© The Institution of Engineering and Technology
The rapid growth in the use of multimedia information has made the security of data storage and transmission important in avoiding unlawful, unofficial, unauthorised and illegal use. Encryption is an efficient operation to protect multimedia data secret. A new image encryption approach that uses binary coded decimal (BCD) code-based decomposition, reordering and scrambling bit planes, and an encryption process is suggested in this study. Image decomposition using BCD code for image encryption is introduced in this study. A simple scrambling process is used to shuffle binary bit planes after re-ordering them. A shift column operation is applied to the image that is constructed after scrambling the bit planes to increase the security level. A performance analysis and a comparison with other encryption algorithms are conducted to prove the proposed algorithm's image encryption capabilities. The experimental results show that the suggested method protects secret images against common attacks with shorter encryption/decryption times.
References
-
-
1)
-
13. Fu, C., Lin, B., Miao, Y., et al: ‘A novel chaos-based bit-level permutation scheme for digital image encryption’, Opt. Commun., 2011, 284, (23), pp. 5415–5423 (doi: 10.1016/j.optcom.2011.08.013).
-
2)
-
35. Huang, C., Nien, H.: ‘Multi chaotic systems based pixel shuffle for image encryption’, Opt. Commun., 2009, 282, (11), pp. 2123–2127 (doi: 10.1016/j.optcom.2009.02.044).
-
3)
-
2. Moon, D., Chung, Y., Pan, S.B., Moon, K., Chung, K.I.: ‘An efficient selective encryption of fingerprint images for embedded processors’, ETRI J., 2006, 28, (4), pp. 444–452 (doi: 10.4218/etrij.06.0106.0013).
-
4)
-
31. Floyd, T.: ‘Digital fundamentals’ (Prentice-Hall, 2003, 1st edn.).
-
5)
-
3. Podesser, M., Schmidt, H., Uhl, A.: ‘Selective bitplane encryption for secure transmission of image data in mobile environments’. The Fifth Nordic Signal Processing Symp., Hurtiguten, Norway, 2002, pp. 1037–1042.
-
6)
-
32. Huang, C., Yen, C., Chen, C.: ‘The AES application in image using different operation modes’. The Fifth IEEE Conf. on in Industrial Electronics and Applications, Taichung, Taiwan, June 2010, pp. 393–398.
-
7)
-
14. Liu, H., Wang, X.: ‘Color image encryption using spatial bit-level permutation and high-dimension chaotic system’, Opt. Commun., 2011, 284, (16–17), pp. 3895–3903 (doi: 10.1016/j.optcom.2011.04.001).
-
8)
-
34. Schneier, B.: ‘Applied cryptography’ (John Wiley & Sons, 1994, 1996, 2nd edn.).
-
9)
-
15. Akhavan, A., Samsudin, A., Akhshani, A.: ‘A symmetric image encryption scheme based on combination of nonlinear chaotic maps’, J. Franklin Inst., 2011, 348, (8), pp. 1797–1813 (doi: 10.1016/j.jfranklin.2011.05.001).
-
10)
-
36. Hermassi, H., Rhouma, R., Belghith, S.: ‘Improvement of an image encryption algorithm based on hyper-chaos’, Telecommun. Syst., 2013, 52, (2), pp. 539–549.
-
11)
-
10. Chang, H., Hwang, H., Lee, C.: ‘Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain’, Opt. Commun., 2011, 284, (18), pp. 4146–4151 (doi: 10.1016/j.optcom.2011.04.065).
-
12)
-
28. Kamali, S., Shakerian, R., Hedayati, M., et al: ‘A new modified version of advanced encryption standard based algorithm for image encryption’. Int. Conf. on Electronics and Information Engineering, Kyoto, Japan, August 2010, pp. 1–5.
-
13)
-
18. Alexander, P., Massimiliano, Z.: ‘Chaotic map cryptography and security. Encryption: methods, software and security, horizons in computer science research’ (Nova Science Publishers, 2012), pp. 301–332.
-
14)
-
2. Akhshani, A., Behnia, S., Akhava, A., et al: ‘A novel scheme for image encryption based on 2D piecewise chaotic maps’, Opt. Commun., 2010, 283, (17), pp. 3259–3266 (doi: 10.1016/j.optcom.2010.04.056).
-
15)
-
5. Borujeni, E., Eshghi, M.: ‘Chaotic image encryption system using phase-magnitude transformation and pixel substitution’, Telecommun. Syst., 2013, 52, (2), pp. 525–537.
-
16)
-
25. Nandi, S., Kar, B., Chaudhuri, P.: ‘Theory and applications of cellular automata in cryptography’, IEEE Trans. Comput., 1994, 43, (12), pp. 1346–1357 (doi: 10.1109/12.338094).
