Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Image encryption

Published: 10 December 2015 Publication History

Abstract

To protect image contents, most existing encryption algorithms are designed to transform an original image into a texture-like or noise-like image which is, however, an obvious visual sign indicating the presence of an encrypted image and thus results in a significantly large number of attacks. To address this problem, this paper proposes a new image encryption concept to transform an original image into a visually meaningful encrypted one. As an example of the implementation of this concept, we introduce an image encryption system. Simulation results and security analysis demonstrate excellent encryption performance of the proposed concept and system.

References

[1]
L. An, X. Gao, X. Li, D. Tao, C. Deng, J. Li, Robust reversible watermarking via clustering and enhanced pixel-wise masking, IEEE Trans. Image Process., 21 (2012) 3598-3611.
[2]
L. An, X. Gao, Y. Yuan, D. Tao, Robust lossless data hiding using clustering and statistical quantity histogram, Neurocomputing, 77 (2012) 1-11.
[3]
L. An, X. Gao, Y. Yuan, D. Tao, C. Deng, F. Ji, Content-adaptive reliable robust lossless data embedding, Neurocomputing, 79 (2012) 1-11.
[4]
L. Bao, Y. Zhou, C.L.P. Chen, H. Liu, A new chaotic system for image encryption, 2012.
[5]
G. Bhatnagar, Q.M. Jonathan Wu, B. Raman, Discrete fractional wavelet transform and its application to multiple encryption, Inf. Sci., 223 (2013) 297-316.
[6]
S. Bouguezel, A reciprocal-orthogonal parametric transform and its fast algorithm, IEEE Signal Process. Lett., 19 (2012) 769-772.
[7]
A.R. Calderbank, I. Daubechies, W. Sweldens, B.-L. Yeo, Wavelet transforms that map integers to integers, Appl. Comput. Harmonic Anal., 5 (1998) 332-369.
[8]
C.-K. Chen, C.-L. Lin, C.-T. Chiang, S.-L. Lin, Personalized information encryption using ECG signals with chaotic functions, Inf. Sci., 193 (2012) 125-140.
[9]
G. Chen, Y. Mao, C.K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21 (2004) 749-761.
[10]
T.-H. Chen, K.-C. Li, Multi-image encryption by circular random grids, Inf. Sci., 189 (2012) 255-265.
[11]
C. Deng, X. Gao, X. Li, D. Tao, A local Tchebichef moments-based robust image watermarking, Signal Process., 89 (2009) 1531-1539.
[12]
I.-C. Dragoi, D. Coltuc, On local prediction based reversible watermarking, IEEE Trans. Image Process., 24 (2015) 1244-1246.
[13]
J. Franco-Contreras, G. Coatrieux, F. Cuppens, N. Cuppens-Boulahia, C. Roux, Robust lossless watermarking of relational databases based on circular histogram modulation, IEEE Trans. Inf. Forensics Secur., 9 (2014) 397-410.
[14]
X. Gao, L. An, X. Li, D. Tao, Reversibility improved lossless data hiding, Signal Process., 89 (2009) 2053-2065.
[15]
X. Gao, L. An, Y. Yuan, D. Tao, X. Li, Lossless data embedding using generalized statistical quantity histogram, IEEE Trans. Circuits Syst. Video Technol., 21 (2011) 1061-1070.
[16]
X. Gao, C. Deng, X. Li, D. Tao, Geometric distortion insensitive image watermarking in affine covariant regions, IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev., 40 (2010) 278-286.
[17]
M. Ghebleh, A. Kanso, H. Noura, An image encryption scheme based on irregularly decimated chaotic maps, Signal Process.: Image Commun., 29 (2014) 618-627.
[18]
C. Guo, S. Liu, J.T. Sheridan, Optical double image encryption employing a pseudo image technique in the Fourier domain, Opt. Commun., 321 (2014) 61-72.
[19]
Z. Hua, Y. Zhou, C.-M. Pun, C.L. Philip Chen, 2d sine logistic modulation map for image encryption, Inf. Sci., 297 (2015) 80-94.
[20]
X. Liao, S. Lai, Q. Zhou, A novel image encryption algorithm based on self-adaptive wave transmission, Signal Process., 90 (2010) 2714-2722.
[21]
J.B. Lima, L.F.G. Novaes, Image encryption based on the fractional Fourier transform over finite fields, Signal Process., 94 (2014) 521-530.
[22]
K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Trans. Inf. Forensics Secur., 8 (2013) 553-562.
[23]
A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone, CRC Press, Inc., New York, 1997.
[24]
National Institute of Standards and Technology, Advanced encryption standard (AES), 2001.
[25]
C. Qin, C.-C. Chang, Y.-P. Chiu, A novel joint data-hiding and compression scheme based on SMVQ and image inpainting, IEEE Trans. Image Process., 23 (2014) 969-978.
[26]
M.G. Shan, J. Chang, Z. Zhong, B.G. Hao, Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps, Opt. Commun., 285 (2012) 4227-4234.
[27]
S. Tedmori, N. Al-Najdawi, Image cryptographic algorithm based on the haar wavelet transform, Information Sciences, 269 (2014) 21-34.
[28]
X. Wang, X. Wang, J. Zhao, Z. Zhang, Chaotic encryption algorithm based on alternant of stream cipher and block cipher, Nonlinear Dynamics, 63 (2011) 587-597.
[29]
Y. Wu, G. Yang, H. Jin, J.P. Noonan, Image encryption using the two-dimensional logistic chaotic map, Journal of Electronic Imaging, 21 (2012).
[30]
Y. Wu, Y. Zhou, J.P. Noonan, S. Agaian, Design of image cipher using latin squares, Information Sciences, 264 (2014) 317-339.
[31]
Y.-G. Yang, X. Jia, S.-J. Sun, Q.-X. Pan, Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding, Information Sciences, 277 (2014) 445-457.
[32]
H. Yeganeh, Z. Wang, Objective quality assessment of tone-mapped images, IEEE Transactions on Image Processing, 22 (2013) 657-667.
[33]
M. Zanin, A.N. Pisarchik, Gray code permutation algorithm for high-dimensional data encryption, Information Sciences, 270 (2014) 288-297.
[34]
Y.-Q. Zhang, X.-Y. Wang, A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice, Information Sciences, 273 (2014) 329-351.
[35]
J. Zhou, X. Liu, O.C. Au, Y.Y. Tang, Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation, IEEE Transactions on Information Forensics and Security, 9 (2014) 39-50.
[36]
Y. Zhou, K. Panetta, S. Agaian, C.L.P. Chen, (n, k, p)-gray code for image systems, IEEE Transactions on Cybernetics, 43 (2013) 515-529.
[37]
Y. Zhou, S. Agaian, Image encryption using the image steganography concept and PLIP model, 2011.
[38]
Y. Zhou, L. Bao, C.L. Philip Chen, Image encryption using a new parametric switching chaotic system, Signal Processing, 93 (2013) 3039-3052.
[39]
Y. Zhou, L. Bao, C.L. Philip Chen, A new 1D chaotic system for image encryption, Signal Processing, 97 (2014) 172-182.
[40]
Y. Zhou, K. Panetta, S. Agaian, C.L. Philip Chen, Image encryption using P-Fibonacci transform and decomposition, Optics Communications, 285 (2012) 594-608.
[41]
Z. Zhu, W. Zhang, K.-W. Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences, 181 (2011) 1171-1186.

