Haar wavelet transformation and RC4 algorithm based Image Encryption

Recently the protection and privacy of information or data have become a major concern to deal with. Developed coding for secure transmission and decrypting the image are steadily more needed for specific military, corrective, country defense, and various applications. Variance sorts of security information or data increment strategies are being created as of now, cryptographic systems are one basic path. Keep the message private by translating data or information into an alternative frame, such that the message is not perceivable. This study aims to expect the security image arrangement to be upgraded by following the Haar wavelet transformation and the RC4 encryption algorithm. For simplicity, the Image compression executed by Haar wavelet transformation to compress the image and to calculate high-speed performance. For image protection process, the RC4 encryption algorithm is applied that is also for secure image transformation.

___

  • P. Irfan, Y. Prayudi, and I. Riadi, “Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman ( RSA ),” Int. J. Comput. Appl., vol. 123, no. 6, pp. 11–16, 2015.
  • K. Patel and S. Belani, “Image encryption using different techniques: A review,” Int. J. Emerg. Technol., vol. 1, no. 1, pp. 30–34, 2011.
  • P. Irfan, Y. Prayudi, and I. Riadi, “Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman ( RSA ),” Int. J. Comput. Appl., vol. 123, no. 6, pp. 11–16, 2015.
  • K. Patel and S. Belani, “Image encryption using different techniques: A review,” Int. J. Emerg. Technol. …, vol. 1, no. 1, pp. 30–34, 2011.
  • M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, “A modified AES based algorithm for image encryption,” World Acad. Sci. Eng. Technol., vol. 1, no. 1, pp. 70–75, 2007.
  • S. Sasidharan and D. S. Philip, “A Fast Partial Encryption Scheme with Wavelet Transform and RC4,” Int. J. Adv. Eng. Technol., vol. 1, no. 4, pp. 322–331, 2011.
  • R. Kumar, B. Pratap, and V. Singh, “Image Encryption Using a Combinantion of Haar and Dna Algorithm,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 3, no. 5, pp. 82–87, 2014.
  • A. Dixit, P. Dhurve, and D. Bhagwan, “Image Encryption using Permutation and Rotation XOR Technique,” vol. 2, no. 4, 2012.
  • M. Rathee and A. Vij, “Image Compression Using Discrete HAAR Wavelet Transform,” Int. J. Eng. Innov. Technol., vol. 3, no. 12, pp. 47–51, 2014.
  • S. . Tamboli and V. . Udupi, “Image Compression Using HAAR Wavelet Transform,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 2, no. 8, pp. 3166–3170, 2013.
  • P. Jindal and B. Singh, “RC4 Encryption-A Literature Survey,” Procedia Comput. Sci., vol. 46, no. Icict 2014, pp. 697–705, 2015.
  • S. Tedmori and N. Al-Najdawi, “Image cryptographic algorithm based on the Haar wavelet transform,” Inf. Sci. (Ny)., vol. 269, no. March, pp. 21–34, 2014.
  • Q. Zhang, X. Xue, and X. Wei, “A novel image encryption algorithm based on DNA subsequence operation.,” ScientificWorldJournal., vol. 2012, p. 286741, 2012.
  • A. Jolfaei, “Image Encryption Using Chaos and Block Cipher,” Comput. Inf. Sci., vol. 4, no. 1, pp. 172–185, 2011.
  • Z. H. Guan, F. Huang, and W. Guan, “Chaos-based image encryption algorithm,” Phys. Lett. A, vol. 346, no. 1–3, pp. 153–157, 2005.
  • X. Wang, J. Zhao, and H. Liu, “A new image encryption algorithm based on chaos,” Opt. Commun., vol. 285, no. 5, pp. 562–566, 2012.
  • S. Ahadpour, Y. Sadra, and M. Sadeghi, “Image Encryption Based On Gradient Haar Wavelet and Rational Order Chaotic Maps,” vol. 1, no. 1, pp. 1–8, 2016.