Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Improved reference image encryption methods based on 2k correction in the integer wavelet domain

Treść / Zawartość
Warianty tytułu
Języki publikacji
Many visually meaningful image encryption (VMIE) methods have been proposed in the literature using reference encryption. However, the most important problems of these methods are low visual quality and blindness. Owing to the low visual quality, the pre-encrypted image can be analyzed simply from the reference image and, in order to decrypt nonblind methods, users should use original reference images. In this paper, two novel reference image encryption methods based on the integer DWT (discrete wavelet transform) using 2k correction are proposed. These methods are blind and have high visual quality, as well as short execution times. The main aim of the proposed methods is to solve the problem of the three VMIE methods existing in the literature. The proposed methods mainly consist of the integer DWT, pre-encrypted image embedding by kLSBs (k least significant bits) and 2k correction. In the decryption phase, the integer DWT and preencrypted image extraction with the mod operator are used. Peak signal-to-noise ratio (PSNR) measures the performances of the proposed methods. Experimental results clearly illustrate that the proposed methods improve the visual quality of the reference image encryption methods. Overall, 2k correction and kLSBs provide high visual quality and blindness.
Opis fizyczny
Bibliogr. 19 poz., rys., tab., wykr.
  • Department of Digital Forensics Engineering, Firat University, University Street, 23119 Elazig, Turkey
  • Department of Digital Forensics Engineering, Firat University, University Street, 23119 Elazig, Turkey
  • Faculty of Electrical Engineering, Automatics, Computer Science and Biomedical Engineering, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Cracow, Poland
  • Department of Information and Communications Technology, Faculty of Computer Science and Telecommunications, Cracow University of Technology, ul. Warszawska 24, 31-155 Cracow, Poland
  • [1] Avci, E., Tuncer, T. and Avci, D. (2016). A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain, Arabian Journal for Science and Engineering 41(8): 3153–3161, DOI: 10.1007/s13369-016-2124-4.
  • [2] Bao, L. and Zhou, Y. (2015). Image encryption: Generating visually meaningful encrypted images, Information Sciences 324: 197–207.
  • [3] Chai, X., Gan, Z., Chen, Y. and Zhang, Y. (2017). A visually secure image encryption scheme based on compressive sensing, Signal Processing 134: 35–51.
  • [4] Chang, C.-C., Lin, C.-C. and Chen, Y.-H. (2008). Reversible data-embedding scheme using differences between original and predicted pixel values, IET Information Security 2(2): 35–46.
  • [5] Chen, B., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.L. and Shu, H. (2014). Full 4-d quaternion discrete Fourier transform based watermarking for color images, Digital Signal Processing 28: 106–119.
  • [6] Chen, G., Mao, Y. and Chui, C.K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps, Chaos, Solitons & Fractals 21(3): 749–761.
  • [7] Dhall, S., Pal, S. K. and Sharma, K. (2018). Cryptanalysis of image encryption scheme based on a new 1d chaotic system, Signal Processing 146: 22–32.
  • [8] Faragallah, O.S. (2013). Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain, International Journal of Electronics and Communications 67(3): 189–196.
  • [9] Ghebleh, M., Kanso, A. and Noura, H. (2014). An image encryption scheme based on irregularly decimated chaotic maps, Signal Processing: Image Communication 29(5): 618–627.
  • [10] Kanso, A. and Ghebleh, M. (2017). An algorithm for encryption of secret images into meaningful images, Optics and Lasers in Engineering 90: 196–208.
  • [11] Lee, S.-H. (2014). DWT based coding DNA watermarking for DNA copyright protection, Information Sciences 273: 263–286.
  • [12] Liu, F. and Wu, C. (2011). Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners, IET Information Security 5(2): 121–128.
  • [13] Peng, F., Li, X. and Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform, Signal Processing 92(1): 54 – 62.
  • [14] Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2017). A robust semi-blind watermarking for color images based on multiple decompositions, Multimedia Tools and Applications 76(24): 25623–25656, DOI: 10.1007/s11042-017-4355-0.
  • [15] Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2018). Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation, Multimedia Tools and Applications 77(5): 5609–5635, DOI: 10.1007/s11042-017-4476-5.
  • [16] Sun, S. (2016). A novel edge based image steganography with 2k correction and Huffman encoding, Information Processing Letters 116(2): 93–99.
  • [17] Tanchenko, A. (2014). Visual-PSNR measure of image quality, Journal of Visual Communication and Image Representation 25(5): 874–878.
  • [18] Tuncer, T. and Avci, E. (2016). A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays 41: 1–8.
  • [19] Yang, Y.-G., Zhang, Y.-C., Chen, X.-B., Zhou, Y.-H. and Shi, W.-M. (2018). Eliminating the texture features in visually meaningful cipher images, Information Sciences 429: 102–119.
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Identyfikator YADDA
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.