ChapterPDF Available

A Partial Image Encryption Method with Pseudo Random Sequences

Authors:

Abstract and Figures

We propose an effective approach for partial image encryption with pseudo random sequences (PRS). It is known that an image can be considered as a combination of correlated and uncorrelated data as well as most of the perceptual information are present in the correlated data rather than the uncorrelated data. Hence, the amount of residual intelligence present in an encrypted image depends on the correlated data. It is, therefore, sufficient to encrypt the correlated data instead of encrypting the entire image in order to speed up the entire operation. From the perception point of view, the most significant bit (MSB) planes have high adjacent correlation between the pixels whereas the least significant bit (LSB) planes contain comparatively more uncorrelated data. PRS with simple hardware like m-sequences and Gold sequences have less correlation between the adjacent bits. These can therefore serve as a good alternative for partially encrypting the MSB planes with low complexity to provide security against casual listeners. It is observed from the results that the new approach is able to reduce the residual intelligence as would have been obtained by encrypting the entire image.
Content may be subject to copyright.
A Partial Image Encryption Method
with Pseudo Random Sequences
Y.V. Subba Rao, Abhijit Mitra, and S.R. Mahadeva Prasanna
Department of Electronics and Communication Engineering,
Indian Institute of Technology Guwahati, North Guwahati 781039, India
{subba,a.mitra,prasanna}@iitg.ernet.in
Abstract. We propose an effective approach for partial image encryp-
tion with pseudo random sequences (PRS). It is known that an image can
be considered as a combination of correlated and uncorrelated data as
well as most of the perceptual information are present in the correlated
data rather than the uncorrelated data. Hence, the amount of residual
intelligence present in an encrypted image depends on the correlated
data. It is, therefore, sufficient to encrypt the correlated data instead of
encryptingtheentireimageinordertospeeduptheentireoperation.
From the perception point of view, the most significant bit (MSB) planes
have high adjacent correlation between the pixels whereas the least sig-
nificant bit (LSB) planes contain comparatively more uncorrelated data.
PRS with simple hardware like m-sequences and Gold sequences have
less correlation between the adjacent bits. These can therefore serve as a
good alternative for partially encrypting the MSB planes with low com-
plexity to provide security against casual listeners. It is observed from
the results that the new approach is able to reduce the residual intelli-
gence as would have been obtained by encrypting the entire image.
Keywords: Partial encryption, Residual intelligence, Pseudo random
sequence.
1 Introduction
In the present era, it is important to protect the information when it is passed
through an insecure channel. One way to provide such protection is to convertthe
intelligible data into the unintelligible ones prior to transmission and such a pro-
cess of conversion with a key is called encryption [1]-[5]. Decryption is a reverse
process of the encryption. To protect the information from unauthorized users,
the key must be kept secret. Private and public key encryptions are two kinds
in cryptography. In symmetric or private key encryption [3]-[4], the encryption
anddecryptionprocessesareperformedwiththesamekey.Butinasymmet-
ric or public key encryption [2], these operations are performed with different
keys. The entire security of the encryption technique depends on the key. Fur-
ther, the security needed may be against two types of attackers, namely, casual
listeners/observers or professional unauthorized recipients, termed as cryptan-
alysts. In the former case, the security is needed only in terms of hours while
A. Bagchi and V. Atluri (Eds.): ICISS 2006, LNCS 4332, pp. 315–325, 2006.
c
Springer-Verlag Berlin Heidelberg 2006
316 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
in the later it may be in terms of years. The duration roughly indicates the
amount of time that is needed to analyze the information available in unintelli-
gible form in the insecure channel without the knowledge of keys to derive the
underlying information. The scenario where security is needed against casual
listener/observer, the cryptographic structure should be as simple as possible in
order to reduce the cost.
Our proposed scheme is mainly concentrated towards the private key en-
cryption. Both symmetric and asymmetric key encryption provides nearly same
amount of security. Depending on the application either of the technique is pre-
ferred. In real time applications, where security needs to be provided against
casual listeners, the encryption of the entire image with classical techniques
[6]-[8] like advanced encryption standard (AES), or, international data encryp-
tion algorithm (IDEA) are not always advantageous due to high computational
complexity. Further, in multimedia applications classical techniques consume
enough computational time for encryption due to its bulk size. Partial encryp-
tion approach therefore outperforms the conventional ones when speed is the
main criteria. In partial encryption techniques usually the significant informa-
tion have to be encrypted and insignificant information remain non-encrypted.