Cited By

View all
  • (2024)Visual Content Privacy Protection: A SurveyACM Computing Surveys10.1145/3708501Online publication date: 16-Dec-2024
  • (2024)A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic systemMultimedia Tools and Applications10.1007/s11042-023-15662-w83:2(3621-3655)Online publication date: 1-Jan-2024
  • (2024)Visual image encryption based on compressed sensing and Cycle-GANThe Visual Computer: International Journal of Computer Graphics10.1007/s00371-023-03140-140:8(5857-5870)Online publication date: 1-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Information Sciences: an International Journal
Information Sciences: an International Journal  Volume 324, Issue C
December 2015
310 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 10 December 2015

Author Tags

  1. Discrete wavelet transform
  2. Image encryption
  3. Visually meaningful encrypted image

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Visual Content Privacy Protection: A SurveyACM Computing Surveys10.1145/3708501Online publication date: 16-Dec-2024
  • (2024)A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic systemMultimedia Tools and Applications10.1007/s11042-023-15662-w83:2(3621-3655)Online publication date: 1-Jan-2024
  • (2024)Visual image encryption based on compressed sensing and Cycle-GANThe Visual Computer: International Journal of Computer Graphics10.1007/s00371-023-03140-140:8(5857-5870)Online publication date: 1-Aug-2024
  • (2023)An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and FRFT embeddingMultimedia Tools and Applications10.1007/s11042-023-14601-z82:18(27337-27363)Online publication date: 10-Feb-2023
  • (2023)An optimized image encryption framework with chaos theory and EMO approachMultimedia Tools and Applications10.1007/s11042-023-14438-682:20(30309-30343)Online publication date: 16-Feb-2023
  • (2023)Providing robust and reversible watermarking algorithm and detection of malicious manipulationSecurity and Privacy10.1002/spy2.2706:1Online publication date: 16-Jan-2023
  • (2022)Meaningful image encryption algorithm based on compressive sensing and integer wavelet transformFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-022-1419-817:3Online publication date: 12-Sep-2022
  • (2022)Efficient color image encryption by color-grayscale conversion based on steganographyMultimedia Tools and Applications10.1007/s11042-022-13689-z82:7(10835-10866)Online publication date: 26-Aug-2022
  • (2022)Visual image encryption scheme based on vector quantization and content transformMultimedia Tools and Applications10.1007/s11042-022-12583-y81:9(12815-12832)Online publication date: 1-Apr-2022
  • (2022)Optimized visually meaningful image embedding strategy based on compressive sensing and 2D DWT-SVDMultimedia Tools and Applications10.1007/s11042-022-12305-481:14(20175-20199)Online publication date: 1-Jun-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media