skip to main content
10.1145/3136825.3136895acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Image encryption using wavelet transform over finite field

Published: 13 October 2017 Publication History

Abstract

This paper introduces the cryptosystem based on the theory of wavelet decomposition defined over Galois field. The encryption-decryption process is executed by the analysis and synthesis filter banks of wavelet transform. The cryptosys temoperated on block-cipher mode because data blocks serially encrypted by dividing large block into several small blocks using linear circular convolution. The input image is fed to decomposition block at different level and obtained the correlation coefficient between decomposed image and original image for each level. The comparative results of finite field and wavelet transformare obtained which indicates that finite field operation give better result. This method claims the benefits for image processing applications such as medical imaging, industries and military aspects.

References

[1]
F. Fekri, R. M. Mersereau, and R.W. Schafer, 1999, Theory of wavelet transforms over finite fields, Acoust. Speech, Signal Processing, pp. 605--608.
[2]
S. Saraireh and M. Benaissa, 2009. A Scalable Block Cipher Design Using Filter Banks and Lifting over Finite Fields, IEEE International Conference on Communications (ICC), Dresden, pp 1--5.
[3]
Patil, Bhushan D., Pushkar G. Patwardhan, and Vikram M. Gadre, 2008, Eigenfilter approach to the design of one-dimensional and multidimensional two-channel linear-phase FIR perfect reconstruction filter banks, IEEE Transactions on Circuits and Systems I: Regular Papers 55.11 pp. 3542--3551.
[4]
Mukund B Nagare, Bhushan D Patil, Raghunath S Holambe, 2017, A Multi Directional Perfect Reconstruction Filter Bank Designed with 2-D Eigenfilter Approach: Application to Ultrasound Speckle Reduction, Journal of Medical Systems.
[5]
P. P. Vaidyanathan and T. Nguyen, 1987, Eigenfilters: A new approach to least squares FIR filter design and applications including Nyquist filters, IEEE Transaction on Circuits and Systems, vol. 34, no. 1, pp. 1123.
[6]
S. Phoong and P.P. Vaidyanathan, 1997 Paraunitary filter banks over finite field, IEEE Trans. Signal Processing vol. 45, pp. 1443--1457.
[7]
Madhe, Swati P., Bhushan D. Patil, and Raghunath S. Holambe. 2017, On the Design of Arbitrary Shape Two-Channel Filter Bank Using Eigenfilter Approach, Circuits, Systems and Signal Processing: 1--12.
[8]
J. P. Gawande, A. D. Rahulkar, and R. S. Holambe, 2015 Design of new class of regular biorthogonal wavelet filter banks using generalized and hybrid lifting structures, Signal, Image and Video Processing, vol. 9, no. 1, pp. 265273.
[9]
A. D. Rahulkar and R. S. Holambe, 2012, Half-Iris Feature Extraction and Recognition Using a New Class of Biorthogonal Triplet Half-Band Filter Bank and Flexible k-out-of-n:APostclassifier, IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 230--240.
[10]
A. D. Rahulkar and R. S. Holambe, 2014, Iris Image Recognition: Wavelet Filter-banks Based Iris Feature Extraction Schemes. SpringerBriefs in Signal Processing
[11]
M. B. Nagare, B. D. Patil and R. S. Holambe, 2016, "Design of two-dimensional quincunx FIR filter banks using eigen filter approach," International Conference on Signal and Information Processing (IConSIP), Vishnupuri, pp. 1--5
[12]
FaramarzFekri, Russell M. Marsereau, Ronald W. Schafar; 2003, Two-band wavelets and filter banks over finite fields with connections to error control coding, in IEEE Trans. Signal Processing, vol. 51, pp. 3143--3151.
[13]
K.S. Chan. 2004, A Block Cipher Cryptosystem Using Wavelet Transforms Over Finite Fields, in IEEE Transactions on Signal Processing.
[14]
K. Seyed, H. Shakerian, R. Hedayati and M. R. Mohsen, 2010, New Modified version of Advance Encryption Standard Based Algorithm for Image Encryption, International Conference on Electronics and Information Engg.

Cited By

View all
  • (2024)Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix EncapsulationIEEE Transactions on Mobile Computing10.1109/TMC.2024.340706223:12(12313-12329)Online publication date: 1-Dec-2024
  • (2022)Image Block Cipher Based on Parameterized Cosine Transform over Finite Fields2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)10.1109/CISP-BMEI56279.2022.9979933(1-6)Online publication date: 5-Nov-2022
  • (2020)Image Cryptography using Multichannel Filterbank2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC)10.1109/R10-HTC49770.2020.9356971(1-5)Online publication date: 1-Dec-2020
  • Show More Cited By

Index Terms

  1. Image encryption using wavelet transform over finite field

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
    October 2017
    321 pages
    ISBN:9781450353038
    DOI:10.1145/3136825
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cryptography
    2. finite field
    3. two channel filter bank
    4. wavelet

    Qualifiers

    • Short-paper

    Conference

    SIN '17
    SIN '17: Security of Information and Networks
    October 13 - 15, 2017
    Jaipur, India

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix EncapsulationIEEE Transactions on Mobile Computing10.1109/TMC.2024.340706223:12(12313-12329)Online publication date: 1-Dec-2024
    • (2022)Image Block Cipher Based on Parameterized Cosine Transform over Finite Fields2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)10.1109/CISP-BMEI56279.2022.9979933(1-6)Online publication date: 5-Nov-2022
    • (2020)Image Cryptography using Multichannel Filterbank2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC)10.1109/R10-HTC49770.2020.9356971(1-5)Online publication date: 1-Dec-2020
    • (2018)A Parameterized Halfband Filterbank Design for Image Encryption2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)10.1109/ICIINFS.2018.8721324(32-35)Online publication date: Dec-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media