Considerable amount of recent research papers have focused towards different
kinds of partial encryption techniques in image processing. Such partial encryp-
tion techniques, reported in the literature [9]-[12], can be categorized into three
broad classes with the first one being encrypting only the AC-coefficients in dis-
crete cosine transform (DCT) domain. This technique, however, does not provide
sufficient security due to the perceptual information present in DC-coefficients
[9]. The next method is to encrypt the first few significant coefficients or few
subbands in wavelet domain which becomes complex in selection of significant
coefficients, and, the last one is the encryption of selective bitplanes in the im-
age with classical algorithms with high computational complexity. We focus on
a partial encryption technique with pseudo random sequences which is less com-
putationally complex yet effective. To the best of our knowledge, no work has
been reported in the literature using the same technique till now.
Pseudo random sequences (PRS) [13]-[15] are simple to generate yet offer rea-
sonably considerable security and can be produced with linear feedback shift
registers in high speed. The PRS are widely used in communications due to
their randomness based on the properties of low cross correlations. Images usu-
ally have high correlation between the neighborhood pixels, demanding the need
of sequences which would possess low adjacent correlation properties to pro-
vide sufficient security. PRS with simple hardware like m-sequences and Gold
sequences therefore emerge as a good alternative for partially encrypting the
MSB planes. It can also be observed from the results that the new approach
provides is able to reduce the residual intelligence as would have been obtained
by encrypting the entire image.
The paper is organized as follows. In Section 2, we deal with the PRS, and in
particular, m-sequences and Gold sequences. Section 3 provides the main idea
behind the partial encryption techniques at length. The proposed scheme of
A Partial Image Encryption Method with Pseudo Random Sequences 317
SS
CC C0
C1
n−1
n−1 n−2
n−2 1 0
SS
++ +
(INITIAL SEED ( which is transmitted through secured channel )
sequence
random Pseudo
Fig. 1. Block diagram of a m-sequence generator
partial encryption with PRS is introduced in Section 4. Section 5 presents the
results and also briefs about the effectiveness of the proposed scheme. The paper
is concluded by summarizing the present work along with the scope of future
work in Section 6.
2 Pseudo Random Sequences (PRS)
PRS are periodic sequences that contain the following noise like properties: (i)
balance property, (ii) single peak auto correlation function property, and, (iii)
run property. These three properties make PRS efficient for encryption. However,
due to the second property, adjacent bits’ correlation becomes considerably less,
thereby making the PRS more effective for image encryption when compared
with data encryption due to high adjacent correlation present in the images.
2.1 Maximal Length Sequences
The m-sequence generator is usually constructed with linear feedback shift reg-
isters (LFSR). The general structure of such a m-sequence generator is shown
in Fig. 1. The m-sequences are, by definition, the largest codes that can be gen-
erated by a given shift register or a delay element of given length. A m-sequence
generator contains nshift registers and is initiated with a starting seed, which is
usually transmitted through a secured channel for intended users only. The out-
puts of the shift registers are multiplied with the coefficients (Cn1,C
n2,...,C
1,
C0) of a primitive polynomial with respect to mod-2 operation. The resultant
output obtained by the modulo operation is then fed back to the first shift regis-
ter. The resultant output is called as m-sequence. Note that the periodicity of a
m-sequence generator is 2n1, which, in turn, means the length of the sequence
depends on the length of the LFSR. The primitive polynomial can be also be
found from the 2nlength sequence. M-sequences contains the following two au-
tocorrelation values: 1 and 1
N. M-sequences produce the autocorrelation value
1
Nwith even one bit delay, making the adjacent correlation value very low.
318 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
aaaa132
a4
b b b
324
b 1b
0
0
Fig. 2. A typical Gold sequence generator
2.2 Gold Sequences
As shown in Fig. 2 the Gold sequences can be generated by the xor operation
of the two m-sequences. Note that with only a few chosen pairs of m-sequences
we can produce the Gold sequences which are called preferred pairs. The length
of the Gold sequences is also same as the individual m-sequence’s length. But it
provides more security compared to m-sequences. Gold sequences are very simple
to generate. Using two preferred m-sequence generators of degree n, with a fixed
non-zero seed in the first generator, 2nGold codes are obtained by changing
the seed of the second generator from 0 to 2n1. Another Gold sequence can
be obtained by setting all zero to the first generator, which is the second m-
sequence itself. In total, 2n+1 Gold codes are available. Consider an m-sequence
represented by a binary vector aof length N, and a second sequence aobtained
by sampling every qth symbol of a.Inotherwords,a=a[q], where qis odd and
either q=2
k+1orq=2
2k2k+1. Two m-sequences aand aare called the
preferred pair if
n= 0 (mod 4) (1)
i.e., nis odd or n= 2 (mod 4). The relation between nand kin such Gold
sequences follows the below stated property.
