access icon free Decomposition by binary codes-based speedy image encryption algorithm for multiple applications

The rapid growth in the use of multimedia information has made the security of data storage and transmission important in avoiding unlawful, unofficial, unauthorised and illegal use. Encryption is an efficient operation to protect multimedia data secret. A new image encryption approach that uses binary coded decimal (BCD) code-based decomposition, reordering and scrambling bit planes, and an encryption process is suggested in this study. Image decomposition using BCD code for image encryption is introduced in this study. A simple scrambling process is used to shuffle binary bit planes after re-ordering them. A shift column operation is applied to the image that is constructed after scrambling the bit planes to increase the security level. A performance analysis and a comparison with other encryption algorithms are conducted to prove the proposed algorithm's image encryption capabilities. The experimental results show that the suggested method protects secret images against common attacks with shorter encryption/decryption times.

Inspec keywords: image processing; binary codes; cryptography

Other keywords: simple scrambling process; Image decomposition; scrambling bit planes; multimedia information; multiple applications; BCD; binary code decomposition; binary coded decimal; binary bit planes; multimedia data secret; data storage; encryption-decryption; secret images; data transmission; shift column operation; code based decomposition; speedy image encryption algorithm

Subjects: Codes; Data security; Computer vision and image processing techniques; Cryptography; Optical, image and video signal processing

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
      • 31. Floyd, T.: ‘Digital fundamentals’ (Prentice-Hall, 2003, 1st edn.).
    5. 5)
      • 3. Podesser, M., Schmidt, H., Uhl, A.: ‘Selective bitplane encryption for secure transmission of image data in mobile environments’. The Fifth Nordic Signal Processing Symp., Hurtiguten, Norway, 2002, pp. 10371042.
    6. 6)
      • 32. Huang, C., Yen, C., Chen, C.: ‘The AES application in image using different operation modes’. The Fifth IEEE Conf. on in Industrial Electronics and Applications, Taichung, Taiwan, June 2010, pp. 393398.
    7. 7)
    8. 8)
      • 34. Schneier, B.: ‘Applied cryptography’ (John Wiley & Sons, 1994, 1996, 2nd edn.).
    9. 9)
    10. 10)
      • 36. Hermassi, H., Rhouma, R., Belghith, S.: ‘Improvement of an image encryption algorithm based on hyper-chaos’, Telecommun. Syst., 2013, 52, (2), pp. 539549.
    11. 11)
    12. 12)
      • 28. Kamali, S., Shakerian, R., Hedayati, M., et al: ‘A new modified version of advanced encryption standard based algorithm for image encryption’. Int. Conf. on Electronics and Information Engineering, Kyoto, Japan, August 2010, pp. 15.
    13. 13)
      • 18. Alexander, P., Massimiliano, Z.: ‘Chaotic map cryptography and security. Encryption: methods, software and security, horizons in computer science research’ (Nova Science Publishers, 2012), pp. 301332.
    14. 14)
    15. 15)
      • 5. Borujeni, E., Eshghi, M.: ‘Chaotic image encryption system using phase-magnitude transformation and pixel substitution’, Telecommun. Syst., 2013, 52, (2), pp. 525537.
    16. 16)
    17. 17)
      • 27. FIPS PUB 46–3: ‘Data encryption standard (DES)’, 1999.
    18. 18)
    19. 19)
      • 8. Borujeni, E.: ‘Speech encryption based on fast Fourier transform permutation’. The Seventh IEEE Int. Conf. on Electronics Circuits and Systems, Jounieh, Lebanon, April 2000, pp. 290293.
    20. 20)
      • 26. Daemen, J., Rijmen, V.: ‘The block cipher Rijndael, Smart card research and applications’ (Springer, Berlin Heidelberg, 2000), pp. 277284.
    21. 21)
      • 23. Yicong, Z., Panetta, K., Agaian, S.: ‘Image encryption algorithms based on Generalized P-Gray Code bit plane decomposition’. Conf. Record of the 43rd Asilomar Conf. on Signals Systems and Computers, California, USA, November 2009, pp. 400404.
    22. 22)
    23. 23)
      • 19. Jiancheng, Z., Ward, R., Dongxu, Q.: ‘A new digital image scrambling method based on Fibonacci numbers’. Int. Symp. on Circuits and Systems, Vancouver, Canada, May 2004, pp. 965972.
    24. 24)
    25. 25)
      • 22. Qiudong, S., Yan, W., Huang, J., Ma, W.: ‘Image encryption based on bit-plane decomposition and random scrambling’. Second Int. Conf. on Consumer Electronics Communications and Networks, Hubei, China, April 2012, pp. 26302633.
    26. 26)
    27. 27)
      • 24. Zheng, W., Cheng, Z., Yue, C.: ‘Image data encryption and hiding based on wavelet packet transform and bit planes decomposition’. Fourth Int. Conf. on Wireless Communications Networking and Mobile Computing, Dalian, China, September 2008, pp. 14.
    28. 28)
    29. 29)
      • 12. Wadi, S., Zainal, N.: ‘Rapid encryption method based on AES Algorithm for gray scale HD image encryption’, Proc. Technol., 2013, 8C, (6), pp. 5257.
    30. 30)
      • 30. Wadi, S., Zainal, N.: ‘A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor’, J. Eng. Sci. Tech., 2013, 8, (4), pp. 406415.
    31. 31)
    32. 32)
    33. 33)
    34. 34)
    35. 35)
      • 20. Jiancheng, Z., Ward, R., Dongxu, Q.: ‘The generalized Fibonacci transformations and application to image scrambling’. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Montreal, Canada, May 2004, pp. 385392.
    36. 36)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2014.0514
Loading

Related content

content/journals/10.1049/iet-ipr.2014.0514
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading