SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 6, December 2020, pp. 3080~3087
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i6.16384  3080
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Improved anti-noise attack ability of image encryption
algorithm using de-noising technique
Mohanad Najm Abdulwahed, Ali kamil Ahmed
Department of Materials, University of Technology, Iraq
Article Info ABSTRACT
Article history:
Received Apr 4, 2020
Revised May 18, 2020
Accepted Jun 25, 2020
Information security is considered as one of the important issues in the
information age used to preserve the secret information throughout transmissions
in practical applications. With regard to image encryption, a lot of schemes
related to information security were applied. Such approaches might be
categorized into 2 domains; domain frequency and domain spatial. The presented
work develops an encryption technique on the basis of conventional
watermarking system with the use of singular value decomposition (SVD),
discrete cosine transform (DCT), and discrete wavelet transform (DWT)
together, the suggested DWT-DCT-SVD method has high robustness in
comparison to the other conventional approaches and enhanced approach for
having high robustness against Gaussian noise attacks with using denoising
approach according to DWT. Mean square error (MSE) in addition to the peak
signal-to-noise ratio (PSNR) specified the performance measures which are the
base of this study’s results, as they are showing that the algorithm utilized in this
study has high robustness against Gaussian noise attacks.
Keywords:
DCT
DWT
Gaussian noise
Image encryption
Image processing
SVD
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mohanad Najm Abdulwahed
Department of Materials,
University of Technology,
Baghdad, Iraq.
Email: mohanad.najm@yahoo.com
1. INTRODUCTION
Image processing is defined as certain mathematical operations with the use of signal processing,
where the input might be image, picture, image collection, video or photo frame, while image processing’s
output might be image or set of image-associated parameters or features [1-3]. A lot of image processing
approaches involves view the images as two-dimesional (2D) signal as well as utilizing standard approaches
for signal processing. The image encryption methods might be categorized into 2 groups on the basis of
frequency domain and spatial domain operations [4]. The latter work in spatial domain, encrypted artifacts
have been the intensity and position of pixels, whereas the former is in frequency domain is frequency
coefficients. The earlier encryption approaches are operating in spatial domain. The techniques related to
spatial domain image-encryption are requiring a lot of computations [5].
Generally, some transformation approaches including discrete wavelet transform (DWT) and discrete
cosine transform (DCT) have been utilized in the approaches of image encryption on the basis of transform
domain. In comparison to conventional discrete Fourier transform (DFT), the DCT is avoiding complex
computations, also the DWT might be obtaining strong input image localization features in frequency and
spatial domain. The drawbacks of double random phase encryption (DRPE) are recognized, also it is indicated
that the digital watermarking has increased robustness in frequency domain, also it might be exploiting the
TELKOMNIKA Telecommun Comput El Control 
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3081
benefits of transform approaches [4]. The major workflow regarding digital watermarking has been close to
decryption and encryption of image in which it is hiding original (secret) image to the host image. Specifying
the efficiency of image encryption approaches has been of high important with the use of digital watermarking
methods [6]. It has been indicated that the strategies of image denoising might be filtering out the image noises
throughout image’s pre-processing; in the case when such approach might be utilized in developing approaches
of image encryption, anti-attack capability of such approach against the noise attacks is going to be enhanced;
furthermore, robustness regarding such approach is going to be enhanced [7, 8].
The presented study develops DWT-DCT-SVD (singular value decomposition) based approach of the
image encryption according to digital watermarking approaches; the results are showing that the developed
approach has the ability for resisting the majority of attacks; the effectiveness of the suggested scheme has
been however inacceptable in terms of Gaussian noise attacks. Therefore, the study will specify utilizing the
image denoising for boosting anti-attack ability against the noise attacks.
2. SINGULAR VALUE DECOMPOSITION (SVD)
SVD can be defined as matrix transformation approach that depends on the eigenvalue. Each one of
the images could be provided as matrix, SVD might be decomposing the matrix to sum of various matrices.
Also, SVD isn’t associated to transformation between frequency and spatial domain, yet image’s singular value
has excellent stability; also, it is typically combining with the transform algorithms in the field of image
processing. In the case when disturbances are applied to an image, singular value won’t be too much modified.
Also, matrix’s singular vector has invariance in terms of rotation, translation, and so on. Thus, singular value
might efficiently reflect the matrix’s properties. In the case when being utilized to image’s matrix, singular
value in addition to its spanned vector space regarding the image might be reflecting various features and
components of image. Image’s algebraic characteristics might be specified, also SVD has been majorly utilized
in the image processing. Due to its rotation invariance and stability, the majority of present algorithms of image
encryption have been on the basis of SVD that have elevated robustness [9-11]. An excellent approach for
computing eigenvectors and eigenvalues of data matrix X (KxM) has been with the use of SVD specified as
follows [12]:
𝑋 = [
𝑥1 𝑥2 … … … … 𝑥 𝑀
𝑥 𝑀+1 𝑥 𝑀+2 … … … 𝑥2𝑀
𝑥(𝐾−1)𝑀+1 𝑥(𝐾−1)𝑀+2……. 𝑥 𝐾𝑀
] (1)
The theorem of SVD indicating that ^xM matrix X might be decomposed to the next matrices’ product:
𝑋 = 𝑈∑𝑉∗ 𝑇
(2)
In which U representing K x K orthonormal matrix which contain left singular vectors that are arranged
column wise
𝑈 = [
1 1 … … 1
𝑢1 𝑢2 … … 𝑢 𝐾
1 1 … … 1
] (3)
V representing M x M orthonormal matrix related to the right singular vectors,
𝑉 = [
1 1 … … 1
𝑣1 𝑣2 … … 𝑣 𝐾
1 1 … … 1
] (4)
while ∑ representing K xM matrix regarding the nonnegative real singular values:
∑ =
[
𝜎1 0 0
0 𝜎2 0
. . . .
. . . .
. . . .
0 0 𝜎 𝑀
0 0 0
. . . .
. . . .
. . . .
0 0 0 ]
(5)
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087
3082
Due to such SVD’s properties, in the past two years, some watermarking calculations were suggested
with regard to such system. The major concept of such approach has been discovering the cover image’s SVD
and then changing its solitary qualities for installing watermark. A few of the SVD-based calculations have
been specified as SVD-situated, it might be indicated that the lone SVD area has been applied for implanting
watermark to picture. Recently, a few of half and half SVD-based calculations were suggested, in which
the different types of changes space involving DCT, DWT, and fast Hadamard transform. were used for
inserting the watermark to picture [13].
3. DCT TRANSFORM
This approach has solid energy concentration properties in the low frequency part following a
transform. Also, signal’s statistical characteristics has been close to the process of Markov, DCT’s
de-correlated performance has been close to the performance regarding K-L transform; the latter provided
optimum de-correlated performance, thus DCT has been majorly utilized in the image processing like image
encryption and image compression. In comparison to DFT, computations in the DCT have been in the real
domain, eliminating the complex operations as well as enhancing speed. Also, DCT has rotation, translation,
and scaling invariance related to Fourier transform that might be efficiently resisting the geometric attacks.
Due to such benefits, DCT has excellent performance in image encryption field and was utilized recently in a
lot of studies [13, 14].
Changes in discrete cosine has been a process to change flag to rudimentary recurrence parts. Also, it
is dealing with the picture as entirety of sinusoids related to frequencies and fluctuating extents. With regard
to the information picture, x, the DCT coefficients for changed yield picture, y, have been processed as shown
in (5). Furthermore, x, representing info imagehaving N x M pixels, x(m,n) has been pixel’s power in push m,
also segment n related to picture, y(u,v) representing DCT coefficient in the push u, while the section v of DCT
network [15, 16].
𝑦(𝑢, 𝑣) = √
2
𝑀
√
2
𝑁
𝛼 𝑢 𝛼 𝑣 ∑ ∑ 𝑥(𝑚, 𝑛) cos
(2𝑚 + 1)𝑢𝜋
2𝑀
𝑁−1
𝑣=0
𝑀−1
𝑢=0
cos
(2𝑛 + 1)𝑣𝜋
2𝑁
(6)
An image has been re-constructed via using the inverse DCT operation as show in (6):
𝑥(𝑚, 𝑛) = √
2
𝑀
√
2
𝑁
∑ ∑ 𝛼 𝑢 𝛼 𝑣 𝑦(𝑢, 𝑣) cos
(2𝑚 + 1)𝑢𝜋
2𝑀
𝑁−1
𝑣=0
𝑀−1
𝑢=0
cos
(2𝑛 + 1)𝑣𝜋
2𝑁
(7)
4. DISCRETE WAVELET TRANSFORM (DWT)
The wavelets have been utilized in image processing for compression, watermarking, sample edge
detection, coding and denoising of the interesting features with regard to subsequent classification. The next
sub-sections are discussing the denoising of image through thresholding DWT coefficients [17-20].
4.1. DWT of image data
Images are provided as 2D coefficients’ array. Each one of the coefficients are representing that
point’s brightness degree. The majority of the herbal photographs are showing the smooth coloration variations
with optimum details representing sharp edges from simple versions. The clean variations in coloration might
be labelled as low-frequency versions, in which the pointy variations might be labelled as excessive-frequency
versions. Also, low-frequency components (for instance, smooth versions) are showing the photographs’ base,
in which excessive-frequency components (for instance edges providing the details) have been uploaded upon
low-frequency components for refining the image, thus creating in-depth images. Also, the easy versions have
been significant in comparison to details. A lot of approaches might be utilized for differentiating between
the photograph information and easy variations. An example of such approaches has been picture
decomposition through DWT re-modeling. Various levels of de-composition related to DWT can be seen in
the Figure 1.
4.2. Image’s inverse DWT
Various data classes have been collected to re-constructed image with the use of reverse wavelet
transform. Also, pair of the low and high-pass filters have been utilized throughout the process of
re-construction. The filters have been indicated to as synthesis filter pair. The process of filtering has been
TELKOMNIKA Telecommun Comput El Control 
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3083
the opposite of transformation; the process is starting from highest level. Furthermore, filters have been initially
utilized column-wise, after that row-wise level by level till reaching lowest level.
(a) (b) (c)
Figure 1. DWT Decomposition levels; (a) single level decomposition, (b) two level decomposition,
(c) three level decomposition
5. STRATEGIES OF IMAGE DENOISING UTILIZING DWT
With regard to digital image processing, images are sometimes attacked via different noises and
the image’s quality is going to be reduced; if the image noise might be efficiently filtered out or not, it is going
to be affecting subsequent processing like image decryption, edge detection, object segmentation, and feature
extraction [21, 22]. With regard to digital image processing, images are sometimes attacked via different noises
and the image’s quality is going to be reduced; if the image noise might be efficiently filtered out or not, it is
going to be affecting subsequent processing like image decryption, edge detection, object segmentation, and
feature extraction [21, 22]. The next phases are describing the process of image denoising.