gcd(n, k)=1fornodd
2forn=2 (mod4) (2)
Gold sequence autocorrelation Rxx(k) and cross correlation functions Rxy (k)
can be defined as
Rxx(k)=1k=0
{−t(n)
N,1
N,t(n)+2
N}k=0 (3)
Rxy(k)={−t(n)
N,1
N,t(n)+2
N}(4)
A Partial Image Encryption Method with Pseudo Random Sequences 319
Fig. 3. Autocorrelation function of a Gold sequence
Fig. 4. Crosscorrelation function of Gold sequences
where
t(n)=1+2
0.5(n+1) for nodd
1+2
0.5(n+2) for neven
The auto and cross correlations for one/multiple typical Gold sequence(s) of
period 219 1areshowninFig.3andFig.4.
3 Partial Encryption Techniques
In these schemes the significant and insignificant information is separated from
the image. The significant part of the image is to be encrypted and insignificant
320 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
ORIGINAL
IMAGE
ENCRYPTED
IMAGE
KEY
DATA
CORRELATED UNCORRELATED
DATA
ENCRYPTION WITH
PSEUDO RANDOM
SEQUENCE
Fig. 5. Block diagram of partial encryption technique
part remains non-encrypted. After the encryption the significant and insignifi-
cant parts are combined before transmission. This encrypted image is transmit-
ted through an insecure channel to the receiver. At the receiver the encrypted
image is again decomposed into significant and insignificant components, the
decryption operation is performed only on significant part and then combined
to get original image. If the significant information is very less the public key
encryption techniques will be preferred or otherwise the private key techniques
are often used.
4 The Proposed Scheme
In the proposed scheme, the image is initially separated into correlated and
uncorrelated data by dividing it into first four MSB planes and last four LSB
planes. The correlated data (first four MB planes) are encrypted with the highly
uncorrelated PRS while keeping the uncorrelated data as unencrypted ones.
After the encryption of correlated data, it is combined with the remaining data
to form the final encrypted image. The block diagram of the proposed scheme
is shown in Fig. 5. In the present work we consider the first four MSB planes as
correlated data as it is seen that for reducing the residual intelligence as could
be obtained by encrypting the entire image, we need to encrypt a minimum of
these four bit planes. Here first we encrypt the MSB planes of the image with
the m-sequence generated by the pseudo random generator as shown in Fig. 1.
A Partial Image Encryption Method with Pseudo Random Sequences 321
(a) (b) (c)
(d) (e) (f)
(g) (h) (i)
Fig. 6. Decomposition of image. (a) Original image. (b)-(i) The bitplanes starting from
the MSB to LSB planes respectively.
4.1 Partial Encryption with Gold Sequences
M-sequences can be estimated if some part of the sequence is known. To over-
come this disadvantage, the length of LFSR should be large. Therefore, encryp-
tion with m-sequence trades off security against the length of the shift register.
One good alternative to overcome this problem is to use Gold sequences. With
four different auto correlation values, sometimes Gold sequences produce ad-
jacent correlation less than the m-sequence. Due to less adjacent correlation
Gold sequence offers more security and removes the redundancy better than m-
sequences. The adjacent correlation will be very high in first four MSB planes
compared to the remaining bitplanes. After the encryption, the correlation de-
creases very significantly and achieves nearly equal to the LSB planes.
5 Results and Discussions
The proposed scheme has been implemented in the Matlab with several test
images. Below are some results applied on the standard Peppers gray scale image.
The Fig. 6 shows the bit planes in the Peppers image. The most significant
bitplanes have high adjacent correlation between the bits and least significant
bitplanes have very less correlation. So they appear as noisy bitplanes.
