Research Article

DCT versus DWT Chaotic based Color Image Encryption

by  M. A. Mohamed, M. I. Fath Allah, L. W. Elbon
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Issue 24
Published: Dec 2019
Authors: M. A. Mohamed, M. I. Fath Allah, L. W. Elbon
10.5120/ijca2019919706
PDF

M. A. Mohamed, M. I. Fath Allah, L. W. Elbon . DCT versus DWT Chaotic based Color Image Encryption. International Journal of Computer Applications. 177, 24 (Dec 2019), 24-41. DOI=10.5120/ijca2019919706

                        @article{ 10.5120/ijca2019919706,
                        author  = { M. A. Mohamed,M. I. Fath Allah,L. W. Elbon },
                        title   = { DCT versus DWT Chaotic based Color Image Encryption },
                        journal = { International Journal of Computer Applications },
                        year    = { 2019 },
                        volume  = { 177 },
                        number  = { 24 },
                        pages   = { 24-41 },
                        doi     = { 10.5120/ijca2019919706 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2019
                        %A M. A. Mohamed
                        %A M. I. Fath Allah
                        %A L. W. Elbon
                        %T DCT versus DWT Chaotic based Color Image Encryption%T 
                        %J International Journal of Computer Applications
                        %V 177
                        %N 24
                        %P 24-41
                        %R 10.5120/ijca2019919706
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Over the years, large amount of transferred information has been attacked by hackers; so it has been considerable to make all effort for securing data and encrypting the information. Color images represent a very vital and important type of multimedia; so many encryption techniques have been proposed to protect the color image against different types of attacks. In this paper two proposed techniques will be introduced which have had high robustness against complex composite form of attacks. Discrete Wavelet Transform (DWT) has been applied for image transformation in one method and Discrete Cosine Transform (DCT) has been applied in the other one. Six various chaotic maps have been used with different parameters to introduce the needed encryption keys for the proposed approaches. After many extensive comparisons with other traditional techniques it has been found that the proposed algorithms have given better performance against both friendly and hard forms of complex composite attacks.

References
  • MOHAMED, M., ABOU-ELSOUD, M. & EL-DIN, W. K. 2012. Hardware Implementation of Multimedia Encryption Techniques Using FPGA. International Journal of Computer Science Issues (IJCSI), 9, 290.
  • BATTISTI, F., CANCELLARO, M., BOATO, G., CARLI, M. & NERI, A. 2009. Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP Journal on Advances in signal Processing, 2009, 938515.
  • ZHANG, S., WANG, X. & ZHOU, S. The Research of Image Watermarking Encryption Algorithm. Computational Sciences and Optimization (CSO), 2011 Fourth International Joint Conference on, 2011. IEEE, 821-824.
  • AGRAWAL, M. & MISHRA, P. 2012. A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering, 4, 877.
  • LIU, Y., LIN, J., FAN, J. & ZHOU, N. 2012. Image encryption based on cat map and fractional fourier transform. Journal of Computational Information Systems, 8, 7485-7492.
  • WU, Y., NOONAN, J. P., YANG, G. & JIN, H. 2012. Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21, 013014.
  • JAWAD, L. M. & SULONG, G. B. 2013. A review of color image encryption techniques. International Journal of Computer Science Issues (IJCSI), 10, 266.
  • Mohamed, M. A., Samarah, A. S., & Allah, M. F. (2014). Optical encryption techniques: an overview. International Journal for Computer Science Issues (IJCSI), 11(2), 125-129.‏
  • BENRHOUMA, O., MANNAI, O. & HERMASSI, H. Digital images watermarking and partial encryption based on DWT transformation and chaotic maps. Systems, Signals & Devices (SSD), 2015 12th International Multi-Conference on, 2015. IEEE, 1-6.
  • MOYSIS, L. & AZAR, A. T. 2017. New discrete time 2d chaotic maps. International Journal of System Dynamics Applications (IJSDA), 6, 77-104
  • LOAN, Nazir A., et al. Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access, 2018, 6: 19876-19897.‏
  • SHAHEEN, Ahmad M., et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. Journal of Ambient Intelligence and Humanized Computing, 2018, 1-18.‏
  • Kang, Xiao-bing, et al. "A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength." Multimedia Tools and Applications77.11 (2018): 13197-13224.‏
  • MOHAMED, M. A.; SAMRAH, Ahmed Shaaban; FATH ALLAH, Mohamed Ismail. DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks. Advances in OptoElectronics, 2017, 2017.‏
  • MISHRA, M., SINGH, P. & GARG, C. 2014. A New algorithm of encryption and decryption of images using chaotic mapping. International Journal of Information & Computation Technology. ISSN, 0974-2239
  • FU, C., CHEN, J.-J., ZOU, H., MENG, W.-H., ZHAN, Y.-F. & YU, Y.-W. 2012. A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express, 20, 2363-2378.
