DOI QR코드

DOI QR Code

쿼드트리 방식의 프레넬릿 변환을 이용한 영상의 암호화 기법

A New Image Encryption Method using Quad-tree based Fresnelet Transform

  • Seo, Young-ho (School of Liberal Arts, Kwangwoon University) ;
  • Lee, Yoon-hyuk (Department of Electronic Materials Engineering, Kwangwoon University) ;
  • Kim, Dong-wook (Department of Electronic Materials Engineering, Kwangwoon University)
  • 투고 : 2015.08.19
  • 심사 : 2015.09.25
  • 발행 : 2015.12.31

초록

본 논문에서는 이산 프레넬릿 변환(Fresnelet transform, FRNLT)을 이용하여 2차원 자연 영상의 중요 성분을 추적하고 암호화하는 방법을 제안한다. FRNLT을 통해서 얻어진 부대역의 특성을 분석하여 영상을 암호화하기 위한 정보를 추출한다. FRNLT 레벨, 부대역의 에너지, 그리고 시각적인 효과를 고려하여 암호화를 위한 최적화된 지점을 도축한다. 다양한 레벨과 암호화 영역을 선택함으로써 다양한 강도로 암호화가 가능하다. 암호화 효과는 정량적인 PSNR 결과, 암호화를 위한 CPU 시간, 암호화 영역의 크기, 그리고 시각적인 영향 등의 항으로 분석하여 경향성을 제시한다. 따라서 별도의 분석과정 없이 본 논문에서 제시된 파라미터를 이용하여 응용분야에 따라서 효율적으로 암호화를 수행할 수 있다. 실험결과를 살펴보면 $L_{TH}=4$이고 $E_{TH}=60$인 경우에 전체 데이터 중에서 0.42%만을 암호화하여도 원래의 영향을 분간할 수 없을 만큼 암호화 효과를 얻을 수 있었다.

This paper proposes a new method which traces significant element of 2-dimensional natural images and encrypts them by using Fresnelet transform (FRNLT). After analyzing property of the subbands obtained by the FRNLT, we estimated the information for ciphering 2D images. Considering FRNLT levels, energy of subbands, and visual effect, we estimated the optimized point for encryption. By selecting various levels and encrypting region, we can encrypt 2D image with various robustness. Encryption effectiveness was showed by analyzing numerical result, executing time for encryption, area of encrypted region, and visual observation. Therefore encryption for various application can be applied by using the suggested parameters without additional analysis. Identifying the experimental result, in the case of $L_{TH}=4$ and $L_{TH}=4$, an image was not recognized through encrypting only 0.42% among the entire data.

키워드

참고문헌

  1. L. Qiao and K. Nahrstedt, "Comparison of MPEG Encryption Algorithms," International Journal on Computer and Graphics(Special Issue on Data Security in Image Communication and Networks), Vol. 22, No. 3, pp. 437-444, 1998.
  2. A. M. Alattar, et al., "Improved Selective Encryption Techniques for Secure Transmission of MPEG Video bit-Streams," International Conference on Image Processing (ICIP)'99, 1999.
  3. C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. Of ACM Multimedia 1998, pp. 81-88, 1998.
  4. Sung-Ho Park, Hyun-Jun Choi, Young-Ho Seo, and Dong-Wook Kim, "Ciphering Scheme and Hardware Implementation for MPEG-Based Image/Video Security," Journal of The Institute of Electronics and Information Engineers, vol.42, no.2, pp. 27-36, March. 2005.
  5. Ho-Joon Lee, Hyung-Jun Lee, "Digital data Encryption on Digital Video Recorder System," Journal of the korean institute of communications and information sciences, vol.32, no.12, pp. 457-462, December. 2007.
  6. H. Chaeng and X. Li, "Partial Encryption of Compressed Images and Videos," IEEE Trans, on Signal Processing, Vol. 48, No. 8, pp. 2439-2451, Aug. 2000. https://doi.org/10.1109/78.852023
  7. A. Pommer and A. uhl, "Wavelet Packet Methods for Multimedia Compression and Encryption," IEEE Pacific Rim Conf. On Communications, Computers, and Signal Processing, pp. 1-4, 2001.
  8. A. Pommer and A. Uhl, "Selective Encryption of Wavelet Packet Subband Structures for Obscured Transmission of Visual Data," IEEE Benerux Signal Processing Symposium, pp. 25-28, 2002.
  9. X. Wu and P. W. Moo, "Joint Image/Video Compression and Encryption via High-Order Conditional Entropy Coding of Wavelet Coefficients," Int'l Conference on Multimedia Computing and Systems, pp. 908-912, 1999.
  10. T. Uehara and R. Safavi-Naini, "Attacking and Mending Arithmetic Coding Entropy Schemes," Proc. Of Australian Science Conference, pp. 408-419, Jan. 1999.
  11. P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet Multimedia Applications," IEEE Trans. on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, Aug. 2000. https://doi.org/10.1109/30.883383
  12. M. Podesser, H. P. Schmidt, and A. Uhl, "Selective Bitplane Encryption for Secure Transmission of Image data in Mobile Environments," Proc. 5th Nordic Signal Processing Symposium, 2002.
  13. Ran Tao, Xiang-Yi Meng, Wang Yue, "Image Encryption with Multiorders of Fractional Fourier Transforms," IEEE Transactions on Information Forensics and Security, vol.5, no.4, pp.734-738, Dec, 2010. https://doi.org/10.1109/TIFS.2010.2068289
  14. A.S. Rajput, N. Mishra, S. Sharma, "Towards the Growth of Image Encryption and Authentication Schemes," 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.454-459, 22-25 Aug, 2013.
  15. A.M. Elshamy, A.N.Z. Rashed, A.E.A. Mohamed, O.S. Faragalla, Yi Mu, S.A. Alshebeili, F.E.A. El-Samie, "Optical Image Encryption Based on Chaotic Baker map and Double Random Phase Encoding," Journal of Lightwave Technology, vol.31, no.15, pp.2533-2539, 2013. https://doi.org/10.1109/JLT.2013.2267891
  16. G. J. Sullivan and R. L. Baker, "Efficient Quadtree Coding of Images and Videos," IEEE Trans. on Signal Processing, Vol. 3, pp. 327-331, May 1994.
  17. Young-Ho Seo, Moon Seok Kim, Dong-Wook Kim, "Quad-tree Subband Quantizer Design for Digital Hologram Encoding Based on Fresenelet," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 5, pp. 1180-1188 May. 2015. https://doi.org/10.6109/jkiice.2015.19.5.1180
  18. Youngho Seo, Eui-Sun Choi, Dong-Wook Kim, "Efficient Encryption Technique of Image Using Packetized Discrete Wavelet Transform," Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 3, pp. 603-611 March. 2013. https://doi.org/10.6109/jkiice.2013.17.3.603