×

Image encryption: generating visually meaningful encrypted images. (English) Zbl 1391.94728

Summary: To protect image contents, most existing encryption algorithms are designed to transform an original image into a texture-like or noise-like image which is, however, an obvious visual sign indicating the presence of an encrypted image and thus results in a significantly large number of attacks. To address this problem, this paper proposes a new image encryption concept to transform an original image into a visually meaningful encrypted one. As an example of the implementation of this concept, we introduce an image encryption system. Simulation results and security analysis demonstrate excellent encryption performance of the proposed concept and system.

MSC:

94A60 Cryptography
65T60 Numerical methods for wavelets
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory

Software:

LSIC
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] An, L.; Gao, X.; Li, X.; Tao, D.; Deng, C.; Li, J., Robust reversible watermarking via clustering and enhanced pixel-wise masking, IEEE Trans. Image Process., 21, 8, 3598-3611 (2012) · Zbl 1373.94023
[2] An, L.; Gao, X.; Yuan, Y.; Tao, D., Robust lossless data hiding using clustering and statistical quantity histogram, Neurocomputing, 77, 1, 1-11 (2012)
[3] An, L.; Gao, X.; Yuan, Y.; Tao, D.; Deng, C.; Ji, F., Content-adaptive reliable robust lossless data embedding, Neurocomputing, 79, 0, 1-11 (2012)
[4] Bao, L.; Zhou, Y.; Chen, C. L.P.; Liu, H., A new chaotic system for image encryption, Proceedings of the 2012 International Conference on System Science and Engineering (ICSSE), 69-73 (2012)
[5] Bhatnagar, G.; Jonathan Wu, Q. M.; Raman, B., Discrete fractional wavelet transform and its application to multiple encryption, Inf. Sci., 223, 0, 297-316 (2013) · Zbl 1293.94020
[6] Bouguezel, S., A reciprocal-orthogonal parametric transform and its fast algorithm, IEEE Signal Process. Lett., 19, 11, 769-772 (2012)
[7] Calderbank, A. R.; Daubechies, I.; Sweldens, W.; Yeo, B.-L., Wavelet transforms that map integers to integers, Appl. Comput. Harmonic Anal., 5, 3, 332-369 (1998) · Zbl 0941.42017
[8] Chen, C.-K.; Lin, C.-L.; Chiang, C.-T.; Lin, S.-L., Personalized information encryption using ECG signals with chaotic functions, Inf. Sci., 193, 0, 125-140 (2012)
[9] Chen, G.; Mao, Y.; Chui, C. K., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21, 3, 749-761 (2004) · Zbl 1049.94009
[10] Chen, T.-H.; Li, K.-C., Multi-image encryption by circular random grids, Inf. Sci., 189, 0, 255-265 (2012)
[11] Deng, C.; Gao, X.; Li, X.; Tao, D., A local Tchebichef moments-based robust image watermarking, Signal Process., 89, 8, 1531-1539 (2009) · Zbl 1178.94018
[12] Dragoi, I.-C.; Coltuc, D., On local prediction based reversible watermarking, IEEE Trans. Image Process., 24, 4, 1244-1246 (2015) · Zbl 1408.94143
[13] Franco-Contreras, J.; Coatrieux, G.; Cuppens, F.; Cuppens-Boulahia, N.; Roux, C., Robust lossless watermarking of relational databases based on circular histogram modulation, IEEE Trans. Inf. Forensics Secur., 9, 3, 397-410 (2014)
[14] Gao, X.; An, L.; Li, X.; Tao, D., Reversibility improved lossless data hiding, Signal Process., 89, 10, 2053-2065 (2009) · Zbl 1178.94020
[15] Gao, X.; An, L.; Yuan, Y.; Tao, D.; Li, X., Lossless data embedding using generalized statistical quantity histogram, IEEE Trans. Circuits Syst. Video Technol., 21, 8, 1061-1070 (2011)
[16] Gao, X.; Deng, C.; Li, X.; Tao, D., Geometric distortion insensitive image watermarking in affine covariant regions, IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev., 40, 3, 278-286 (2010)
[17] Ghebleh, M.; Kanso, A.; Noura, H., An image encryption scheme based on irregularly decimated chaotic maps, Signal Process.: Image Commun., 29, 5, 618-627 (2014)