  • MOHAMED, M. A., et al. Hybrid watermarking scheme for copyright protection using chaotic maps cryptography. International Journal of Computer Applications, 2015, 126.4.
  • Gorji, M. R. B., Shirvani, M. H., & Mooziraji, F. R. (2015). A new image encryption method using chaotic map. Journal of Multidisciplinary Engineering Scienceand Technology (JMEST), 2(2).‏‏
  • Table 2. performance metrics in case DCT technique against Friendly Gaussian attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.1993
  • 0.2412
  • 0.2029
  • 0.1945
  • 0.2784
  • 0.2219
  • 0.7704
  • 0.7911
  • 
  • MSE
  • 4.9858e+03
  • 5.9206e+03
  • 6.2695e+03
  • 6.5290e+03
  • 6.5796e+03
  • 6.5796e+03
  • 15819
  • 15388
  • 
  • PSNR
  • 11.1535
  • 10.4071
  • 10.1585
  • 10.1585
  • 9.9032
  • 9.9488
  • 6.1391
  • 6.2590
  • 
  • R
  • 0.1447
  • 0.0713
  • 0.1392
  • 0.1382
  • 0.0482
  • 0.1196
  • 0.1545
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 16.1221
  • 20.957
  • 23.5832
  • 24.6248
  • 19.8354
  • 24.1143
  • 28.221
  • 29.1083
  • 
  • Entropy of original image
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.2638
  • 7.2331
  • 
  • Table 3. performance metrics in case DWT technique against Friendly Gaussian attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.8500
  • 0.3440
  • 0.3309
  • 0.3470
  • 0.2938
  • 0.3101
  • 0.6259
  • 0.6296
  • 
  • MSE
  • 5.5680e+03
  • 6.4874e+03
  • 6.2872e+03
  • 6.5382e+03
  • 7.8959e+03
  • 6.5768+03
  • 10495
  • 10066
  • 
  • PSNR
  • 10.6738
  • 10.0101
  • 10.1462
  • 9.9762
  • 9.1568
  • 9.9507
  • 7.9209
  • 8.1021
  • 
  • R
  • 0.0564
  • -0.0407
  • 0.0925
  • 0.1119
  • 0.0990
  • 0.1079
  • 0.4341
  • 0.4601
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 17.4673
  • 21.8000
  • 23.4128
  • 24.5642
  • 16.0536
  • 24.0315
  • 5.6079
  • 5.3108
  • 
  • Entropy of original image
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 5.9133
  • 5.6448
  • 
  • Table 4. performance metrics in case DCT technique against Friendly Salt & pepper attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.2832
  • 0.2392
  • 0.2735
  • 0.2356
  • 0.2793
  • 0.2328
  • 0.7704
  • 0.7911
  • 
  • MSE
  • 5.0258e+03
  • 5.9488e+03
  • 6.2634e+03
  • 6.5267e+03
  • 7.3485e+03
  • 6.5773e+03
  • 15819
  • 15388
  • 
  • PSNR
  • 11.1188
  • 10.3865
  • 10.1627
  • 9.9839
  • 9.4688
  • 9.9503
  • 6.1391
  • 6.2590
  • 
  • R
  • 0.1489
  • 0.0730
  • 0.1403
  • 0.1383
  • 0.0585
  • 0.1196
  • 0.1545
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 16.3549
  • 21.0561
  • 23.5637
  • 24.6179
  • 20.1300
  • 24.1069
  • 28.221
  • 29.1083
  • 
  • Entropy of original image
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.2638
  • 7.2331
  • 
  • Table 5. performance metrics in case DWT technique against Friendly Salt & pepper attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.3285
  • 0.3110
  • 0.3029
  • 0.3052
  • 0.2761
  • 0.3189
  • 0.6259
  • 0.6296
  • 
  • MSE
  • 5.17134e+03
  • 6.5918e+03
  • 6.270e+03
  • 6.5332e+03
  • 7.8802e+03
  • 6.5726e+03
  • 10495
  • 10066
  • 
  • PSNR
  • 10.5618
  • 9.9408
  • 10.1519
  • 9.9795
  • 9.1654
  • 9.9534
  • 7.9209
  • 8.1021
  • 
  • R
  • 0.0501
  • -0.0475
  • 0.0918
  • 0.1121
  • 0.1006
  • 0.1081
  • 0.4341
  • 0.4601
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 17.8973
  • 22.1792
  • 23.3656
  • 24.5492
  • 16.0898
  • 24.0194
  • 5.6079
  • 5.3108
  • 
  • Entropy of original image
