A secure image encryption algorithm based on polar decomposition

In this paper, a novel image encryption technique is proposed based on reference sets with some prime numbers and polar decomposition. In this technique, a primary secret key and reference sets are used in the generation of feature vector using a recursive random number generation (RRNG) process. This feature vector is then used for encryption process. Finally, a reliable decryption process has been presented to reconstruct the original image. The Simulated results demonstrate the efficiency and robustness of the proposed technique.

[1]  Wei Zhang,et al.  Image encryption based on three-dimensional bit matrix permutation , 2016, Signal Process..

[2]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[3]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[4]  Li Dong,et al.  Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[6]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[7]  Ting Liu,et al.  Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains , 2011 .

[8]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[9]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .

[10]  Gaurav Bhatnagar,et al.  A Novel Image Encryption Framework Based on Markov Map and Singular Value Decomposition , 2011, ICIAR.

[11]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[12]  Zhou Wang,et al.  Modern Image Quality Assessment , 2006, Modern Image Quality Assessment.

[13]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[14]  N. Higham Computing the polar decomposition with applications , 1986 .

[15]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Linfei Chen,et al.  Image encryption with fractional wavelet packet method , 2008 .