- DWT related to a noisy image will be estimated.
- After the DWT representation done, de-noising is done using soft-thresholding by modified universal
threshold estimation (MUTE). Providing ambient noise is a colored, a threshold dependent on level applied
to each level of frequency was proposed in [7, 23]. The value of threshold applied to the coefficients of
estimated time-frequency using MUTE [23] is expressed as:
𝜆 𝑘 = 𝑐. 𝜎 𝑣,𝑘√2log (𝑁) (8)
where N is length of signal, 𝜎 𝑣, 𝑘 is noise estimated standard deviation for level k, and c is the (modified
universal threshold factor) 0<𝑐<1. The noise variance will be computed with the use of the next robust
median estimator:
𝜎𝑣 =
𝑚𝑒𝑑𝑖𝑎𝑛(|𝑋 𝐷(𝑛, 𝑘)|)
0.6745
(9)
In which 𝑋 𝐷(𝑛, 𝑘) representing all coefficients related to wavelet details in level k [24].
- Soft threshold will be utilized to sub-band coefficients with regard to each of the sub-bands, excluding
low-pass or approximation sub-band [25].
𝑋 𝐷,𝛾(𝑛, 𝑘) = {
𝑠𝑔𝑛(𝑋 𝐷(𝑛, 𝑘))(|𝑋 𝐷(𝑛, 𝑘)| − 𝛾 𝑘) 𝑖𝑓|𝑋 𝐷(𝑛, 𝑘)| > 𝛾 𝑘
0 𝑖𝑓|𝑋 𝐷(𝑛, 𝑘)| ≤ 𝛾 𝑘
(10)
In which 𝛾 𝑘 representing threshold value in the level k, also 𝑋 𝐷,𝛾(𝑛, 𝑘) representing wavelet detail
coefficients following the process of thresholding in level k.
- Image has been re-constructed through using inverse DWT for obtaining denoised image. Figure 2 showing
the data flow diagram related to the denoising process of an image.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087
3084
Figure 2. Data flow diagram of image denoising
6. ENCRYPTION TECHNIQUES ACCORDING TO DWT-DCT-SVD THROUGH UTILIZING
DENOISING APPROACHES USING DWT
On the basis of the presented DWT-DCT-SVD encryption techniques with the use of normal image
as host image, using the approaches of denoising prior to image decryption for enhancing the anti-attack
capability related to such approach against noise attacks. Also, new workflow has been shown in the Figure 3.
According to the Figure 3, the processes of encryption and decryption might be provided in the following way:
- Step 1: Selecting original and host images of same size;
- Step 2: Utilizing DWT to the two image, also getting 4 sub-bands for each one of the images; following
utilizing DCT on the sub-bands, applying SVD for each one of the sub-bands and composed the coincident
sub-bands towards original and host images; after that, applying the inverse-DWT as well as the inverse-DCT
for getting encrypted image, such process might be treated as DWT-DCT-SVD encryption approach;
- Step 3: Through the encrypted image’s transmission, it might be attacked through the noising attacks; using
conventional denoising approaches or the linear CNN model-based approach for filtering attacked
encrypted image;
- Step 4: Encrypted image is going to be decrypted, also the process of decryption is going to be handled as
encryption’s inverse procedure; after that, getting the decrypted image.
Figure 3. Suggested model
7. PERFORMANCE MEASURES
The common measurement parameters with regard to the reliability of image involves mean absolute
error, normalized mean square error (NMSE), mean square error (MSE), and peak signal-to-noise ratio
(PSNR). SNR over 40 dB offers optimum quality of the image which is close to original image; SNR with
30-40 dB generally producing excellent quality of the image with adequate distortions; SNR with 20-30 dB
presenting bad quality of the image; SNR not more than 20 dB generating undesirable image [26]. Furthermore,
the calculation approaches for NMSE and PSNR [27] have been provided in the following way:
(11)
In which MSE representing MSE between original image (𝑥) as well as denoised image (𝑥̂) with size M×N:
(12)
TELKOMNIKA Telecommun Comput El Control 
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3085
8. RESULTS AND DISCUSSIONS
This study utilized 2 distinctive algorithms with regard to digital image’s watermarking, also for each
one of the schemes, there are 3 types of results as follows:
- The image watermarking/dewater marking with no image attack.
- The image watermarking/dewater marking with the Gaussian noise image attack.
With regard to all the sets of images, there have been 3 results related to each algorithm. The recover
image’s quality has been estimated via MSE and PSNR. High PSNR values representing higher quality related
to the recover image because of small errors in the algorithm of image extraction. Also, the MSE near zeros is
the similarity measure between 2 images. The study selected image camerman for showing the results.
Decrypted and encrypted images can be seen in Figure 4. According to the results, it can be seen that
the encrypted image has been comparable to host image. Put differently, secret image’s information was
successfully hidden in encrypted image. With regard to the decrypted image, it can be indicated that the secret
image’s details are visible, also specifying that all the 4 results are meeting the expectations, also the encryption
approach on the basis of DWT-DCT-SVD system is of adequate performance.
(a) (b)
(c) (d)
Figure 4. Results for algorithm one image encryption with no noise attack;
(a) host image, (b) original image, (c) encrypted image, (d) decrypted image
The study utilized the DCT-DWT-SVD noise algorithm on the host image for watermarking original
image. After that, the Gaussian image with the variance attacks has been applied to the watermark image, also
it has been dewater marked and the extracted watermarked image can be seen in the Figure 5. Table 1, showing
the suggested method’s performance on the noise power with variance 0.1 on the basis of Daubechies wavelet
biases in comparison to the case with no noise attack. The values of MSE and PSNR have been estimated
according to noise power value.
Table 1. Performance on the noise power with variance 0.1 on the basis of Daubechies wavelet biases in
comparison to the case with no noise attack
Case PSNR MSE
No Attack 212 0.00
3 42.30 0.008
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087
3086
(a) (b) (c)
(d) (e) (f)
Figure 5. Image encryption results with the Gaussian noise attack;
(a) host image, (b) original image, (c) encrypted image, (d) gaussian noise encrypted image,
(e) encrypted image after denoising, (f) decrypted image denoising
9. CONCLUSIONS
The results of this study are suggesting that the DCT-DWT-SVD based watermarking approach as
well as the denoising algorithm utilizing DWT has been providing optimum performance in the existence of
watermark image’s recovery that has been attacked via Gaussian noise. Results have been analytically verified
with regard to MSE and PSNR, also the two have been high for new DCT-DWT-SVD watermarking system.
REFERENCES
[1] M. Sharkas, D. ElShafie, and N. Hamdy, "A Dual Digital-Image Watermarking Technique," The Third World
Enformatika Conference, pp. 136-139, April 2005.
[2] O. Omoruyi, et al., "Evaluation of the quality of an image encrytion scheme," TELKOMNIKA Telecommunication
Computing Electronics and Control, vol. 17, no. 6, pp. 2968-2974, December 2019.
[3] E. H. Rachmawanto, et al., "An improved security and message capacity using AES and Huffman coding on
image steganography," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 5, pp.
2400-2409, October 2019.
[4] Z. Liu, "Comparative evaluations of image encryption algorithms," Auckland University of Technology, 2018.
[5] Z. Liu, et al., "Double image encryption by using Arnold transform and discrete fractional angular transform," Optics
and Lasers in Engineering, vol. 50, no. 2, pp. 248-255, February 2012.
[6] N. Divecha and N. Jani, "Implementation and performance analysis of DCT-DWT-SVD based watermarking
algorithms for color images," 2013 International Conference on Intelligent Systems and Signal Processing (ISSP),
pp. 204-208, March 2013.
[7] Y. Y. Al-Aboosi, R. S. Issa, and A. khalid Jassim, "Image denosing in underwater acoustic noise using discrete
wavelet transform with different noise level estimation," TELKOMNIKA Telecommunication, Computing,
Electronics and Control, vol. 18, no. 3, pp. 1439-1446, June 2020.
[8] R. Thillainayagi and K. Senthil Kumar, "Combination of wavelet transform and singular value decomposition-based
contrast enhancement technique for target detection in UAV reconnaissance thermal images," Journal of Modern
Optics, vol. 66, no. 3, pp. 606-617, January 2019.
[9] N. M. Makbol, B. E. Khoo, and T. H. Rassem, "Block-based discrete wavelet transform-singular value decomposition
image watermarking scheme using human visual system characteristics," IET Image processing, vol. 10, no. 1,
pp. 34-52, 2016.
TELKOMNIKA Telecommun Comput El Control 
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3087
[10] A. Mansouri, A. M. Aznaveh, and F. T. Azar, "SVD-based digital image watermarking using complex wavelet
transform," Sadhana, vol. 34, no. 3, pp. 393-406, June 2009.
[11] L. Novamizanti, G. Budiman, and E. N. F. Astuti, "Robust audio watermarking based on transform domain and
SVD with compressive sampling framework," TELKOMNIKA Telecommunication, Computing, Electronics and
Control, vol. 18, no. 2, pp. 1079-1088, April 2020.
[12] Handito, Kurniawan Wira, et al., "The comparison between SVD-DCT and SVD-DWT digital image
watermarking," International Conference on Data and Information Science. IOP Conf. Series: Journal of Physics:
Conf. Series, vol. 971. 2017.
[13] Zhang, Lina, and Deyun Wei, "Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm
optimization," Multimedia Tools and Applications, vol. 78, pp. 28003-28023, 2019.
[14] L. Novamizanti, G. Budiman, and I. Safitri, "Modified DCT-based audio watermarking optimization using genetics
algorithm," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 16, no. 6, pp. 2651-2660,
December 2018.
[15] K. R. Rao and P. Yip, "Discrete cosine transform: algorithms, advantages, applications," Academic Press
Professional, August 1990.
[16] G. Budiman, L. Novamizanti, and I. Iwut, "Genetics algorithm optimization of DWT-DCT based image
Watermarking," Journal of Physics: Conference Series, vol. 795, no. 1, pp. 012039, February 2017.
[17] M. Misiti, et al., "Wavelet toolbox," The MathWorks Inc., Natick, MA, vol. 15, pp. 21, 1996.
[18] D. Gupta and S. Choubey, "Discrete wavelet transform for image processing," International Journal of Emerging
Technology and Advanced Engineering, vol. 4, pp. 598-602, 2015.
[19] D. Baleanu, "Advances in wavelet theory and their applications in engineering, physics and technology," BoD–Books
on Demand, 2012.
[20] W. S. Sari, E. H. Rachmawanto, and C. A. Sari, "A Good Performance OTP encryption image based on
DCT-DWT steganography," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 15, no. 4,
pp. 1987-1995, December 2017.
[21] M. N. Abdulwahed and A. kamil Ahmed, "Underwater image de-nosing using discrete wavelet transform and
pre-whitening filter," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 16, no. 6, pp.
2622-2629, December 2018.
[22] C. Kumar, G. Sai, R. K. Kumar, G. A. Naidu, and J. Harikiran, "Noise removal in microarray images using
variational mode decomposition technique," TELKOMNIKA Telecommunication Computing Electronics and
Control, vol. 15, no. 4, pp. 1750-1756, December 2017.
[23] D. L. Donoho, "De-noising by soft-thresholding," IEEE transactions on information theory, vol. 41, pp. 613-627, 1995.
[24] I. M. Johnstone and B. W. Silverman, "Wavelet threshold estimators for data with correlated noise," Journal of the
royal statistical society: series B (statistical methodology), vol. 59, pp. 319-351, 1997.
[25] R. Aggarwal, et al., "Noise reduction of speech signal using wavelet transform with modified universal threshold,"
International Journal of Computer Applications, vol. 20, no. 5, pp. 14-19, April 2011.
[26] C. Tan, G. Seet, A. Sluzek, and D. He, "A novel application of range-gated underwater laser imaging system (ULIS)
in near-target turbid medium," Optics and Lasers in Engineering, vol. 43, no. 9, pp. 995-1009, September 2005.
[27] J. Ellinas, T. Mandadelis, A. Tzortzis, and L. Aslanoglou, "Image de-noising using wavelets," TEI of Piraeus Applied
Research Review, vol. 9, pp. 97-109, 2004.