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 5.9133
  • 5.6448
  • 
  • Table 6. performance metrics in case DCT technique against Friendly Speckle attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.2657
  • 0.6580
  • 0.2695
  • 0.2580
  • 0.2429
  • 0.2412
  • 0.7704
  • 0.7911
  • 
  • MSE
  • 5.0954e+03
  • 6.0033e+03
  • 6.3019e+03
  • 6.5483e+03
  • 7.3426e+03
  • 6.5925e+03
  • 15819
  • 15388
  • 
  • PSNR
  • 11.0590
  • 10.3469
  • 10.1361
  • 9.9695
  • 9.4723
  • 9.9403
  • 6.1391
  • 6.2590
  • 
  • R
  • 0.1441
  • 0.0743
  • 0.1387
  • 0.1363
  • 0.0596
  • 0.1192
  • 0.1545
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 16.9110
  • 21.4198
  • 23.7124
  • 24.6792
  • 20.3251
  • 24.1535
  • 28.221
  • 29.1083
  • 
  • Entropy of original image
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.2638
  • 7.2331
  • 
  • Table 7 performance metrics in case DWT technique against Friendly Speckle attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.3574
  • 0.2701
  • 0.3522
  • 0.3120
  • 0.2930
  • 0.3049
  • 0.6259
  • 0.6296
  • 
  • MSE
  • 5.747e+043
  • 6.5952e+03
  • 6.3071e+03
  • 6.5553e+03
  • 7.8616e+03
  • 6.5878e+03
  • 10495
  • 10066
  • 
  • PSNR
  • 10.5411
  • 9.9385
  • 10.1325
  • 9.9649
  • 9.1757
  • 9.9437
  • 7.9209
  • 8.1021
  • 
  • R
  • 0.0429
  • -0.0508
  • 0.0940
  • 0.1120
  • 0.1007
  • 0.1079
  • 0.4341
  • 0.4601
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 18.2553
  • 22.3527
  • 23.5403
  • 24.6183
  • 16.2727
  • 24.0672
  • 5.6079
  • 5.3108
  • 
  • Entropy of original image
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 7.0237
  • 5.9133
  • 5.6448
  • 
  • Table 8. performance metrics in case DCT technique against Hard Gaussian attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.3141
  • 0.2958
  • 0.3173
  • 0.3342
  • 0.3111
  • 0.3327
  • 0.7704
  • 0.7911
  • 
  • MSE
  • 4.1465e+03
  • 4.1570e+03
  • 4.1436e+03
  • 4.1516e+03
  • 4.1456e+03
  • 4.1510e+03
  • 15819
  • 15388
  • 
  • PSNR
  • 11.9540
  • 11.9430
  • 11.9571
  • 11.9486
  • 11.9550
  • 11.9493
  • 6.1391
  • 6.2590
  • 
  • R
  • 0.3347
  • 0.3329
  • 0.3349
  • 0.3339
  • 0.3341
  • 0.3340
  • 0.1545
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 10.1729
  • 10.1823
  • 10.1892
  • 10.1798
  • 10.1701
  • 10.1589
  • 28.221
  • 29.1083
  • 
  • Entropy of original image
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 7.2638
  • 7.2331
  • 
  • Table 9. performance metrics in case DWT technique against Hard Gaussian attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.3564
  • 0.3501
  • 0.3747
  • 0.3387
  • 0.3346
  • 0.3273
  • 0.6259
  • 0.6296
  • 
  • MSE
  • 4.1541e+03
  • 4.1467e+03
  • 4.1489e+03
  • 4.1466e+03
  • 4.1495e+03
  • 4.1436e+03
  • 10495
  • 10066
  • 
  • PSNR
  • 11.9460
  • 11.9537
  • 11.9515
  • 11.9538
  • 11.9509
  • 11.9571
  • 7.9209
  • 8.1021
  • 
  • R
  • 0.3326
  • 0.3347
  • 0.3344
  • 0.3346
  • 0.3341
  • 0.3347
  • 0.4341
  • 0.4601
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 10.1606
  • 10.1613
  • 10.1527
  • 10.1650
  • 10.1648
  • 10.1748
  • 5.6079
  • 5.3108
  • 
  • Entropy of original image
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 5.9133
  • 5.6448
  • 
  • Table 10. performance metrics in case DCT technique against Hard salt & pepper attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.2994
  • 0.3069
  • 0.4033
  • 0.3149
  • 0.3067
  • 0.2967
  • 0.7704
  • 0.7911
  • 
  • MSE
  • 4.2054e+03
