Abstract
The recent explosion in multimedia and networking application places a great demand on efficient transmission of images at low bit rate with high security. Mixing several existing standard encryption techniques with image encoding tends to change the compression ratio greatly. In this paper, a novel image encryption algorithm is embedded as a part of JPEG image encoding scheme to meet three major necessities: (1) to provide temporal security against casual observer, (2) to preserve the compression ratio, (3) remain compliant with the JPEG file format. In the proposed algorithm, the modified DCT blocks are confused by a fuzzy PN sequence. In addition to that, the DCT coefficients of each modified DCT block are converted to unique uncorrelated symbols, which are confused by another fuzzy PN sequence. Finally, the variable length encoded bits are encrypted by chaotic stream cipher. An amalgamation of all the three techniques with random combination of seeds will provide the required security against the casual listener/observer where the security needed is only in-terms of few hours.
Similar content being viewed by others
Abbreviations
- AES:
-
Advanced encryption standard
- SFC:
-
Space filling curves
- PN:
-
Pseudo random noise
- FRIG:
-
Fuzzy random index generator
- RLE:
-
Run length encoding
- VLC:
-
Variable length coding
- DQDC:
-
Difference of quantized DC
References
Yen, J.C., Guo, J.I.: A new image encryption system and its VLSI architecture. In: IEEE Workshop on Signal Processing Systems, Taipei, pp. 430–437 (1999)
Balasubramanian, S.: Image encryption using infinite series convergence. In: Proceedings of the 18th International Conference on Systems Engineering (ISCEng), pp. 257–262, August 2005
El-Khamy, S.E., Lotfy, M., Ali, A.H.: A new color image encryption technique utilizing fuzzy pseudo-random bit generator. In: Proceedings of 22nd National Radio Science Conference (NRSC), pp. 185–194, March 2005
Mitra A., Subba Rao Y.V., Prasanna S.R.M.: A new image encryption approach using combinational permutation techniques. Int. J. Comput. Sci. 1(2), 127–131 (2006)
Prasanna S.R.M., Subba Rao Y.V., Mitra A.: An image encryption method with magnitude and phase manipulation using carrier images. Int. J. Comput. Sci. 1(2), 132–137 (2006)
Bourbakis N., Alexopoulos C.: Picture data encryption using SCAN pattern. Pattern Recognit. 25(6), 567–581 (1992)
Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: Proceedings of seventh International Conference on Parallel and Distributed Computing, Application and Technologies (PDCAT’06), pp. 61–66 (2006)
Pichler, F., Scharinger, J.: Efficient image encryption based on chaotic maps. In: Proceedings of 20th Workshop of the Austrian Association for Pattern Recognition, pp. 159–170. Leibnitz, Austria (1996, preprint)
Li, S.,Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS’02), vol. 2, pp. 708–711 (2002)
Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), pp. 406–408, September 2005
Gu, G., Han, G.: An enhanced chaos based image encryption algorithm. In: IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC’06), vol. 1, pp. 492–495, September 2006
Rodriguez J.A.M., Rodriguez-Vera R.: Image encryption based on phase encoding by means of a fringe pattern and computational algorithms. Revista Mexicana De F’Isica 52(1), 53–63 (2006)
Gurijala, A., Khayam, S.A., Radha, H., Deller, J.R. Jr.: On encryption-compression tradeoff pre/post-filtered images. In: SPIE Conference on Mathematics of Data/Image Coding, Compression and Encryption VIII with Applications, San Diego CA, vol. 5915, No. 1, pp. 591–601, August 2005
Chen T.S., Chang C.C., Hwang M.S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10), 1485–1488 (1998)
Cheng H., Li X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000)
Droogenbroeck, M.V.: Partial encryption of images for real-time applications. In: Proceedings of fourth Benelux Signal Processing Symposium, pp. 11–15, April 2004
Puech, W., Rodrigues, J.M.: Crypto-compression of medical images by selective encryption of DCT. In: 13th European Signal Processing Conference, September 2005
Droogenbroeck, M.V., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS’02), pp. 90–97, September 9–11, 2002
Pennebaker W.B., Mitchell J.L.: JPEG Still Image Compression Standard. Van Nostrand Reinhold, New York (1993)
Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of the Eighth International Conference on Information Visualization, pp. 217–220, July 2004
Zeng W., Lei S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia 5(1), 118–129 (2003)
Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW), pp. 160–163, June 2006
Matias, Y., Shamir, A.: A video scrambling technique based on space filling curves. In: Proceedings of Advances in Cryptology—CRYPTO’87. Springer LNCS, vol. 293, pp. 398–417 (1987)
Wang L.T., McCluskey E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302–1306 (1988)
Fuster A., Garcia L.J.: An efficient algorithm to generate binary sequences for cryptographic purposes. Theor. Comput. Sci. 259, 679–688 (2001)
El-Khamy, S.E., Lotfy, M., Ali, A.H.: A new fuzzy logic based pseudo-random bit generator for secure DS-CDMA Systems. In: 22nd URSI NRSC Conference, pp. 377–384, March 2005
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, Ch. 8, pp. 409–518. Pearson Education (Singapore) Pte. Ltd., Delhi, India (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
ShreyamshaKumar, B.K., Patil, C.R. JPEG image encryption using fuzzy PN sequences. SIViP 4, 419–427 (2010). https://doi.org/10.1007/s11760-009-0131-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11760-009-0131-6