More Related Content

What's hot

A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsIJORCS
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...IOSR Journals
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionIRJET Journal
 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...csandit
 
2013 1-2-07-salina
2013 1-2-07-salina2013 1-2-07-salina
2013 1-2-07-salinashruti jain
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionVartika Sharma
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...VLSICS Design
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Journals
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...IRJET Journal
 
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATION
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATIONFAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATION
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATIONijma
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398editorgadl
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTIJSRD
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScsitconf
 

What's hot (18)

A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression Algorithms
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...
 
2013 1-2-07-salina
2013 1-2-07-salina2013 1-2-07-salina
2013 1-2-07-salina
 
B04 07 0614
B04 07 0614B04 07 0614
B04 07 0614
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
A280108
A280108A280108
A280108
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATION
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATIONFAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATION
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATION
 
H010315356
H010315356H010315356
H010315356
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWT
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
 

Similar to Improved anti-noise attack ability of image encryption algorithm using de-noising technique

DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression techniqueTELKOMNIKA JOURNAL
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET Journal
 
Near Reversible Data Hiding Scheme for images using DCT
Near Reversible Data Hiding Scheme for images using DCTNear Reversible Data Hiding Scheme for images using DCT
Near Reversible Data Hiding Scheme for images using DCTIJERA Editor
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeiaemedu
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Similar to Improved anti-noise attack ability of image encryption algorithm using de-noising technique (20)

DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
G0523444
G0523444G0523444
G0523444
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression technique
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A0360105
A0360105A0360105
A0360105
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
 
Near Reversible Data Hiding Scheme for images using DCT
Near Reversible Data Hiding Scheme for images using DCTNear Reversible Data Hiding Scheme for images using DCT
Near Reversible Data Hiding Scheme for images using DCT
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 

Recently uploaded (20)

Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 

Improved anti-noise attack ability of image encryption algorithm using de-noising technique

