Analysis of Walsh-Hadamard Transformation with CFBMC Communication

Author(s):  
Dharmavaram Asha Devi ◽  
Yeshala Siri Chandana ◽  
Manda Akshitha
2007 ◽  
Vol 4 (16) ◽  
pp. 504-509
Author(s):  
Ki Seok Kwak ◽  
Jin Bae Park ◽  
Tae Sung Yoon ◽  
Jae Won Kho

2003 ◽  
Vol 52 (12) ◽  
pp. 1193-1197 ◽  
Author(s):  
Takashi KANETA ◽  
Miki NISHIDA ◽  
Totaro IMASAKA

Author(s):  
Prajwalasimha S N ◽  
Kavya S R ◽  
Tanaaz Zeba Ahmed

In this paper, Pseudo Hadamard Transformation (PHT) and non-chaotic substitution based image encryption scheme has been proposed. Images are characterized by intrinsic properties such as, strong redundancy and correlation between the adjacent pixels, hence more vulnerable to cyber-attacks. In the proposed technique, the redundancy and correlation have been effectively reduced by pixel position transformation using PHT and pixel value variation using non chaotic substitution, providing two stage security in encryption for images. Fifteen standard test images are considered for experimental analysis. Better average Number of Pixel Changing Rate (NPCR) and Unified Average pixel Changing Intensity (UACI) are obtained for a set of standard test images compared to more popular existing algorithms.


In this article, a Modified Pseudo Hadamard Transformation (MPHT) and non-Chaotic substitution based image encryption scheme has been proposed. Due to intrinsic properties such as, strong redundancy and correlation between the adjacent pixels, images are more vulnerable to cyber-attacks. In the proposed technique, the redundancy and correlation have been effectively reduced by pixel position transformation using MPHT and pixel value variation using non chaotic substitution, providing two stage security in encryption for secrete images. An average 99.6089% of Number of Pixel Changing Rate (NPCR) and 33.4328% of Unified Average pixel Changing Intensity (UACI) are obtained for a set of standard test images compared to more popular existing techniques


Confusion and diffusion are the frequently used embryonics in multimedia (image) encryption systems. Multimedia data protection against cryptanalysis can be effectually fortified by these techniques. Due to inherent properties of images such as high inter-pixel redundancy and bulk data capacity, encryption is performed in two stages: Confusion and Diffusion. In this article, a combined Pseudo Hadamard transformation in the confusion stage and Gingerbreadman chaotic substitution in the diffusion stage are used in the encryption phase of the algorithm. The strong correlation between contiguous elements in the host image is effectually reduced using Pseudo Hadamard transformation and entropy in the cipher image is enhanced using Gingerbreadman chaotic substitution. Secrete key length used in the algorithm is 128 bits, these are the initial conditions for Gingerbreadman chaotic generator. The elements of S-box in the substitution stage are considered from this random sequence generator. Experimental exploration including information entropy, correlation analysis, sensitivity analysis, key space analysis and computational complexity have been performed on set of standard images. Results obtained are better compared to many existing systems.


Author(s):  
Yi Qi ◽  
Zi Heng Lim ◽  
Liang Li ◽  
Guangcan Zhou ◽  
Fook Siong Chau ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document