Open Access Open Access  Restricted Access Subscription or Fee Access

Chaotic Image Encryption and Compression in Transform Domains

Ensherah A. Naeem, Mustafa M. Abd Elnaby, Osama S. Faragallah

Abstract


There are two operations for fast and protected
information transmission. The first, is an operation of encryption, which aims to modify the compressed information to make them unreadable to whoever does not have the necessary authorization to see them.
The second is an operation of compression which consists in
reducing the size of information to be transmitted, by removing redundant information of them. However, these two operations are often carried out separately, although they are strongly bound and one influences on the other. We propose, in this article, to carry out these two operations (compression and encryption) together in different transform domains.
The discrete cosine transform (DCT), the integer wavelet transform (IWT) and the discrete wavelet transform (DWT) are exploited in the proposed encryption approach. Chaotic encryption and lossy JPEG compression are performed in these transform domains to make use of the characteristics of each domain.
A comparison study between all transform domain encryption
schemes and jpeg compression is held in the presence of different attacks.


Keywords


Chaotic Baker Map, DCT, DWT, IWT, Image Encryption, Lossy JPEG Compression

Full Text:

PDF

References


Shaimaa A. El-said, Khalid F. A. Hussein, & Mohamed M. Fouad, “Securing Image Transmission Using In- Compression Encryption Technique”, Computer Science and Security (IJCSS) Volume 4, Issue 5, 2010.

J. Fridrich, “Symmetric Ciphers Based on Two-dimensional Chaotic Maps”, Int. J. Bifurcation and Chaos, Vol. 8, pp.1259-1284, 1998.

Wei– Yi Wei, “An introduction to image compression”, National Taiwan University.

JPEG, “Joint Photographic Expert Group, JPEG Home Page”, Retrieved from http://www.jpeg.com.

Ken Cabeen and Peter Gent, “Image compression and discrete cosine transform”, College of the Redwoods

N.A Flayh, S.I. Ahson, "Wavelet Based Image Encryption", Proceedings of the 9th International Conference on Signal Processing (ICSP), pp. 797 – 800, 2008.

S. Li, X. Zheng, X. Mou, and Y. Cai, "Chaotic Encryption Scheme for Real-time Digital Video," In Real-Time Imaging VI, Proceedings of SPIE vol. 4666, pp. 149–160, 2002.

Y. Zhai ,S. Lin, Q. Zhang '' Improving Image Encryption Using Multi-chaotic Map '' Proceedings of the Power Electronics and Intelligent Transportation System (PEITS), pp,143-148 , 2008

C. E. Shannon, "Communication theory of secrecy system," Bell Syst Tech J 656-715, 1949.

S. Li, G. Chen and X. Zheng, "Chaos-based encryption for digital images and videos," chapter 4 in Multimedia Security Handbook, February 2004.

X Zhang and W. Chen,'' A New Chaotic Algorithm for Image Encryption'' Proceedings of the International Conference on Audio, Language and Image Processing (ICALIP), pp, 889 – 892, 2008.

X. Tong, Minggen Cui, '' A Novel Image Encryption Scheme Based On Feedback and 3D Baker'' Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing,. (WiCOM ),pp, 1 – 4 , 2008.

Y.B. Mao, G. Chen, "Chaos-based Image Encryption," Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics. New York: Springer-Verlag, 2004.

C.C. Chang, M.S. Hwang, T.S. Chen, "A New Encryption Algorithm for Image Cryptosystems," Journal of Syst. Software 58 (2001), pp. 83–91.

H. E. H. Ahmed, H. M. Kalash, and O. S. Farag Allah, "Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images”. Proceedings of the International Journal of Computer, Information, and Systems Science, and Engineering, pp. 33-39, 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.