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 3080~3087 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i6.16384  3080 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Improved anti-noise attack ability of image encryption algorithm using de-noising technique Mohanad Najm Abdulwahed, Ali kamil Ahmed Department of Materials, University of Technology, Iraq Article Info ABSTRACT Article history: Received Apr 4, 2020 Revised May 18, 2020 Accepted Jun 25, 2020 Information security is considered as one of the important issues in the information age used to preserve the secret information throughout transmissions in practical applications. With regard to image encryption, a lot of schemes related to information security were applied. Such approaches might be categorized into 2 domains; domain frequency and domain spatial. The presented work develops an encryption technique on the basis of conventional watermarking system with the use of singular value decomposition (SVD), discrete cosine transform (DCT), and discrete wavelet transform (DWT) together, the suggested DWT-DCT-SVD method has high robustness in comparison to the other conventional approaches and enhanced approach for having high robustness against Gaussian noise attacks with using denoising approach according to DWT. Mean square error (MSE) in addition to the peak signal-to-noise ratio (PSNR) specified the performance measures which are the base of this study’s results, as they are showing that the algorithm utilized in this study has high robustness against Gaussian noise attacks. Keywords: DCT DWT Gaussian noise Image encryption Image processing SVD This is an open access article under the CC BY-SA license. Corresponding Author: Mohanad Najm Abdulwahed Department of Materials, University of Technology, Baghdad, Iraq. Email: mohanad.najm@yahoo.com 1. INTRODUCTION Image processing is defined as certain mathematical operations with the use of signal processing, where the input might be image, picture, image collection, video or photo frame, while image processing’s output might be image or set of image-associated parameters or features [1-3]. A lot of image processing approaches involves view the images as two-dimesional (2D) signal as well as utilizing standard approaches for signal processing. The image encryption methods might be categorized into 2 groups on the basis of frequency domain and spatial domain operations [4]. The latter work in spatial domain, encrypted artifacts have been the intensity and position of pixels, whereas the former is in frequency domain is frequency coefficients. The earlier encryption approaches are operating in spatial domain. The techniques related to spatial domain image-encryption are requiring a lot of computations [5]. Generally, some transformation approaches including discrete wavelet transform (DWT) and discrete cosine transform (DCT) have been utilized in the approaches of image encryption on the basis of transform domain. In comparison to conventional discrete Fourier transform (DFT), the DCT is avoiding complex computations, also the DWT might be obtaining strong input image localization features in frequency and spatial domain. The drawbacks of double random phase encryption (DRPE) are recognized, also it is indicated that the digital watermarking has increased robustness in frequency domain, also it might be exploiting the
  • 2. TELKOMNIKA Telecommun Comput El Control  Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed) 3081 benefits of transform approaches [4]. The major workflow regarding digital watermarking has been close to decryption and encryption of image in which it is hiding original (secret) image to the host image. Specifying the efficiency of image encryption approaches has been of high important with the use of digital watermarking methods [6]. It has been indicated that the strategies of image denoising might be filtering out the image noises throughout image’s pre-processing; in the case when such approach might be utilized in developing approaches of image encryption, anti-attack capability of such approach against the noise attacks is going to be enhanced; furthermore, robustness regarding such approach is going to be enhanced [7, 8]. The presented study develops DWT-DCT-SVD (singular value decomposition) based approach of the image encryption according to digital watermarking approaches; the results are showing that the developed approach has the ability for resisting the majority of attacks; the effectiveness of the suggested scheme has been however inacceptable in terms of Gaussian noise attacks. Therefore, the study will specify utilizing the image denoising for boosting anti-attack ability against the noise attacks. 2. SINGULAR VALUE DECOMPOSITION (SVD) SVD can be defined as matrix transformation approach that depends on the eigenvalue. Each one of the images could be provided as matrix, SVD might be decomposing the matrix to sum of various matrices. Also, SVD isn’t associated to transformation between frequency and spatial domain, yet image’s singular value has excellent stability; also, it is typically combining with the transform algorithms in the field of image processing. In the case when disturbances are applied to an image, singular value won’t be too much modified. Also, matrix’s singular vector has invariance in terms of rotation, translation, and so on. Thus, singular value might efficiently reflect the matrix’s properties. In the case when being utilized to image’s matrix, singular value in addition to its spanned vector space regarding the image might be reflecting various features and components of image. Image’s algebraic characteristics might be specified, also SVD has been majorly utilized in the image processing. Due to its rotation invariance and stability, the majority of present algorithms of image encryption have been on the basis of SVD that have elevated robustness [9-11]. An excellent approach for computing eigenvectors and eigenvalues of data matrix X (KxM) has been with the use of SVD specified as follows [12]: 𝑋 = [ 𝑥1 𝑥2 … … … … 𝑥 𝑀 𝑥 𝑀+1 𝑥 𝑀+2 … … … 𝑥2𝑀 𝑥(𝐾−1)𝑀+1 𝑥(𝐾−1)𝑀+2……. 𝑥 𝐾𝑀 ] (1) The theorem of SVD indicating that ^xM matrix X might be decomposed to the next matrices’ product: 𝑋 = 𝑈∑𝑉∗ 𝑇 (2) In which U representing K x K orthonormal matrix which contain left singular vectors that are arranged column wise 𝑈 = [ 1 1 … … 1 𝑢1 𝑢2 … … 𝑢 𝐾 1 1 … … 1 ] (3) V representing M x M orthonormal matrix related to the right singular vectors, 𝑉 = [ 1 1 … … 1 𝑣1 𝑣2 … … 𝑣 𝐾 1 1 … … 1 ] (4) while ∑ representing K xM matrix regarding the nonnegative real singular values: ∑ = [ 𝜎1 0 0 0 𝜎2 0 . . . . . . . . . . . . 0 0 𝜎 𝑀 0 0 0 . . . . . . . . . . . . 0 0 0 ] (5)
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087 3082 Due to such SVD’s properties, in the past two years, some watermarking calculations were suggested with regard to such system. The major concept of such approach has been discovering the cover image’s SVD and then changing its solitary qualities for installing watermark. A few of the SVD-based calculations have been specified as SVD-situated, it might be indicated that the lone SVD area has been applied for implanting watermark to picture. Recently, a few of half and half SVD-based calculations were suggested, in which the different types of changes space involving DCT, DWT, and fast Hadamard transform. were used for inserting the watermark to picture [13]. 