Open Access Open Access  Restricted Access Subscription Access

Encryption of Images and Signals Using Wavelet Transform and Permutation Algorithm


Affiliations
1 College of Engineering/ Elect. Eng. Department, Babylon University, Hilla, Iraq
 

In this paper, a new method to encrypt the signals with one dimension and images(monochrome or color images) in a time more less than if these signals and images are encrypted with their original sizes This method depends on extracting the important features which are distinguished these signals and images and then discarding them. The next step is encrypting the lowest dimensions of these data. Discrete Wavelet transform (DWT) is used as a feature extraction because it is a powerful tool of signal processing for it’s multiresolutional possibilities. The chosen data is encrypted with one of conventional cryptographic algorithm (Permutation algorithm) after shrinking it’s dimension using suitable encryption key. The encrypted data is 100% unrecognized, besides, the decryption algorithm returned the encrypted data to it’s original dimension efficiently.

Keywords

Cryptography, DWT, Permutation, Shrinking.
User
Notifications
Font Size

Abstract Views: 226

PDF Views: 0




  • Encryption of Images and Signals Using Wavelet Transform and Permutation Algorithm

Abstract Views: 226  |  PDF Views: 0

Authors

Ibtisam A. Aljazaery
College of Engineering/ Elect. Eng. Department, Babylon University, Hilla, Iraq

Abstract


In this paper, a new method to encrypt the signals with one dimension and images(monochrome or color images) in a time more less than if these signals and images are encrypted with their original sizes This method depends on extracting the important features which are distinguished these signals and images and then discarding them. The next step is encrypting the lowest dimensions of these data. Discrete Wavelet transform (DWT) is used as a feature extraction because it is a powerful tool of signal processing for it’s multiresolutional possibilities. The chosen data is encrypted with one of conventional cryptographic algorithm (Permutation algorithm) after shrinking it’s dimension using suitable encryption key. The encrypted data is 100% unrecognized, besides, the decryption algorithm returned the encrypted data to it’s original dimension efficiently.

Keywords


Cryptography, DWT, Permutation, Shrinking.