  • 4.2055e+03
  • 4.2062e+03
  • 4.2050e+03
  • 4.2064e+03
  • 4.2054e+03
  • 15819
  • 15388
  • 
  • PSNR
  • 11.8927
  • 11.8926
  • 11.8919
  • 11.8931
  • 11.8917
  • 11.8927
  • 6.1391
  • 6.2590
  • 
  • R
  • 0.3358
  • 0.3357
  • 0.3355
  • 0.3357
  • 0.3356
  • 0.3358
  • 0.1545
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 10.5089
  • 10.5104
  • 10.5078
  • 10.5119
  • 10.5105
  • 10.5052
  • 28.221
  • 29.1083
  • 
  • Entropy of original image
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 7.2638
  • 7.2331
  • 
  • Table 11. performance metrics in case DWT technique against Hard salt & pepper attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.5476
  • 0.3124
  • 0.3630
  • 0.3653
  • 0.3178
  • 0.3148
  • 0.6259
  • 0.7911
  • 
  • MSE
  • 4.2050e+03
  • 4.2072e+03
  • 4.2069e+03
  • 4.2048e+03
  • 4.2063e+03
  • 4.2068e+03
  • 10495
  • 15388
  • 
  • PSNR
  • 11.8932
  • 11.8908
  • 11.8912
  • 11.8934
  • 11.8918
  • 11.8913
  • 7.9209
  • 6.2590
  • 
  • R
  • 0.3357
  • 0.3354
  • 0.3355
  • 0.3358
  • 0.3356
  • 0.3355
  • 0.4341
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 10.5114
  • 10.5116
  • 10.5072
  • 10.5121
  • 10.5079
  • 10.5099
  • 5.6079
  • 29.1083
  • 
  • Entropy of original image
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 5.9133
  • 7.2331
  • 
  • Table 12. performance metrics in case DCT technique against Hard Speckle attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.2662
  • 0.2762
  • 0.2803
  • 0.2823
  • 0.2960
  • 0.2812
  • 0.7704
  • 0.7911
  • 
  • MSE
  • 4.2233e+03
  • 4.2152e+03
  • 4.2121e+03
  • 4.2141e+03
  • 4.2171e+03
  • 4.2070e+03
  • 15819
  • 15388
  • 
  • PSNR
  • 11.8743
  • 11.8826
  • 11.8858
  • 11.8837
  • 11.8807
  • 11.8911
  • 6.1391
  • 6.2590
  • 
  • R
  • 0.3326
  • 0.338
  • 0.3334
  • 0.3349
  • 0.3337
  • 0.3351
  • 0.1545
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 10.6046
  • 10.6249
  • 10.6235
  • 10.6057
  • 10.6348
  • 10.6167
  • 28.221
  • 29.1083
  • 
  • Entropy of original image
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 7.2638
  • 7.2331
  • 
  • Table 13. performance metrics in case DWT technique against Hard Speckle attack for image (1)
  • Metrics
  • Chirikov
  • Chirikovtan
  • Henon
  • Ikeda
  • Logistic
  • Quadratic
  • Refrence no.(14) without using filter
  • Refrence no.(14) with using median filter
  • 
  • Elapsed time
  • 0.2662
  • 0.2762
  • 0.2803
  • 0.2823
  • 0.2960
  • 0.2812
  • 0.6259
  • 0.7911
  • 
  • MSE
  • 4.2233e+03
  • 4.2152e+03
  • 4.2121e+03
  • 4.2141e+03
  • 4.2171e+03
  • 4.2070e+03
  • 10495
  • 15388
  • 
  • PSNR
  • 11.8743
  • 11.8826
  • 11.8858
  • 11.8837
  • 11.8807
  • 11.8911
  • 7.9209
  • 6.2590
  • 
  • R
  • 0.3326
  • 0.338
  • 0.3334
  • 0.3349
  • 0.3337
  • 0.3351
  • 0.4341
  • 0.1846
  • 
  • NPCR
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 5.0863e-04
  • 0.00074
  • 0.00074
  • 
  • UACI
  • 10.6046
  • 10.6249
  • 10.6235
  • 10.6057
  • 10.6348
  • 10.6167
  • 5.6079
  • 29.1083
  • 
  • Entropy of original image
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 6.9219
  • 5.9133
  • 7.2331
  • 
  • 
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Discrete Cosine Transform (DCT) Discrete Wavelet Transform (DWT) Inverse Discrete Cosine Transform (IDCT) Inverse Discrete Wavelet Transform (IDWT) Data Encryption Standard(DES) Data Encryption Standard(TRIPLE DES) Advanced Encryption Standard(AES).

Powered by PhDFocusTM