PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Image encryption using edge diffusion and selective permutations in orthogonal polynomials based transformation domain

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper proposes a new image encryption technique in orthogonal polynomials based transformation domain (OPT) with edge diffusion and selective combinational permutations for secure transmission of images. In this technique, we propose the use of the polynomials based edge detection algorithm to decompose the image blocks into edge blocks and non-edge blocks. The edge blocks are first encrypted with a cryptographic algorithm and then a selective combinational permutation is applied over the low frequency coefficients of the edge as well as non-edge blocks in order to reduce the number of bits to be permuted. Then a combinational shuffling of bits, coefficients and blocks are carried out in addition to sign bit encryption. A symmetric key based cryptographically secure pseudo random process controls the entire encryption process. Experimental results reveal that the proposed encryption scheme provides very low encryption PSNRs and security analyses prove that the proposed technique offers effective encryption.
Twórcy
  • Computer Vision Lab, Department of Information Technology Bharathidasan Institute of Technology, Anna University Tiruchirappalli - 620 024, Tamilnadu, India, rkrish07@yahoo.com
Bibliografia
  • [1] Aloka Sinha and Kehar Singh, A Technique for Image Encryption using Digital Signature, Optics Communications, vol.218, pp.229-234, 2003
  • [2] A. Mitra, Y. V. Subba Rao and R. M. Prasanna, A New Image Encryption Approach using Combinational Permutation Techniques, International Journal of Computer Science, vol. 1, no. 1, pp. 127-131, 2006
  • [3] Andreas Pommer and Andreas Uhl, Selective encryption of wavelet-packet encoded image data: efficiency and security, Multimedia Systems, vol. 9, pp. 279-287, 2003
  • [4] Chang-Mok Shin, Dong-Hoan Seo and Soo-Joong Kim, Gray-level Image Encryption scheme using Full Phase Encryption and Phase-Encoded Exclusive-OR Operations, Optical Review, vol. 11, no. 1, pp. 34-37, 2004
  • [5] Chang-Mok Shin and Soo-Joong Kim, Phase-Only Encryption and Single Path Decryption System using Phase-Encoded Exclusive-OR Rules in Fourier Domain, Optical Overview, vol. 13, no. 2, pp. 49-52, 2006
  • [6] C. Shi, B. Bhargava, A Fast MPEG video encryption algorithm, Proceedings of the sixth ACM International Multimedia conference, Bristol, U.K., pp. 81-88, 1998
  • [7] Feng Huang,Yong Feng and Xinhuo Yu, A Symmetric Image Encryption scheme based on a simple novel Two-dimensional Map, International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(b), pp. 1593-1602, 2007
  • [8] G. Chen, Y. B. Mao and C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons and Fractals, vol. 12, pp. 749-761, 2004
  • [9] Han Shuihua and Yuang Shuangyuan, An Asymmetric Image Encryption Based on Matrix Transformation, ECTI Transactions on Computer and Information Technology, vol. 1, no. 2, pp. 126-133, 2005
  • [10] H.Cheng, X. Li, Partial encryption of compressed images and videos, IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439-2451, 2000
  • [11] H. Hossam El-din Ahmed, M. Hamdy Kalash and Osama S. Farag Allah, An Efficient Chaos- based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption, Informatica, vol. 31, pp. 121-129, 2007
  • [12] J. Fridrich, Symmetric Ciphers Based on Two-dimensional Chaotic Maps, International Journal of Bifurcat Chaos, vol. 8, no. 6, pp. 1259-1284, 1998
  • [13] Marc Van Droogenbroeck and Raphael Benedett, Techniques for a selective encryption of uncompressed and compressed images, Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), Belgium, pp. 90-97, 2002
  • [14] M. Mark Fisch, Herbert Stogner and Andreas Uhl, Layered encryption techniques for DCT-coded visual data, Proceedings of the European Signal Processing Conference, EUSIPCO’04, Vienna, Austria, 2004.
  • [15] M. Zeghid, M. Machhout, L. Khriji, A. Baganne and R. Tourki, A Modified AES Based Algorithm for Image Encryption, International Journal of Computer Science and Engineering, vol. 1, no. 1, pp. 70-75, 2006
  • [16] Roman Pfarrhofer and Andreas Uhl, Selective Encryption Using JBIG, International Federation for Information Processing, LNCS 3677, pp. 98-107, 2005
  • [17] R. Krishnamoorthi and P. D. Sheba Kezia Malarchelvi, Selective combinational encryption of gray scale images using orthogonal polynomials based transformation, International Journal of Computer Science and Network Security, Vol. 8, No. 5, pp. 195-204, 2008
  • [18] S. G. Lian, J. Sun and Z.Wang, A block cipher based on a suitable use of chaotic standard map, Chaos, Solitons and Fractals, vol. 26, no. 1, pp. 117-129, 2005
  • [19] W. Zeng, S. Lei, Efficient frequency domain video scrambling for content access control, Proceedings of the seventh ACM International Multimedia Conference, pp. 285-293, 1999
  • [20] Y. B. Mao, G. Chen, S.G. Lian, A novel fast image encryption scheme based on the 3D chaotic baker map, International Journal of Bifurcat Chaos, vol. 14, no. 10, pp. 3613-3624, 2004
  • [21] Yumnam Kirani Singh, Swapan Kumar Parui, Simplet and its Application in Signal Encryption, Mutimedia Systems and Signal Processing, vol. 15, pp. 375-394, 2004
  • [22] Z. H.Guan, F. J. Huang, W. J. Guan, Chaos-based image encryption algorithm, Physics Letters, vol. 346, pp. 153-157
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0045-0010
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.