5.1 Partial Encryption with M-Sequences
We can observe that the adjacent correlation is present in the first four bit-
planes in Fig. 6. Fig. 7 shows the partial encryption of image. The bit planes
322 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
(a) (b) (c)
(d) (e) (f)
(g) (h) (i)
Fig. 7. Partial encryption with m-sequences. (a) Original image. (b, d, f, h) Bit planes
to be encrypted from the MSB plane. (c, e, g, i) Encrypted images using the combina-
tion of encrypted and remaining bit planes.
to be encrypted and encrypted images after combining the encrypted and un-
encrypted bit planes are shown in Fig. 7. After the encryption of the first two
MSB planes the encrypted image appears as the noisy image. However, it is also
necessary to encrypt the third and fourth MSB planes because these planes have
some perceptual information. The resultant image doesn’t have the significant
information after the encryption of four MSB plane. Fig. 8 shows the decryption
process of the partial encryption. If the correlation is measured among the pixels
in the encrypted images, it will be found that, compared to original image, the
correlation decreases significantly. But the correlation among the pixels in the
image after the encryption of first four bitplanes is nearly same as that of the
encryption of all bitplanes.
5.2 Partial Encryption with Gold Sequences
Fig. 9 shows the original image, the bit planes to be encrypted and the en-
crypted images after combining the encrypted and unencrypted bit planes. The
encrypted image after encryption of first four bit planes has no perceptual infor-
mation. The redundancy reduces in the encrypted bitplanes and the encrypted
image appeared as a random noisy image. The decryption process of the partial
encryption with Gold sequences is shown in Fig. 10. The adjacent correlation of
the encrypted bitplanes and encrypted images contains very less value compared
to the images encrypted with m-sequences.
A Partial Image Encryption Method with Pseudo Random Sequences 323
(a) (b) (c)
(d) (e) (f)
(g) (h)
Fig. 8. Decryption of partial encryption with m-sequences. (a, c, e, g) Decrypted bit
planes from the MSB plane. (b, d, f, h) Decrypted images using the combination of
decrypted and the remaining bitplanes.
(a) (b) (c)
(d) (e) (f)
(g) (h) (i)
Fig. 9. Partial encryption with Gold sequences. (a) Original image. (b, d, f, h) Bit
planes to be encrypted from the MSB plane. (c, e, g, i) Encrypted images using the
combination of encrypted and remaining bitplanes.
324 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
(a) (b) (c)
(d) (e) (f)
(g) (h)
Fig. 10. Decryption of partial encryption with Gold sequences. (a, c, e, g) Decrypted
bit planes from the MSB bitplane. (b, d, f, h) Decrypted images using the combination
of decrypted and the remaining bitplanes.
6 Conclusions
A simple yet effective technique for partial image encryption is proposed. The
main idea stems from the fact that the most information in an image is present
in the correlated data. This information is converted into unintelligible form by
encrypting with the uncorrelated sequences. This paper has presented an ap-
proach for the partial encryption of image using pseudo random sequences with
simple hardware. From the results, it is observed that partial encryption method
achieves the same security with the improvement in processing speed. The per-
formance of the method mainly depends on the differentiation of correlated and
uncorrelated information in the image. Here we have treated the MSB planes as
correlated information. However, even in MSB planes sometimes uncorrelated
data are present. A better approach might reduce the computational time fur-
ther if proper importance is given for separating the correlated data in the image
considering the above point.
References
1. Feng, Y., Li, L., Huang, F.: A Symmetric Image Encryption Approach based on
Line Maps. in Proc. Int. Symp. Sys. and Cont. Aeros. Astro. (2006) 1362–1367
2. Diffie, W., Hellman, M. E.: New Directions in Cryptography. IEEE Trans. Info.
Theory 22 (1976) 644–654
3. Stallings, W.: Cryptography and Network Security. Englewood Cliffs, NJ: Prentice
Hall (2003)
A Partial Image Encryption Method with Pseudo Random Sequences 325
4. Elbirt, A. J., Paar, C.: An Instruction-Level Distributed Processor for Symmetric-
Key Cryptography. IEEE Trans. Parallel and Distributed Systems 16 (2005)
468–480
5. Yang, S., Lu, Z., Han, S.: An Asymmetric Image Encryption Based on Matrix
Transformation. in Proc. IEEE Int. Symp. Comm. and Info. Tech. (ISCIT) 1(2004)
66–69
6. Dang, P. P., Chau, P. M.: Image Encryption for Secure Internet Multimedia Ap-
plications. IEEE Trans. Consumer Electronics 46 (2000) 395–403
7. Hou, Q., Wang, Y.: Security Traffic Image Transmission Based on EZW and AES.
in Proc. IEEE Intelligent Transportation Sys. 1(2003) 86–89
8. Ziedan, I. E., Fouad, M. M., Salem, D. H.: Application of Data Encryption Stan-
dard to bitmap and JPEG Images. in Proc. IEEE National Radio Science Conf.
