Open Access Open Access  Restricted Access Subscription or Fee Access

FPGA Implementation of an Enhanced Encryption Then Compression System for Image Security

H. Suneera, Rahul M. Nair

Abstract


Image Encryption is the method of transforming information using an algorithm called cipher to make it meaningless to anyone except those having special knowledge, usually referred to as a key. Sometimes the one time key is not secured when encryption take place and decrypted image is not similar as the original image.  This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. Here we design a highly efficient system for image Encryption-Then-Compression (ETC), where both lossless and lossy compression are considered. In this paper data compression uses Run Length Encoding (RLE) technique because this method has the ability to generate an exact output with low power consumption and reduced time delay. Also the encryption is run by using clustering and random Permutation. In contrast, most of the existing ETC solutions induce significant penalty on the compression efficiency, so I was done a literature survey for the existing systems and proposed scheme. Here I proposed to implement the system in SPARTAN 6 FPGA and simulated using Xilinx ISE 14.7 software.


Keywords


Compression, Cryptography, Encryption, Security.

Full Text:

PDF

References


Jiantao Zhou, Xianming Liu, Oscar C. Au, Yuan Yan Tang, (2014), “Designing an Efficient Image ncryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 1.

A. Alfalou, C. Brosseau, N. Abdallah, M. Jridi, “Simultaneous fusion, compression, and encryption of multiple images”, Optics express, Vol. 19. 24, pp 24023-24029, Nov 2011.

A.Gautam, M. Panwar, Dr.P.R Gupta “A New Image Encryption Approach Using Block Based Transformation Algorithm” 2011 (IJAEST) Vol No. 8, Issue No. 1, 090 - 096.

T. Bianchi, A. Piva, and M. Barni, “Encrypted domain DCT based on homomorphic cryptosystems,” EURASIP J. Inf. Security, 2009, Article ID 716357.

Bianchi, A. Piva, and M. Barni, (2009), “On the implementation of the discrete Fourier transform in the encrypted domain”, IEEE Trans. Inf.Forensics Security, vol. 4, no. 1, pp. 86–97

Feng-Yang Hsieh1, Chia-Ming Wang, Chun-Chieh Lee And Kuo-Chin Fan, ,short paper , “A Lossless Image Coder Integrating Predictors And Block-Adaptive Prediction” Journal Of Information Science And Engineering, 1579-1591 (2008).

W. Liu, W.J. Zeng, L. Dong, and Q.M. Yao, “Efficient Compression of Encrypted Grayscale Images” IEEE Trans. on Image. Process. vol. 19, no. 4, pp. 1097–1102, April 2010.

Mohammed Ali Bani and Aman Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption”, IJCSNS International Journal of Computer Science and Network Security, VOL.8, April 2008.

A. Razzaque, N. V. Thakur, “Image compression and encryption: an overview”, International Journal of Engineering Research & Technology, Vol. 1. 5, pp. 1-7, July 2012.

L. S. Sam, P. Devaraj and R. S. Bhuvaneswaran, “A novel image cipher based on mixed transformed logistic maps”, Journal of Multimedia Tools and Applications, DOI 10.1007/s11042-010-0652-6, (2010)

Xinpeng Zhang, “Lossy Compression and Iterative Reconstruction for Encrypted Images,” IEEE Trans. Information Forensics and Security, Vol. 6, No. 1, pp. 53-58, Mar. 2011.

Zhang yungpeng, Zhai Zheng-jun “Digital Image Encryption Algorithm Based on Chaos and Improved DES” 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.