Abstract
In this paper, we present an image encryption scheme that has the capability to tolerate noisy effects of a wireless channel. This means if the encrypted image data is corrupted by channel noise up to a certain level, correct decryption is possible with some distortion. The proposed image encryption scheme relies on some very interesting properties of orthogonal matrices containing columns that form a set of orthonormal basis vectors. Besides being tolerant to noisy channels, the proposed scheme also provides good security against well-known cryptographic attacks as demonstrated in this paper by a number of experimental results and security analysis.








Similar content being viewed by others
References
Yang, M., Bourbakis, N., & Li, S. (2004). Data–image–video encryption. IEEE Potentials, 28–34.
Lian, S. (2008). Multimedia content encryption: Techniques and applications. Boca Raton, FL: CRC Press.
Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001. http://csrc.nist.gov/publications/fips/fips197/fips197.pdf.
Banu, R. (2009). Fault-tolerant encryption for space application. IEEE Transactions for Aerospace and Electronic System, 45(1), 266–279.
Chunren, L. (2009). An Efficient fault tolerant cryptosystem. In System: Internastional conference E-business and information security (pp. 1–5).
Kumar, A., Gambhir, D., & Rajpal, N. (2007). Robust and secret data transmission over the noisy channel. In International conference signal processing, communications and networking (pp. 199–203).
Korrai, P. K., Swamy, M. N. S., & Deergha, R. K. (2012). Robust transmission of watermarked medical images over wireless channels. In IEEE Global Humanitarian Technology Conference (pp. 242–246).
Ahmad, M., Haque, M. E., & Farooq, O. (2011). A noise resilient scrambling scheme for noisy transmission channel. In International conference on multimedia signal processing and communication technologies (pp. 91–94).
Wang, Y., & Zhu, Q. F. (May 1998). Error control and concealment for video communication: A review. Proceedings of the IEEE, 86(5), 974–997.
Wang, Y., Wenger, S., Wen, J., & Katsaggelos, A. K. (July 2000). Error resilient video coding techniques. IEEE Signal Processing Magazine, 17(4), 61–82.
Lin, C. Y., Sow, D., & Chang, S. F. (2001). Using self-authentication-and-recovery images for error concealment in wireless environments. In Proceedings of SPIE (Vol. 4518, pp. 267–274).
Kang, L. W., & Leou, J. J. (2003). A new error resilient coding scheme for JPEG image transmission based on data embedding and vector quantization. InProceedings of IEEE international symposium on circuits and systems, Bangkok, Thailand (Vol. 2, pp. 532–535).
Kang, L. W., & Leou, J. J. (2003). Two error resilient coding schemes for wavelet-based image transmission based on data embedding and genetic algorithms. In Proceedings of IEEE international conference on image processing, Barcelona, Spain (pp. 461–464).
Lay, D. C. (2009). Linear algebra and its applications. Upper Saddle River: Pearson Education.
Meyer, C. D. (2000). Matrix analysis and applied linear algebra, SAIM.
Andrews, H., & Patterson, C. L. (1976). Singular value decomposition and digital image processing. IEEE Transactions on Acoustics, Speech and Signal Processing, ASSP–24(1), 26–53.
Liu, R., & Tan, T. (2002). An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia, 4(1), 121–128.
Ghaderpanah, M., & Hamza, A. B. (2006). Secure copyright protection of digital images using non negative matrix factorization. In 23rd Biennial symposium on communication (pp. 344–347).
Koh, M. S., Marek, E. R., & Talarico, C. (2007). A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks. In International conference on multimedia and expo, Beijing, China (pp. 1527–1530).
Schneier, B. (1996). Applied cryptography. USA: Wiley.
Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28, 656–715.
Ahmed, F., Siyal, M. Y., & Abbas, V. U. (2010). A perceptually scalable and JPEG compression tolerant image encryption scheme. In Fourth Pacific rim symposium on image and video technology (pp. 232–238).
Montgomery, D. C., & Runger, G. C. (2004). Applied statistics and probability for engineers (3rd ed.). New York: Wiley.
Walpole, R. E., & Myers, R. H. (1990). Probability and statistics for engineers and scientists. New York: Maxwell Macmillan International Editions.
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmed, F., Anees, A., Abbas, V.U. et al. A Noisy Channel Tolerant Image Encryption Scheme. Wireless Pers Commun 77, 2771–2791 (2014). https://doi.org/10.1007/s11277-014-1667-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-1667-5