(NRSC) (2003) 1–8
9. Droogenbroeck, M. V., Benedett, R.: Techniques for a Selective Encryption of
Uncompressed and Compressed Images. in Proc. Advanced Concepts for Intelligent
Vision Systems (ACIVS) (2002) 90–96
10. Chaeng, H., Li, X.: Partial Encryption of Compressed Images and Videos. IEEE
Trans. Signal Processing 48 (2000) 2439–2451
11. Podesser, M., Schmidt, H. P., Uhl, A.: Selective Bitplane Encryption for Secure
Transmission of Image Data in Mobile Environments. in Proc. 5th IEEE Nordic
Signal Processing symp.(NORSIG) (2002)
12. Pommer, A., Uhl, A.: Selective Encryption of Wavelet Packet Subband Structures
for Obscured Transmission of Visual Data. in Proc. IEEE Benelux Signal Process-
ing symp (2002) 25–28
13. Wang, L. T., McCluskey, E. J.: Linear Feedback Shift Register Design Using Cyclic
Codes. IEEE Trans. Computers 37 (1988) 1302–1306
14. Fuster, A., Garcia, L. J.: An efficient algorithm to generate binary sequences for
cryptographic purposes. Theoretical Computer Science 259 (2001) 679–688
15. Golomb, S. W.: Shift Register Sequences. Alegan park press (1982)
16. Sudharsanan, S.: Shared Key Encryption of JPEG Color Images. IEEE Trans.
Consumer Electronics 51 (2005) 1204–1211
... The huge volume of an image makes its transformation costly in terms of time, processing power. Recent research work overcomes this problem by encrypting only the significant part of the image information using partial encryption (Abdmouleh et al., 2017;Asaad et al., 2017;Ayoup et al., 2015;Elkady et al., 2016;Jawad & Sulong, 2015;Lian & Chen, 2013;Parameshachari & Soyjaudah, 2012;Rao et al., 2006;Somna & Senb, 2013;Yuen & Wong, 2011). ...
... The huge volume of an image makes its transformation costly in terms of time, processing power. Recent research work overcomes this problem by encrypting only the significant part of the image information using partial encryption (Abdmouleh et al., 2017;Asaad et al., 2017;Ayoup et al., 2015;Elkady et al., 2016;Jawad & Sulong, 2015;Lian & Chen, 2013;Parameshachari & Soyjaudah, 2012;Rao et al., 2006;Somna & Senb, 2013;Yuen & Wong, 2011). ...
Article
Full-text available
nowadays, image encryption is an interesting research area due to the rapid growth of communication technologies and the increasing demands for safeguarding the privacy of the transmitted images as unencrypted images are vulnerable to interception. Partial encryption is used to overcome the challenge of encryption the large size of digital images, due to the large computational overhead and long processing time needed. In this research, one level Discrete Wavelet Transform is applied to a colored image to divide the image to four sub-bands; then a texture segmentation using a Gabor filter and K-means clustering is applied to lowest frequency band. To achieve that, the texture segmentation is used as a new method for scrambling the image based on the features of another image. Finally, the scrambled segments of the image are encrypted using interchanged AES and RC4 Algorithms. Each one of the image pixels is then XORed using one of the two algorithms and the key of the other algorithm. The proposed work is evaluated using several security and performance analysis tests. The results show that the proposed work is resistant agents many kinds of attack and promising in real-time image transmission and encryption.
... For example, the use of a uniquely extracted part of an image to encrypt that very image has been one of the major directions in the domain of medical image security. These techniques, which we call as selective encryption techniques reduce the encryption and decryption times [49][50][51][52][53][54][55][56]. The success of these techniques primarily depends on how well the portion of image to be encrypted has been calculated. ...