-
17)
-
27. FIPS PUB 46–3: , 1999.
-
18)
-
17. Zhu, Z., Zhang, W., Wong, K., et al: ‘A chaos-based symmetric image encryption scheme using a bit-level permutation’, Inf. Sci., 2011, 181, (6), pp. 1171–1186 (doi: 10.1016/j.ins.2010.11.009).
-
19)
-
8. Borujeni, E.: ‘Speech encryption based on fast Fourier transform permutation’. The Seventh IEEE Int. Conf. on Electronics Circuits and Systems, Jounieh, Lebanon, April 2000, pp. 290–293.
-
20)
-
26. Daemen, J., Rijmen, V.: ‘The block cipher Rijndael, Smart card research and applications’ (Springer, Berlin Heidelberg, 2000), pp. 277–284.
-
21)
-
23. Yicong, Z., Panetta, K., Agaian, S.: ‘Image encryption algorithms based on Generalized P-Gray Code bit plane decomposition’. Conf. Record of the 43rd Asilomar Conf. on Signals Systems and Computers, California, USA, November 2009, pp. 400–404.
-
22)
-
21. Chen, L., Zhao, D., Ge, F.: ‘Image encryption based on singular value decomposition and Arnold transform in fractional domain’, Opt. Commun., 2013, 291, pp. 98–103 (doi: 10.1016/j.optcom.2012.10.080).
-
23)
-
19. Jiancheng, Z., Ward, R., Dongxu, Q.: ‘A new digital image scrambling method based on Fibonacci numbers’. Int. Symp. on Circuits and Systems, Vancouver, Canada, May 2004, pp. 965–972.
-
24)
-
19. Grangetto, M., Magli, E., Olmo, G.: ‘Multimedia selective encryption by means of randomized arithmetic coding’, IEEE Trans. Multimedia, 2006, 8, (5), pp. 905–917 (doi: 10.1109/TMM.2006.879919).
-
25)
-
22. Qiudong, S., Yan, W., Huang, J., Ma, W.: ‘Image encryption based on bit-plane decomposition and random scrambling’. Second Int. Conf. on Consumer Electronics Communications and Networks, Hubei, China, April 2012, pp. 2630–2633.
-
26)
-
6. Zhou, N., Wang, Y., Gong, L.: ‘Novel optical image encryption scheme based on fractional Mellin transform’, Opt. Commun., 2011, 284, (13), pp. 3234–3242 (doi: 10.1016/j.optcom.2011.02.065).
-
27)
-
24. Zheng, W., Cheng, Z., Yue, C.: ‘Image data encryption and hiding based on wavelet packet transform and bit planes decomposition’. Fourth Int. Conf. on Wireless Communications Networking and Mobile Computing, Dalian, China, September 2008, pp. 1–4.
-
28)
-
1. Han, W., Kim, H., Park, S., et al: ‘Optical image encryption based on XOR operations’, Opt. Eng., 1999, 38, (1), pp. 47–54 (doi: 10.1117/1.602060).
-
29)
-
12. Wadi, S., Zainal, N.: ‘Rapid encryption method based on AES Algorithm for gray scale HD image encryption’, Proc. Technol., 2013, 8C, (6), pp. 52–57.
-
30)
-
30. Wadi, S., Zainal, N.: ‘A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor’, J. Eng. Sci. Tech., 2013, 8, (4), pp. 406–415.
-
31)
-
9. Liu, Z., Xu, L., Liu, T., et al: ‘Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains’, Opt. Commun., 2011, 284, (1), pp. 123–128 (doi: 10.1016/j.optcom.2010.09.013).
-
32)
-
16. Ye, R.: ‘A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism’, Opt. Commun., 2011, 284, (22), pp. 5290–5298 (doi: 10.1016/j.optcom.2011.07.070).
-
33)
-
7. Ge, F., Chen, L., Zhao, D.: ‘A half-blind color image hiding and encryption method in fractional Fourier domains’, Opt. Commun., 2008, 281, (17), pp. 4254–4260 (doi: 10.1016/j.optcom.2008.04.056).
-
34)
-
Z. Wang ,
A.C. Bovik ,
H.R. Sheikh ,
E.P. Simoncelli
.
Image quality assessment: from error visibility to structural similarity.
IEEE Trans. Image Process.
,
4 ,
600 -
613
-
35)
-
20. Jiancheng, Z., Ward, R., Dongxu, Q.: ‘The generalized Fibonacci transformations and application to image scrambling’. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Montreal, Canada, May 2004, pp. 385–392.
-
36)
-
11. Hwang, H.: ‘An optical image cryptosystem based on Hartley transform in the Fresnel transform domain’, Opt. Commun., 2011, 284, (13), pp. 3243–3247 (doi: 10.1016/j.optcom.2011.03.030).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2014.0514
Related content
content/journals/10.1049/iet-ipr.2014.0514
pub_keyword,iet_inspecKeyword,pub_concept
6
6