Entropy (Sep 2022)

Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM

  • Heping Wen,
  • Zefeng Chen,
  • Jiehong Zheng,
  • Yiming Huang,
  • Shuwei Li,
  • Linchao Ma,
  • Yiting Lin,
  • Zhen Liu,
  • Rui Li,
  • Linhao Liu,
  • Wenxing Lin,
  • Jieyi Yang,
  • Chongfu Zhang,
  • Huaide Yang

DOI
https://doi.org/10.3390/e24101332
Journal volume & issue
Vol. 24, no. 10
p. 1332

Abstract

Read online

In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient. Then, the chaotic sequence is used to encrypt the LF coefficient with the structure of “confusion-permutation”. We perform the permutation operation on HF coefficient, and we reconstruct the image of the processed LF coefficient and HF coefficient to obtain the frequency-domain ciphertext image. Finally, the ciphertext is dynamically diffused using the chaotic sequence to obtain the final ciphertext. Theoretical analysis and simulation experiments show that the algorithm has a large key space and can effectively resist various attacks. Compared with the spatial-domain algorithms, this algorithm has great advantages in terms of computational complexity, security performance, and encryption efficiency. At the same time, it provides better concealment of the encrypted image while ensuring the encryption efficiency compared to existing frequency-domain methods. The successful implementation on the embedded device in the optical network environment verifies the experimental feasibility of this algorithm in the new network application.

Keywords