Wavelet fusion for encrypting images with a few details

This paper introduces a new scheme for encrypting images with few details based on wavelet fusion..The fusion is a pre-processing step to change the homogeneity of flat areas in the images having a few details. RC6 or chaotic Baker map encryption are then performed on the fused image.Encryption with chaotic Baker map is just a permutation algorithm that cannot perform well on flat areas of the images, because the permutation yields approximately the same intensities. So, circular shifts on pixels are performed on the fused image prior to chaotic encryption to remove flat areas or reduce the degree of homogeneity.The robustness of the suggested image ciphering schemes is tested in the presence of noise before decryption. Simulation results demonstrated that the suggested image ciphering schemes provide a secure and effective way for encrypting images with few details. This paper introduces a new scheme for encrypting images with a few details based on wavelet fusion. In this scheme, the image with a few details to be encrypted is fused with another image that is rich in details utilizing the Discrete Wavelet Transform (DWT) prior to encryption. The fusion is a pre-processing step to change the homogeneity of flat areas in the images having a few details. RC6 or chaotic Baker map encryption are then performed on the fused image. Encryption with chaotic Baker map is just a permutation algorithm that cannot perform well on flat areas of the images, because the permutation yields approximately the same intensities. So, circular shifts on pixels are performed on the fused image prior to chaotic encryption to remove flat areas or reduce the degree of homogeneity. Chaotic encryption is then performed in the wavelet domain to increase the degree of diffusion. Several metrics are used in this paper for performance evaluation of the suggested ciphering schemes like visual inspection, histogram test, encryption quality analysis, and diffusion analysis. The robustness of the suggested image ciphering schemes is tested in the presence of noise before decryption. Simulation results demonstrated that the suggested image ciphering schemes provide a secure and effective way for encrypting images with few details.

[1]  H.M. Elkamchouchi,et al.  Measuring encryption quality for bitmap images encrypted with rijndael and KAMKAR block ciphers , 2005, Proceedings of the Twenty-Second National Radio Science Conference, 2005. NRSC 2005..

[2]  Guanrong Chen,et al.  On the security defects of an image encryption scheme , 2009, Image Vis. Comput..

[3]  Gonzalo Pajares Martinsanz,et al.  A wavelet-based image fusion tutorial , 2004 .

[4]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[5]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[6]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[7]  Emad S. Hassan,et al.  New interleaving scheme for CE-OFDM systems using chaotic maps , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.

[8]  Christine Pohl,et al.  Multisensor image fusion in remote sensing: concepts, methods and applications , 1998 .

[9]  Said Esmail El-Khamy,et al.  Chaotic interleaving scheme for single- and multi-carrier modulation techniques implementing continuous phase modulation , 2013, J. Frankl. Inst..

[10]  A. Wang,et al.  The Application of Wavelet Transform to Multi-modality Medical Image Fusion , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[13]  Gonzalo Pajares,et al.  A wavelet-based image fusion tutorial , 2004, Pattern Recognit..

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  Mohiy M. Hadhoud,et al.  Chaotic image encryption in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.

[16]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[17]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[18]  M. M. Fouad,et al.  Application of data encryption standard to bitmap and JPEG images , 2003, Proceedings of the Twentieth National Radio Science Conference (NRSC'2003) (IEEE Cat. No.03EX665).

[19]  Yikui Zhai,et al.  Improving Image Encryption Using Multi-Chaotic Map , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[20]  S. Udomhunsakul,et al.  Feature extraction in medical MRI images , 2004, IEEE Conference on Cybernetics and Intelligent Systems, 2004..

[21]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[22]  S.I. Ahson,et al.  Wavelet Based Image Encryption , 2008, 2008 9th International Conference on Signal Processing.

[23]  Tania Stathaki,et al.  Image Fusion: Algorithms and Applications , 2008 .