Homomorphic image encryption

This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component. A comparison study is held between the RC6 block cipher algorithm and the chaotic Baker map algorithm for the encryption of the reflectance component. We present a security analysis for the proposed cryptosystem against the entropy, brute-force, statistical, and differential attacks from a strict cryptographic viewpoint. Experimental results verify and prove that the proposed homomorphic image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that this cryptosystem has a very powerful diffusion mechanism (a small change in the plain text makes a great change in the cipher image). The homomorphic encryption using RC6 algorithm is more secure than that using the chaotic Baker map algorithm but not robust to noise. Thus, the proposed homomorphic cryptosystem can be used in different applications, depending on the core algorithm used.

[1]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[2]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[3]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[4]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[5]  Guanrong Chen,et al.  Chaos-Based Image Encryption , 2005 .

[6]  Osama S. Farag Allah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .

[7]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[8]  V. Chandrasekaran,et al.  Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[10]  Narendra Singh,et al.  Optical image encryption using fractional Fourier transform and chaos , 2008 .

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  Yikui Zhai,et al.  Improving Image Encryption Using Multi-Chaotic Map , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[13]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[14]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[15]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[16]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[17]  E. Bradley AUTONOMOUS EXPLORATION AND CONTROL OF CHAOTIC SYSTEMS , 1995 .

[18]  Nikolaos G. Bourbakis,et al.  Image encryption method using a class of fractals , 1995, J. Electronic Imaging.

[19]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[20]  Jae S. Lim,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[21]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[22]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[23]  Henry Ker-Chang Chang,et al.  A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..

[24]  Chung Jung Kuo,et al.  Novel image encryption technique and its application in progressive transmission , 1993, J. Electronic Imaging.

[25]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[26]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .