An efficient visually meaningful image encryption using Arnold transform

Image encryption is a quite well-developed area of multimedia security which helps to protect the confidentiality of authorized users' image content by converting it into an incomprehensible form. Most of the image encryption algorithms will generate encrypted images with noise-like or texture-like contents. Hence it's easy to distinguish natural images from encrypted images. The chances of attacks and image analysis by malicious people are more on images with noise-like or texture-like contents. This paper presents an efficient visually meaningful image encryption algorithm that uses integer discrete wavelet transform(DWT) and Arnold transform. The central idea of proposed scheme is to use a reference image to hide the original image in its encrypted form. Arnold transform has been used to transform the encrypted original image content before inserting it into the wavelet sub-bands of the reference image. The final encrypted image will look similar to the reference image, and the original image can be extracted and decrypted by an authorized person who has the valid decryption and data hiding key.

[1]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[2]  Yicong Zhou,et al.  Image encryption using a new parametric switching chaotic system , 2013, Signal Process..

[3]  Komal Patel,et al.  Image Encryption Using Different Techniques: A Review , 2011 .

[4]  Yicong Zhou,et al.  A new chaotic system for image encryption , 2012, 2012 International Conference on System Science and Engineering (ICSSE).

[5]  V. I. Arnolʹd,et al.  Ergodic problems of classical mechanics , 1968 .

[6]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[7]  Qing Zhou,et al.  A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..

[8]  Min Chen,et al.  Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.

[9]  Sos S. Agaian,et al.  Image encryption using P-Fibonacci transform and decomposition , 2012 .

[10]  Alex Biryukov,et al.  Substitution-Permutation (SP) Network , 2005, Encyclopedia of Cryptography and Security.

[11]  Tzung-Her Chen,et al.  Multi-image encryption by circular random grids , 2012, Inf. Sci..

[12]  Sos S. Agaian,et al.  Design of image cipher using latin squares , 2014, Inf. Sci..

[13]  Zhai Zheng-jun Survey on image encryption based on chaos , 2011 .

[14]  Ahmad Pahlavan Tafti,et al.  Digital Images Encryption in Frequency Domain Based on DCT and One Dimensional Cellular Automata , 2011 .

[15]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[16]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[17]  Maaly Awad S. Hassan,et al.  Image Encryption Using Differential Evolution Approach in Frequency Domain , 2011, ArXiv.

[18]  Hassan N. Noura,et al.  An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..

[19]  Yicong Zhou,et al.  Image encryption using the image steganography concept and PLIP model , 2011, Proceedings 2011 International Conference on System Science and Engineering.

[20]  Yicong Zhou,et al.  Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..

[21]  F. Dyson,et al.  Period of a Discrete Cat Mapping , 1992 .

[22]  Li Chang IMAGE ENCRYPTION TECHNIQUES: A SURVEY , 2002 .