3. DCT TRANSFORM This approach has solid energy concentration properties in the low frequency part following a transform. Also, signal’s statistical characteristics has been close to the process of Markov, DCT’s de-correlated performance has been close to the performance regarding K-L transform; the latter provided optimum de-correlated performance, thus DCT has been majorly utilized in the image processing like image encryption and image compression. In comparison to DFT, computations in the DCT have been in the real domain, eliminating the complex operations as well as enhancing speed. Also, DCT has rotation, translation, and scaling invariance related to Fourier transform that might be efficiently resisting the geometric attacks. Due to such benefits, DCT has excellent performance in image encryption field and was utilized recently in a lot of studies [13, 14]. Changes in discrete cosine has been a process to change flag to rudimentary recurrence parts. Also, it is dealing with the picture as entirety of sinusoids related to frequencies and fluctuating extents. With regard to the information picture, x, the DCT coefficients for changed yield picture, y, have been processed as shown in (5). Furthermore, x, representing info imagehaving N x M pixels, x(m,n) has been pixel’s power in push m, also segment n related to picture, y(u,v) representing DCT coefficient in the push u, while the section v of DCT network [15, 16]. 𝑦(𝑢, 𝑣) = √ 2 𝑀 √ 2 𝑁 𝛼 𝑢 𝛼 𝑣 ∑ ∑ 𝑥(𝑚, 𝑛) cos (2𝑚 + 1)𝑢𝜋 2𝑀 𝑁−1 𝑣=0 𝑀−1 𝑢=0 cos (2𝑛 + 1)𝑣𝜋 2𝑁 (6) An image has been re-constructed via using the inverse DCT operation as show in (6): 𝑥(𝑚, 𝑛) = √ 2 𝑀 √ 2 𝑁 ∑ ∑ 𝛼 𝑢 𝛼 𝑣 𝑦(𝑢, 𝑣) cos (2𝑚 + 1)𝑢𝜋 2𝑀 𝑁−1 𝑣=0 𝑀−1 𝑢=0 cos (2𝑛 + 1)𝑣𝜋 2𝑁 (7) 4. DISCRETE WAVELET TRANSFORM (DWT) The wavelets have been utilized in image processing for compression, watermarking, sample edge detection, coding and denoising of the interesting features with regard to subsequent classification. The next sub-sections are discussing the denoising of image through thresholding DWT coefficients [17-20]. 4.1. DWT of image data Images are provided as 2D coefficients’ array. Each one of the coefficients are representing that point’s brightness degree. The majority of the herbal photographs are showing the smooth coloration variations with optimum details representing sharp edges from simple versions. The clean variations in coloration might be labelled as low-frequency versions, in which the pointy variations might be labelled as excessive-frequency versions. Also, low-frequency components (for instance, smooth versions) are showing the photographs’ base, in which excessive-frequency components (for instance edges providing the details) have been uploaded upon low-frequency components for refining the image, thus creating in-depth images. Also, the easy versions have been significant in comparison to details. A lot of approaches might be utilized for differentiating between the photograph information and easy variations. An example of such approaches has been picture decomposition through DWT re-modeling. Various levels of de-composition related to DWT can be seen in the Figure 1. 4.2. Image’s inverse DWT Various data classes have been collected to re-constructed image with the use of reverse wavelet transform. Also, pair of the low and high-pass filters have been utilized throughout the process of re-construction. The filters have been indicated to as synthesis filter pair. The process of filtering has been
  • 4. TELKOMNIKA Telecommun Comput El Control  Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed) 3083 the opposite of transformation; the process is starting from highest level. Furthermore, filters have been initially utilized column-wise, after that row-wise level by level till reaching lowest level. (a) (b) (c) Figure 1. DWT Decomposition levels; (a) single level decomposition, (b) two level decomposition, (c) three level decomposition 5. STRATEGIES OF IMAGE DENOISING UTILIZING DWT With regard to digital image processing, images are sometimes attacked via different noises and the image’s quality is going to be reduced; if the image noise might be efficiently filtered out or not, it is going to be affecting subsequent processing like image decryption, edge detection, object segmentation, and feature extraction [21, 22]. With regard to digital image processing, images are sometimes attacked via different noises and the image’s quality is going to be reduced; if the image noise might be efficiently filtered out or not, it is going to be affecting subsequent processing like image decryption, edge detection, object segmentation, and feature extraction [21, 22]. The next phases are describing the process of image denoising. - DWT related to a noisy image will be estimated. - After the DWT representation done, de-noising is done using soft-thresholding by modified universal threshold estimation (MUTE). Providing ambient noise is a colored, a threshold dependent on level applied to each level of frequency was proposed in [7, 23]. The value of threshold applied to the coefficients of estimated time-frequency using MUTE [23] is expressed as: 𝜆 𝑘 = 𝑐. 𝜎 𝑣,𝑘√2log (𝑁) (8) where N is length of signal, 𝜎 𝑣, 𝑘 is noise estimated standard deviation for level k, and c is the (modified universal threshold factor) 0<𝑐<1. The noise variance will be computed with the use of the next robust median estimator: 𝜎𝑣 = 𝑚𝑒𝑑𝑖𝑎𝑛(|𝑋 𝐷(𝑛, 𝑘)|) 0.6745 (9) In which 𝑋 𝐷(𝑛, 𝑘) representing all coefficients related to wavelet details in level k [24]. - Soft threshold will be utilized to sub-band coefficients with regard to each of the sub-bands, excluding low-pass or approximation sub-band [25]. 𝑋 𝐷,𝛾(𝑛, 𝑘) = { 𝑠𝑔𝑛(𝑋 𝐷(𝑛, 𝑘))(|𝑋 𝐷(𝑛, 𝑘)| − 𝛾 𝑘) 𝑖𝑓|𝑋 𝐷(𝑛, 𝑘)| > 𝛾 𝑘 0 𝑖𝑓|𝑋 𝐷(𝑛, 𝑘)| ≤ 𝛾 𝑘 (10) In which 𝛾 𝑘 representing threshold value in the level k, also 𝑋 𝐷,𝛾(𝑛, 𝑘) representing wavelet detail coefficients following the process of thresholding in level k. - Image has been re-constructed through using inverse DWT for obtaining denoised image. Figure 2 showing the data flow diagram related to the denoising process of an image.
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087 3084 Figure 2. Data flow diagram of image denoising 6. ENCRYPTION TECHNIQUES ACCORDING TO DWT-DCT-SVD THROUGH UTILIZING DENOISING APPROACHES USING DWT On the basis of the presented DWT-DCT-SVD encryption techniques with the use of normal image as host image, using the approaches of denoising prior to image decryption for enhancing the anti-attack capability related to such approach against noise attacks. Also, new workflow has been shown in the Figure 3. According to the Figure 3, the processes of encryption and decryption might be provided in the following way: - Step 1: Selecting original and host images of same size; - Step 2: Utilizing DWT to the two image, also getting 4 sub-bands for each one of the images; following utilizing DCT on the sub-bands, applying SVD for each one of the sub-bands and composed the coincident sub-bands towards original and host images; after that, applying the inverse-DWT as well as the inverse-DCT for getting encrypted image, such process might be treated as DWT-DCT-SVD encryption approach; - Step 3: Through the encrypted image’s transmission, it might be attacked through the noising attacks; using conventional denoising approaches or the linear CNN model-based approach for filtering attacked encrypted image; - Step 4: Encrypted image is going to be decrypted, also the process of decryption is going to be handled as encryption’s inverse procedure; after that, getting the decrypted image. Figure 3. Suggested model 7. PERFORMANCE MEASURES The common measurement parameters with regard to the reliability of image involves mean absolute error, normalized mean square error (NMSE), mean square error (MSE), and peak signal-to-noise ratio (PSNR). SNR over 40 dB offers optimum quality of the image which is close to original image; SNR with 30-40 dB generally producing excellent quality of the image with adequate distortions; SNR with 20-30 dB presenting bad quality of the image; SNR not more than 20 dB generating undesirable image [26]. Furthermore, the calculation approaches for NMSE and PSNR [27] have been provided in the following way: (11) In which MSE representing MSE between original image (𝑥) as well as denoised image (𝑥̂) with size M×N: (12)