Chapter
Full-text available
Healthcare information framework is a critical component in any information technology framework as patient-specific information like initial diagnosis, response to drugs, extent of recovery, etc., always resides over these systems. From the perspective of a healthcare professional, the focus is always on the best utilization of this critical data. This may be achieved by sharing such data over a network to enhance chances of better interpretation. However, this data may get compromised in terms of its integrity, confidentiality and authenticity over such an insecure network. On the other hand, Health Insurance Portability and Accountability Act (HIPAA) guidelines must be adhered to once such data flows an insecure network. Therefore, considering the importance of medical data transmission for better data interpretation and consequently better diagnosis and prognosis, we propose a texture edge map and multilevel chaotic map-driven encryption framework for medical images. The proposed technique employs texture maps obtained from Gabor filters in tandem with multiple chaotic maps: quadratic, cubic and logistic maps to enhance the key space, robustness and security of medical images over a vulnerable channel. The security and reliability of the proposed methodology are illustrated through key sensitivity analysis, statistical and performance analysis. The proposed methodology ensures large key length and pixel diffusion. Security analysis illustrates one of the prime properties of key sensitivity to initial conditions to withstand differential attacks. In addition to withstanding the differential attacks, the proposed technique has a large enough key space to see off brute force attacks. Considering the criticality of the transmission of medical images for use in the state-of-the-art e-healthcare systems like picture archiving and communication systems, the proposed technique is a potential candidate for addressing security vulnerabilities of medical images over the communication networks.
... Image pixel scrambling mainly uses curves to scan pixels and rearrange them [19], [20], or rearrange pixels through chaotic sequences [21], [22]. The image scrambling method based on chaotic sequence is widely used, and the scrambling effect is better. ...
Article
Full-text available
To better protect the image information, an image encryption algorithm based on block scrambling and finite state machine is proposed. The method uses discrete wavelet transform (DWT) to divide the original image into four frequency bands. Secondly, chaotic sequences and zigzag scanning curve are used to construct a scrambling matrix to scramble the four frequency bands. Then combine the chaotic sequence, DNA coding, and automata to transform the state of the scrambled image. Finally, the key stream is used to diffuse the sequence to improve the security of cipher images further. Experimental results and security analysis show that the proposed encryption scheme can resist various attacks and ensure the secure transmission of images.
... In image encryption algorithms, the permutation of pixels [3][4][5] and the diffusion of pixel values [6][7][8] are the basic encryption structures widely used in current image encryption algorithms. Common pixel scrambling methods include scanning mode scrambling based on graphics [9][10][11] and pixel rearrangement based on pseudorandom sequences [12][13]. These scrambling methods encrypt an image by changing the positions of the pixels in the image. ...
Article
Full-text available
To improve the abilities of image encryption systems to resist plaintext attacks and differential attacks, a novel plaintext-related image encryption scheme based on Josephus traversing and pixel permutation is proposed. In this scheme, the step sizes of the Josephus traversing are associated with the pixel values, and the Josephus traversing method is improved, increasing the dependence of the cipher image on the plaintext image, further enhancing the plaintext sensitivity of the algorithm, and reducing the number of iterations of the index sequence generated by the chaotic system. By segmenting the image and combining a chaotic system, bit XOR and crossover operations between the modules are performed to achieve the effects of confusion and diffusion, and the randomness of the cipher image is improved. Finally, the confusing and spreading characteristics of the algorithm are further enhanced by cipher feedback. The experimental results and security analysis show that the proposed algorithm is sensitive to keys and can effectively resist attacks such as statistical attacks, selective-plaintext attacks and exhaustive attacks. The algorithm has high potential for real-time and secure image applications.
... Pommer et al encrypted the sub band decomposition position structure via AES. Rao et al. proposed a new method in 2006 which utilized pseudorandom numbers to encrypt the image partially (Rao et al. 2006). Ou et al. (2007) presented two different schemes for region based selective encryption. ...
Article
Full-text available
Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach the actual contents without any hurdle. Many encryption algorithms has been developed by researchers to increase the security of such traffic and make it difficult for eavesdroppers to access actual data. However, these traditional algorithms increase the communication overhead, computational cost and also do not provide security against new attacks. These issues in recent algorithms motivate the researchers to further explore this area and proposed such algorithms which have lower overhead, more efficiency than the existing techniques and equip with requirements of next generations multimedia networks. To address all these issues and keeping in mind the future of next generation multimedia networks, we proposed a secure and light-weight encryption scheme for digital images. The proposed technique initially divide plaintext image in a number of blocks and correlation coefficients of each block are then calculated. The block with the maximum correlation coefficient values are pixel-wise XORed with the random numbers generated from a skew tent map based on a pre-defined threshold value. At last, the whole image is permuted via two random sequences generated from TD-ERCS chaotic map. Experimental results shows higher security via checking correlation, entropy, histogram, diffusion characteristic and key sensitivity of the proposed scheme.