[18] Guo, C.; Liu, S.; Sheridan, J. T., Optical double image encryption employing a pseudo image technique in the Fourier domain, Opt. Commun., 321, 0, 61-72 (2014)
[19] Hua, Z.; Zhou, Y.; Pun, C.-M.; Philip Chen, C. L., 2d sine logistic modulation map for image encryption, Inf. Sci., 297, 0, 80-94 (2015)
[20] Liao, X.; Lai, S.; Zhou, Q., A novel image encryption algorithm based on self-adaptive wave transmission, Signal Process., 90, 2714-2722 (2010) · Zbl 1194.94108
[21] Lima, J. B.; Novaes, L. F.G., Image encryption based on the fractional Fourier transform over finite fields, Signal Process., 94, 0, 521-530 (2014)
[22] Ma, K.; Zhang, W.; Zhao, X.; Yu, N.; Li, F., Reversible data hiding in encrypted images by reserving room before encryption, IEEE Trans. Inf. Forensics Secur., 8, 3, 553-562 (2013)
[23] Menezes, A. J.; Van Oorschot, P. C.; Vanstone, S. A., Handbook of Applied Cryptography (1997), CRC Press, Inc.: CRC Press, Inc. New York · Zbl 0868.94001
[25] Qin, C.; Chang, C.-C.; Chiu, Y.-P., A novel joint data-hiding and compression scheme based on SMVQ and image inpainting, IEEE Trans. Image Process., 23, 3, 969-978 (2014) · Zbl 1374.94313
[26] Shan, M. G.; Chang, J.; Zhong, Z.; Hao, B. G., Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps, Opt. Commun., 285, 21-22, 4227-4234 (2012)
[27] Tedmori, S.; Al-Najdawi, N., Image cryptographic algorithm based on the haar wavelet transform, Information Sciences, 269, 0, 21-34 (2014) · Zbl 1339.94068
[28] Wang, X.; Wang, X.; Zhao, J.; Zhang, Z., Chaotic encryption algorithm based on alternant of stream cipher and block cipher, Nonlinear Dynamics, 63, 4, 587-597 (2011)
[29] Wu, Y.; Yang, G.; Jin, H.; Noonan, J. P., Image encryption using the two-dimensional logistic chaotic map, Journal of Electronic Imaging, 21, 1 (2012)
[30] Wu, Y.; Zhou, Y.; Noonan, J. P.; Agaian, S., Design of image cipher using latin squares, Information Sciences, 264, 0, 317-339 (2014) · Zbl 1335.94083
[31] Yang, Y.-G.; Jia, X.; Sun, S.-J.; Pan, Q.-X., Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding, Information Sciences, 277, 0, 445-457 (2014)
[32] Yeganeh, H.; Wang, Z., Objective quality assessment of tone-mapped images, IEEE Transactions on Image Processing, 22, 2, 657-667 (2013) · Zbl 1373.94466
[33] Zanin, M.; Pisarchik, A. N., Gray code permutation algorithm for high-dimensional data encryption, Information Sciences, 270, 0, 288-297 (2014)
[34] Zhang, Y.-Q.; Wang, X.-Y., A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice, Information Sciences, 273, 0, 329-351 (2014)
[35] Zhou, J.; Liu, X.; Au, O. C.; Tang, Y. Y., Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation, IEEE Transactions on Information Forensics and Security, 9, 1, 39-50 (2014)
[36] Zhou, Y.; Panetta, K.; Agaian, S.; Chen, C. L.P., (n, k, p)-gray code for image systems, IEEE Transactions on Cybernetics, 43, 2, 515-529 (2013)
[37] Zhou, Y.; Agaian, S., Image encryption using the image steganography concept and PLIP model, 2011 IEEE International Conference on System Science and Engineering (ICSSE), 699-703 (2011)
[38] Zhou, Y.; Bao, L.; Philip Chen, C. L., Image encryption using a new parametric switching chaotic system, Signal Processing, 93, 11, 3039-3052 (2013)
[39] Zhou, Y.; Bao, L.; Philip Chen, C. L., A new 1D chaotic system for image encryption, Signal Processing, 97, 172-182 (2014)
[40] Zhou, Y.; Panetta, K.; Agaian, S.; Philip Chen, C. L., Image encryption using P-Fibonacci transform and decomposition, Optics Communications, 285, 5, 594-608 (2012)
[41] Zhu, Z.; Zhang, W.; Wong, K.-W.; Yu, H., A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences, 181, 6, 1171-1186 (2011)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.