into row vectors and scrambled by using keys generated by the 6D-chaotic system and after that, these row vectors are combined into three matrices. The three matrices are then mixed horizontally and divided into two halves, with the left half serving as the real part and the right half serving as the imaginary part of a complex-valued matrix (CVM). This CVM is further subjected to 2D FrDCT. The output of 2D FrDCT is separated into three parts. The robustness of the technique is further enhanced by substitution operation using keys generated by the 6D-chaotic system. Thus, the final encrypted template is obtained. The analysis like security, statistical, and attacks are given to authenticate the reliability of the proposed technique. The experimental values also show that the proposed technique is resistant to brute force attacks.

6 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A novel triple-image encryption and hiding algorithm is proposed by combining a 2D chaotic system, compressive sensing (CS) and the 3D discrete cosine transform (DCT) to obtain a visually meaningful cipher image.

106 citations

Journal ArticleDOI
TL;DR: In this article , a double-parameter fractal sorting matrix (DPFSM) is proposed to solve the limitation of calculation accuracy on information security, and the security analysis demonstrates the security.
Abstract: In the field of frontier research, information security has received a lot of interest, but in the field of information security algorithm, the introduction of decimals makes it impossible to bypass the topic of calculation accuracy. This article creatively proposes the definition and related proofs of double parameters fractal sorting matrix (DPFSM). As a new matrix classification with fractal properties, DPFSM contains self-similar structures in the ordering of both elements and sub-blocks in the matrix. These two self-similar structures are determined by two different parameters. To verify the theory, this paper presents a type of $2\times 2$ DPFSM iterative generation method, as well as the theory, steps, and examples of the iteration. DPFSM is a space position transformation matrix, which has a better periodic law than a single parameter fractal sorting matrix (FSM). The proposal of DPFSM expands the fractal theory and solves the limitation of calculation accuracy on information security. The image encryption algorithm based on DPFSM is proposed, and the security analysis demonstrates the security. DPFSM has good application value in the field of information security.

56 citations

Journal ArticleDOI
TL;DR: In this paper , a multiple image encryption scheme based on hyperchaotic map and 3D cube is designed, where multiple images are segmented by columns, and a regular cube is obtained by stacking multiple fixed-size planes along the z-axis direction.

53 citations

Journal ArticleDOI
11 Sep 2020-Symmetry
TL;DR: This work proposes a novel bit-level permutation algorithm that contains a plain-image related rows and columns substitution, a pixel-level roll shift part, and a bit- level cyclic shift part that has good security performance and a speed advantage compared to other works.
Abstract: To ensure the security of digital images during transmission and storage, an efficient and secure chaos-based color image encryption scheme using bit-level permutation is proposed. Our proposed image encryption algorithm belongs to symmetric cryptography. Here, we process three color components simultaneously instead of individually, and consider the correlation between them. We propose a novel bit-level permutation algorithm that contains three parts: a plain-image related rows and columns substitution, a pixel-level roll shift part, and a bit-level cyclic shift part. In the plain-related rows and columns substitution part, we involve the plain-image information to generate a control sequence by using a skew tent system. This process ensures that the correlation between three color components can be totally broken, and our cryptosystem has enough plain-image sensitivity to resist the differential attack. In the pixel-level roll shift part and bit-level cyclic shift part, we have a fully bit-level permutation controlled by two sequences using a Rucklidge system. The simulation and some common security analyses are given. Test results show that our proposed scheme has good security performance and a speed advantage compared to other works.

42 citations

Journal ArticleDOI
TL;DR: The proposed cryptosystem provides the security of the digital images using the cryptographic algorithm in the frequency domain of the image using 2D discrete Haar wavelet transform (DHWT) and 3D logistic chaotic map.
Abstract: This paper proposes a new lossless encryption and decryption method for digital colour-image using 2D discrete Haar wavelet transform (DHWT) and 3D logistic chaotic map. The proposed cryptosystem p...

38 citations