Temporal Ordered Image Encryption

The existing image encryption algorithms encrypt images independently, which means the probability of an eavesdropper working out one image stays the same under the same circumstances (same bits of keys and the same algorithm, for example). However, in real-life applications such as communication systems, on one hand, sequences of images may need to be sent with various security demands, and on the other hand, the temporal order of sequences of images may be changed. This paper proposes a novel idea to integrate the notion of temporal order with cryptosystems. Experimental results show that satisfactory security performance is achieved when the order for the sequence of images is changed.

[1]  Karel Vlcek,et al.  Improving Chaos Image Encryption Speed , 2009 .

[2]  Kwok-Wo Wong,et al.  A fast image encryption and authentication scheme based on chaotic maps , 2010 .

[3]  Seymour Lipschutz,et al.  Schaum's outline of theory and problems of set theory and related topics , 1964 .

[4]  Antony Galton,et al.  A Critical Examination of Allen's Theory of Action and Time , 1990, Artif. Intell..

[5]  James F. Allen Towards a General Theory of Action and Time , 1984, Artif. Intell..

[6]  D. McDermott A Temporal Logic for Reasoning About Processes and Plans , 1982, Cogn. Sci..

[7]  Ganapati Panda,et al.  Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .

[8]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[10]  Bertram C. Bruce A Model for Temporal References and Its Application in a Question Answering Program , 1972, Artif. Intell..

[11]  P. Vanbeek Reasoning about qualitative temporal information , 1992 .

[12]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[13]  Brian Knight,et al.  A General Temporal Theory , 1994, Comput. J..

[14]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[15]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[16]  Brian Knight,et al.  Representing The Dividing Instant , 2003, Comput. J..

[17]  Shailendra N. Kulkarni,et al.  A Robust Image Encryption Technique Based on Random Vector , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[18]  Patrick J. Hayes,et al.  Moments and points in an interval‐based temporal logic , 1989, Comput. Intell..

[19]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[20]  Eamonn J. Keogh,et al.  Detecting time series motifs under uniform scaling , 2007, KDD '07.

[21]  T. Bata,et al.  Improving Chaos Image Encryption Speed , 2009 .

[22]  Ramón Rodríguez-Vera,et al.  Image encryption based on phase encoding by means of a fringe pattern and computational algorithms , 2006 .

[23]  S. R. Mahadeva Prasanna,et al.  A Partial Image Encryption Method with Pseudo Random Sequences , 2006, ICISS.

[24]  Yang-Sae Moon,et al.  General match: a subsequence matching method in time-series databases based on generalized windows , 2002, SIGMOD '02.

[25]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[26]  Guoxing Zhao,et al.  An Ontological Characterization of Time-Series and State-Sequences for Data Mining , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.

[27]  Jiawei Han,et al.  Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data , 2007, VLDB.

[28]  Yoav Shoham,et al.  Temporal Logics in AI: Semantical and Ontological Considerations , 1987, Artif. Intell..

[29]  Drew McDermott,et al.  A Temporal Logic for Reasoning About Processes and Plans , 1982, Cogn. Sci..