Skip to main content

JPEG image encryption using fuzzy PN sequences

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

The recent explosion in multimedia and networking application places a great demand on efficient transmission of images at low bit rate with high security. Mixing several existing standard encryption techniques with image encoding tends to change the compression ratio greatly. In this paper, a novel image encryption algorithm is embedded as a part of JPEG image encoding scheme to meet three major necessities: (1) to provide temporal security against casual observer, (2) to preserve the compression ratio, (3) remain compliant with the JPEG file format. In the proposed algorithm, the modified DCT blocks are confused by a fuzzy PN sequence. In addition to that, the DCT coefficients of each modified DCT block are converted to unique uncorrelated symbols, which are confused by another fuzzy PN sequence. Finally, the variable length encoded bits are encrypted by chaotic stream cipher. An amalgamation of all the three techniques with random combination of seeds will provide the required security against the casual listener/observer where the security needed is only in-terms of few hours.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Abbreviations

AES:

Advanced encryption standard

SFC:

Space filling curves

PN:

Pseudo random noise

FRIG:

Fuzzy random index generator

RLE:

Run length encoding

VLC:

Variable length coding

DQDC:

Difference of quantized DC

References

  1. Yen, J.C., Guo, J.I.: A new image encryption system and its VLSI architecture. In: IEEE Workshop on Signal Processing Systems, Taipei, pp. 430–437 (1999)

  2. Balasubramanian, S.: Image encryption using infinite series convergence. In: Proceedings of the 18th International Conference on Systems Engineering (ISCEng), pp. 257–262, August 2005

  3. El-Khamy, S.E., Lotfy, M., Ali, A.H.: A new color image encryption technique utilizing fuzzy pseudo-random bit generator. In: Proceedings of 22nd National Radio Science Conference (NRSC), pp. 185–194, March 2005

  4. Mitra A., Subba Rao Y.V., Prasanna S.R.M.: A new image encryption approach using combinational permutation techniques. Int. J. Comput. Sci. 1(2), 127–131 (2006)

    Google Scholar 

  5. Prasanna S.R.M., Subba Rao Y.V., Mitra A.: An image encryption method with magnitude and phase manipulation using carrier images. Int. J. Comput. Sci. 1(2), 132–137 (2006)

    Google Scholar 

  6. Bourbakis N., Alexopoulos C.: Picture data encryption using SCAN pattern. Pattern Recognit. 25(6), 567–581 (1992)

    Article  Google Scholar 

  7. Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: Proceedings of seventh International Conference on Parallel and Distributed Computing, Application and Technologies (PDCAT’06), pp. 61–66 (2006)

  8. Pichler, F., Scharinger, J.: Efficient image encryption based on chaotic maps. In: Proceedings of 20th Workshop of the Austrian Association for Pattern Recognition, pp. 159–170. Leibnitz, Austria (1996, preprint)

  9. Li, S.,Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS’02), vol. 2, pp. 708–711 (2002)

  10. Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), pp. 406–408, September 2005

  11. Gu, G., Han, G.: An enhanced chaos based image encryption algorithm. In: IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC’06), vol. 1, pp. 492–495, September 2006

  12. Rodriguez J.A.M., Rodriguez-Vera R.: Image encryption based on phase encoding by means of a fringe pattern and computational algorithms. Revista Mexicana De F’Isica 52(1), 53–63 (2006)

    Google Scholar 

  13. Gurijala, A., Khayam, S.A., Radha, H., Deller, J.R. Jr.: On encryption-compression tradeoff pre/post-filtered images. In: SPIE Conference on Mathematics of Data/Image Coding, Compression and Encryption VIII with Applications, San Diego CA, vol. 5915, No. 1, pp. 591–601, August 2005

  14. Chen T.S., Chang C.C., Hwang M.S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10), 1485–1488 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  15. Cheng H., Li X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000)

    Article  MathSciNet  Google Scholar 

  16. Droogenbroeck, M.V.: Partial encryption of images for real-time applications. In: Proceedings of fourth Benelux Signal Processing Symposium, pp. 11–15, April 2004

  17. Puech, W., Rodrigues, J.M.: Crypto-compression of medical images by selective encryption of DCT. In: 13th European Signal Processing Conference, September 2005

  18. Droogenbroeck, M.V., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS’02), pp. 90–97, September 9–11, 2002

  19. Pennebaker W.B., Mitchell J.L.: JPEG Still Image Compression Standard. Van Nostrand Reinhold, New York (1993)

    Google Scholar 

  20. Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of the Eighth International Conference on Information Visualization, pp. 217–220, July 2004

  21. Zeng W., Lei S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia 5(1), 118–129 (2003)

    Article  Google Scholar 

  22. Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW), pp. 160–163, June 2006

  23. Matias, Y., Shamir, A.: A video scrambling technique based on space filling curves. In: Proceedings of Advances in Cryptology—CRYPTO’87. Springer LNCS, vol. 293, pp. 398–417 (1987)

  24. Wang L.T., McCluskey E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302–1306 (1988)

    Article  Google Scholar 

  25. Fuster A., Garcia L.J.: An efficient algorithm to generate binary sequences for cryptographic purposes. Theor. Comput. Sci. 259, 679–688 (2001)

    Article  MATH  Google Scholar 

  26. El-Khamy, S.E., Lotfy, M., Ali, A.H.: A new fuzzy logic based pseudo-random bit generator for secure DS-CDMA Systems. In: 22nd URSI NRSC Conference, pp. 377–384, March 2005

  27. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, Ch. 8, pp. 409–518. Pearson Education (Singapore) Pte. Ltd., Delhi, India (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. K. ShreyamshaKumar.

Rights and permissions

Reprints and permissions

About this article

Cite this article

ShreyamshaKumar, B.K., Patil, C.R. JPEG image encryption using fuzzy PN sequences. SIViP 4, 419–427 (2010). https://doi.org/10.1007/s11760-009-0131-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-009-0131-6

Keywords