Denoising and error correction in noisy AES-encrypted images using statistical measures

Cryptography based techniques are used to secure confidential data from unauthorized access. These techniques are very good for the security and protection of the data but are very sensitive to noise. A single bit change in encrypted data can have a catastrophic impact on the decrypted data. This paper addresses the problem of removing bit errors in visual data which are encrypted using the AES algorithm in CBC mode (Cipher Block Chaining). We propose a noise removal approach based on the statistical analysis of each block during the decryption process. Three statistical measures are proposed, i.e. the global variance method (GVM), the mean local variance method (MLVM) and the sum of the squared derivative method (SSDM) for error correction. The proposed approach uses local statistics of the visual data and confusion/diffusion properties of the encryption algorithm to remove errors. Experimental results show that the proposed approach gives better results in removing noise and can be used for noise removal in visual data in the encrypted domain. HighlightsThis paper addresses the problem of removing bit errors in visual data which are encrypted using the AES algorithm in CBC mode.Three statistical measures are proposed, i.e. the global variance method (GVM), the mean local variance method (MLVM) and the sum of the squared derivative method (SSDM) for error correction.The proposed approach uses local statistics of the visual data and confusion/diffusion properties of the encryption algorithm to remove errors.Experimental results show that the proposed approach gives better results in removing noise and can be used for noise removal in visual data in the encrypted domain.

[1]  Emrullah Turhan Tunali,et al.  Scalable video encryption of H.264 SVC Codec , 2011, J. Vis. Commun. Image Represent..

[2]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[3]  Ziad Osman,et al.  Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics , 2009, 2009 Third International Conference on Network and System Security.

[4]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[5]  Anastasios Tefas,et al.  Image Watermarking: Techniques and Applications , 2009 .

[6]  Pradeep K. Atrey,et al.  Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[7]  Xi Chen,et al.  On the design of partial encryption scheme for multimedia content , 2013, Math. Comput. Model..

[8]  Zhiwei He,et al.  A New Method of Image Encryption/Decryption via Voice Features , 2009, 2009 2nd International Congress on Image and Signal Processing.

[9]  Upena D. Dalal,et al.  Enhancing selective ISMACryp video encryption for real time applications in handheld devices , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.

[10]  Mohsen Rahmani,et al.  A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.

[11]  Xiaolin Tian,et al.  A novel image encryption algorithm based on fractional fourier transform and magic cube rotation , 2011, 2011 4th International Congress on Image and Signal Processing.

[12]  Xingyuan Wang,et al.  A color image encryption with heterogeneous bit-permutation and correlated chaos , 2015 .

[13]  Ramesh Karri,et al.  Low cost concurrent error detection for the advanced encryption standard , 2004 .

[14]  Philumon Joseph,et al.  Reversible data hiding in selectively encrypted RGB images by reserving room in advance , 2014, 2014 First International Conference on Computational Systems and Communications (ICCSC).

[15]  A. S. Madhukumar,et al.  Error Detection and Correction in Communication Channels Using Inverse Gray RSNS Codes , 2011, IEEE Transactions on Communications.

[16]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[17]  Ramesh Karri,et al.  On-line error detection and BIST for the AES encryption algorithm with different S-box implementations , 2005, 11th IEEE International On-Line Testing Symposium.

[18]  Fangyan Nie,et al.  Image Segmentation Using Two-dimensional Extension of Minimum Within-class Variance Criterion , 2013 .

[19]  Zhihong Zhou,et al.  Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform , 2015 .

[20]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[21]  Hongjun Liu,et al.  Asymmetric color image encryption scheme using 2D discrete-time map , 2015, Signal Process..

[22]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[23]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[24]  Abhijit Mitra,et al.  An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images , 2008 .

[25]  William Puech,et al.  Noise removing in encrypted color images by statistical analysis , 2012, Other Conferences.

[26]  Xiaogang Wang,et al.  Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .

[27]  Israel Koren,et al.  Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.

[28]  Mohiy M. Hadhoud,et al.  Chaotic image encryption in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.

[29]  Malay Kishore Dutta,et al.  Edge based selective encryption scheme for biometric data using chaotic theory , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[30]  Lin Teng,et al.  A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive , 2012 .

[31]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[32]  Chun-I Fan,et al.  Controllable privacy preserving search based on symmetric predicate encryption in cloud storage , 2013, Future Gener. Comput. Syst..

[33]  Nahid Farhady Ghalaty,et al.  Software-based control flow error detection and correction using branch triplication , 2011, 2011 IEEE 17th International On-Line Testing Symposium.

[34]  B. Subramanyan,et al.  Image Encryption Based on AES Key Expansion , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[35]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[36]  Elankovan A. Sundararajan,et al.  Performance study of selective encryption in comparison to full encryption for still visual images , 2014, Journal of Zhejiang University SCIENCE C.

[37]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[38]  Weiming Zhang,et al.  Non-local Denoising in Encrypted Images , 2014, IOV.

[39]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[40]  Zhengjun Liu,et al.  Color image encryption by using Arnold and discrete fractional random transforms in IHS space , 2010 .

[41]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[42]  Sos S. Agaian,et al.  Design of image cipher using latin squares , 2014, Inf. Sci..

[43]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[44]  William Puech,et al.  Decryption of noisy encrypted images by statistical analysis , 2011, 3rd European Workshop on Visual Information Processing.

[45]  Maciej Nikodem,et al.  Error detection and error correction procedures for the advanced encryption standard , 2008, Des. Codes Cryptogr..

[46]  Jiang-Lung Liu,et al.  Efficient selective encryption for JPEG 2000 images using private initial table , 2006, Pattern Recognit..

[47]  Yicong Zhou,et al.  Image encryption using a new parametric switching chaotic system , 2013, Signal Process..

[48]  Nasharuddin Zainal,et al.  Rapid Encryption Method based on AES Algorithm for Grey Scale HD Image Encryption , 2013 .

[49]  Xiaomin Wang,et al.  Secure chaotic system with application to chaotic ciphers , 2013, Inf. Sci..

[50]  Mingoo Seok,et al.  R-processor: 0.4V resilient processor with a voltage-scalable and low-overhead in-situ error detection and correction technique in 65nm CMOS , 2014, 2014 Symposium on VLSI Circuits Digest of Technical Papers.