... Bendett et al. proposed a scheme which is XOR based, fast in response but provide less cryptographic security [14]. S. Rao et al. presented a work with strong security, fast but insufficient encryption ratio [15]. Li et al. proposed a technique with formidable security but not practical enough to implement [16]. ...
Chapter
Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.
Article
Full-text available
Telemedicine has evolved significantly for detection and diagnosis of diseases remotely, which means more frequent transmission of medical images over the network. The security of any medical image can be characterized as its integrity, confidentiality and authentication. It is these security vulnerabilities that limit the development of mobile healthcare applications, which intend to improve the efficiency of medical image communication. To address the vulnerabilities associated with medical images, we propose a texture edge map and multilevel chaotic map driven encryption framework for medical images. This technique utilizes texture maps generated by utilizing a bank of gabor filters along with multiple chaotic maps viz.: Sine, Cubic and Logistic maps for enhancing the key space, robustness and security of medical images over an insecure channel. The security, speed and reliability of the proposed technique for medical images are illustrated via experiments for key sensitivity, statistical and performance analysis. The proposed technique offers a large key space, pixel diffusion at an acceptable speed. Security analysis shows a high sensitive dependence of the encryption and decryption techniques to any subtle change in the secret key, the plain medical image and the encrypted image. Also, the proposed technique has a large enough key space to see off brute force attacks. Therefore, the proposed technique is a potential candidate for addressing security vulnerabilities of medical images over the communication networks.
Conference Paper
Full-text available
This paper proposes a new line map, which is an invertible chaotic two-dimensional map. The algorithm of the line map is formulated. An image encryption scheme based on the line map is developed that maps a image to a row of pixels and further fit to a same size image using the line map. The line map is generalized by using some parameters, the numbers of the left and the right line map, which are used as the key. For encryption, several iterative applications are made to a digital image. While for the deciphering process, the inverse of the line map is applied with the same number of iterations. The image encryption and deciphering scheme based on the line map has no information loss. The experimental tests are carried out and the results show the effectiveness of the new scheme
Conference Paper
Full-text available
In this paper, it is shown how to adapt a certain matrix transformation to create a novel asymmetric block encryption scheme. The proposed scheme is especially useful for encryption of large amounts of data, such as digital images. First, a pair of keys are given by using the matrix transformation; second, the image is encrypted in its transformation domain. This scheme can be conveniently realized and locate possible changed regions.
Article
In situations where visual data should be transmitted confi-dently but the available processing power is low (e. g. mobile clients) wavelet packet methods can be used to facilitate se-lective encryption: just a minor part of the compressed out-put data is encrypted, resulting in a significantly reduced work load. We investigate the approach to encrypt just the subband structure information of zerotree encoded wavelet packet data, we look at the resulting quality and security.
Article
We propose selective bitplane encryption to provide secure image transmission in low power mobile environments. Two types of ciphertext only attacks against this scheme are discussed and we use the corresponding results to de-rive conditions for a secure use of this technique.
Conference Paper
Binary feedback shift registers, with applications to reliable communications, stream cipher cryptography, radar signal design, pseudorandom number generation, digital wireless telephony, and many other areas, have been studied for more than half a century. The maximum-length binary linear feedback shift registers, called m-sequences or PN sequences, are the best-known and most thoroughly understood special case. The m-sequences have several important randomness properties, and are known as pseudo-random sequences. They are characterized by the cycle-and-add property, whereby the term-by-term sum of two cyclic shifts is a third cyclic shift. Along with other families of binary sequences that correspond to cyclic Hadamard difference sets, they have the two-level autocorrelation property. The m-sequences share the span-n property (all subsequences of length n, except n zeroes, occur in each period of length 2n –1) with a far larger class of nonlinear shift register sequences. No counterexample has been found to the conjecture that only the m-sequences have both the two-level autocorrelation and the span-n properties. The class of m-sequences is too small, and has too many regularities, to provide useful cryptographic security as key sequences for stream ciphers. For this purpose, nonlinear shift register sequences which have large linear span and a sufficiently high degree of correlation immunity may be employed.
Article
In this work, a simple constructive method is developed for enlarging known families of filtered sequences with given period and large linear complexity. The procedure does not impose any constraint on the number of maximum-order terms in the filter, the order of the filter nor the number of stages in the linear feedback shift register.