  • 6. TELKOMNIKA Telecommun Comput El Control  Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed) 3085 8. RESULTS AND DISCUSSIONS This study utilized 2 distinctive algorithms with regard to digital image’s watermarking, also for each one of the schemes, there are 3 types of results as follows: - The image watermarking/dewater marking with no image attack. - The image watermarking/dewater marking with the Gaussian noise image attack. With regard to all the sets of images, there have been 3 results related to each algorithm. The recover image’s quality has been estimated via MSE and PSNR. High PSNR values representing higher quality related to the recover image because of small errors in the algorithm of image extraction. Also, the MSE near zeros is the similarity measure between 2 images. The study selected image camerman for showing the results. Decrypted and encrypted images can be seen in Figure 4. According to the results, it can be seen that the encrypted image has been comparable to host image. Put differently, secret image’s information was successfully hidden in encrypted image. With regard to the decrypted image, it can be indicated that the secret image’s details are visible, also specifying that all the 4 results are meeting the expectations, also the encryption approach on the basis of DWT-DCT-SVD system is of adequate performance. (a) (b) (c) (d) Figure 4. Results for algorithm one image encryption with no noise attack; (a) host image, (b) original image, (c) encrypted image, (d) decrypted image The study utilized the DCT-DWT-SVD noise algorithm on the host image for watermarking original image. After that, the Gaussian image with the variance attacks has been applied to the watermark image, also it has been dewater marked and the extracted watermarked image can be seen in the Figure 5. Table 1, showing the suggested method’s performance on the noise power with variance 0.1 on the basis of Daubechies wavelet biases in comparison to the case with no noise attack. The values of MSE and PSNR have been estimated according to noise power value. Table 1. Performance on the noise power with variance 0.1 on the basis of Daubechies wavelet biases in comparison to the case with no noise attack Case PSNR MSE No Attack 212 0.00 3 42.30 0.008
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087 3086 (a) (b) (c) (d) (e) (f) Figure 5. Image encryption results with the Gaussian noise attack; (a) host image, (b) original image, (c) encrypted image, (d) gaussian noise encrypted image, (e) encrypted image after denoising, (f) decrypted image denoising 9. CONCLUSIONS The results of this study are suggesting that the DCT-DWT-SVD based watermarking approach as well as the denoising algorithm utilizing DWT has been providing optimum performance in the existence of watermark image’s recovery that has been attacked via Gaussian noise. Results have been analytically verified with regard to MSE and PSNR, also the two have been high for new DCT-DWT-SVD watermarking system. REFERENCES [1] M. Sharkas, D. ElShafie, and N. Hamdy, "A Dual Digital-Image Watermarking Technique," The Third World Enformatika Conference, pp. 136-139, April 2005. [2] O. Omoruyi, et al., "Evaluation of the quality of an image encrytion scheme," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 6, pp. 2968-2974, December 2019. [3] E. H. Rachmawanto, et al., "An improved security and message capacity using AES and Huffman coding on image steganography," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 5, pp. 2400-2409, October 2019. [4] Z. Liu, "Comparative evaluations of image encryption algorithms," Auckland University of Technology, 2018. [5] Z. Liu, et al., "Double image encryption by using Arnold transform and discrete fractional angular transform," Optics and Lasers in Engineering, vol. 50, no. 2, pp. 248-255, February 2012. [6] N. Divecha and N. Jani, "Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images," 2013 International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 204-208, March 2013. [7] Y. Y. Al-Aboosi, R. S. Issa, and A. khalid Jassim, "Image denosing in underwater acoustic noise using discrete wavelet transform with different noise level estimation," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 3, pp. 1439-1446, June 2020. [8] R. Thillainayagi and K. Senthil Kumar, "Combination of wavelet transform and singular value decomposition-based contrast enhancement technique for target detection in UAV reconnaissance thermal images," Journal of Modern Optics, vol. 66, no. 3, pp. 606-617, January 2019. [9] N. M. Makbol, B. E. Khoo, and T. H. Rassem, "Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics," IET Image processing, vol. 10, no. 1, pp. 34-52, 2016.
  • 8. TELKOMNIKA Telecommun Comput El Control  Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed) 3087 [10] A. Mansouri, A. M. Aznaveh, and F. T. Azar, "SVD-based digital image watermarking using complex wavelet transform," Sadhana, vol. 34, no. 3, pp. 393-406, June 2009. [11] L. Novamizanti, G. Budiman, and E. N. F. Astuti, "Robust audio watermarking based on transform domain and SVD with compressive sampling framework," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 2, pp. 1079-1088, April 2020. [12] Handito, Kurniawan Wira, et al., "The comparison between SVD-DCT and SVD-DWT digital image watermarking," International Conference on Data and Information Science. IOP Conf. Series: Journal of Physics: Conf. Series, vol. 971. 2017. [13] Zhang, Lina, and Deyun Wei, "Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization," Multimedia Tools and Applications, vol. 78, pp. 28003-28023, 2019. [14] L. Novamizanti, G. Budiman, and I. Safitri, "Modified DCT-based audio watermarking optimization using genetics algorithm," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 16, no. 6, pp. 2651-2660, December 2018. [15] K. R. Rao and P. Yip, "Discrete cosine transform: algorithms, advantages, applications," Academic Press Professional, August 1990. [16] G. Budiman, L. Novamizanti, and I. Iwut, "Genetics algorithm optimization of DWT-DCT based image Watermarking," Journal of Physics: Conference Series, vol. 795, no. 1, pp. 012039, February 2017. [17] M. Misiti, et al., "Wavelet toolbox," The MathWorks Inc., Natick, MA, vol. 15, pp. 21, 1996. [18] D. Gupta and S. Choubey, "Discrete wavelet transform for image processing," International Journal of Emerging Technology and Advanced Engineering, vol. 4, pp. 598-602, 2015. [19] D. Baleanu, "Advances in wavelet theory and their applications in engineering, physics and technology," BoD–Books on Demand, 2012. [20] W. S. Sari, E. H. Rachmawanto, and C. A. Sari, "A Good Performance OTP encryption image based on DCT-DWT steganography," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 15, no. 4, pp. 1987-1995, December 2017. [21] M. N. Abdulwahed and A. kamil Ahmed, "Underwater image de-nosing using discrete wavelet transform and pre-whitening filter," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 16, no. 6, pp. 2622-2629, December 2018. [22] C. Kumar, G. Sai, R. K. Kumar, G. A. Naidu, and J. Harikiran, "Noise removal in microarray images using variational mode decomposition technique," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 15, no. 4, pp. 1750-1756, December 2017. [23] D. L. Donoho, "De-noising by soft-thresholding," IEEE transactions on information theory, vol. 41, pp. 613-627, 1995. [24] I. M. Johnstone and B. W. Silverman, "Wavelet threshold estimators for data with correlated noise," Journal of the royal statistical society: series B (statistical methodology), vol. 59, pp. 319-351, 1997. [25] R. Aggarwal, et al., "Noise reduction of speech signal using wavelet transform with modified universal threshold," International Journal of Computer Applications, vol. 20, no. 5, pp. 14-19, April 2011. [26] C. Tan, G. Seet, A. Sluzek, and D. He, "A novel application of range-gated underwater laser imaging system (ULIS) in near-target turbid medium," Optics and Lasers in Engineering, vol. 43, no. 9, pp. 995-1009, September 2005. [27] J. Ellinas, T. Mandadelis, A. Tzortzis, and L. Aslanoglou, "Image de-noising using wavelets," TEI of Piraeus Applied Research Review, vol. 9, pp. 97-109, 2004.