Browse > Article

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System  

김수민 (광운대학교 전자재료공학과)
서영호 (광운대학교 전자재료공학)
김동욱 (광운대학교 전자재료공학과)
Publication Information
Abstract
In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.
Keywords
Image Encryption; Chaotic System; JPEG2000; DWT;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 S. R. Ravi, et al., 'Securing Wireless Data: System Architecture Challenges', ISSS'02, pp. 195-200, Oct. 2002
2 문희태, 카오스와 비선형동역학, 서울대학교출판부, pp. 136-139, 2002
3 Jui-Cheng Yen, Jiun-In Guo, 'A new chaotic key-based design for image encryption and decryption', Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on, vol. 4, pp. 49-52, 28-31 May 2000   DOI
4 A. Ammar, A. Kabbany, A. Youssef, M. Amam, 'A secure image coding scheme using residue number system', Radio Science Conference, 2001. NRSC 2001. Proceedings of the Eighteenth National, Vol. 2, pp. 399-405, 27-29 March 2001   DOI
5 S. S. Maniccam, N. G. Bourbakis., 'SCAN Based Lossless Image Compression and Encryption', IEEE Trans. Image Processing, Vol. 3, No. 5, pp. 490-499, Sept. 1999   DOI
6 N. Bourbakis, A. Dollas, 'SCAN-based compression-encryption-hiding for video on demand', Multimedia, IEEE , Vol. 10Issue: 3, pp. 79-87, July-Sept. 2003   DOI   ScienceOn
7 서영호, Sujit Det, 김동욱, '웨이블릿 영역에서의 선택적 부분 영상 암호화'. 한국통신학회 논문지 Vol. 28 No. 6C, pp. 648-658, 2003. 6   과학기술학회마을
8 Sandra K. Miller, 'Facing the Challenge of Wireless Security', IEEE Computer Magazine, pp. 16-18, July 2001   DOI   ScienceOn
9 M. Salleh, S. Ibrahim, I.. F. Isnin, 'Enhanced chaotic image encryption algorithm based on baker's map', Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on , Vol. 2, pp. 508-511, May 25-28, 2003   DOI
10 J. Fridrich, 'Image encryption based on chaotic maps', 1997 IEEE International Conference on , Vol 2, pp. 1105-1110, 12-15 Oct. 1997   DOI
11 Belkhouche, F., Qidwai, U., 'Binary image encoding using 1D chaotic maps', IEEE Region 5, 2003 Annual Technical Conference, pp. 39-43, 11 April 2003
12 A. Said, W. A. Pearlman, 'A new, fast, and efficient image codec based on set partitioning in hierarchical trees', Circuits and Systems for Video Technology, IEEE Trans. on , Vol. 6Issue: 3, June 1996, pp. 243-250   DOI   ScienceOn
13 J. M. Shapiro, 'Embedded image coding using zerotrees of wavelet coefficients', Signal Processing, IEEE Trans. on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on], Vol. 41 Issue: 12, pp. 3445-3462, Dec. 1993   DOI   ScienceOn
14 Ianin E. G. Richardson, Video codec design developing image and video compression system, Wiley, pp. 79-92, 2002
15 M. Podesser, H. P. Schmidt, and A. Uhl, 'Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments', Proc. 5th Nordic Signal Processing Symposium, 2002
16 R. M. Rao, and A. S. Bopardikar, Wavelet Trans-forms, Introduction to Theory and Applications, Addison-Wesley, Readings MA, 1998
17 Martin Boliek, et al., JPEG 2000 Part I Final Draft International Standard, ISO/IEC JTCl/SC29 WG1, 24 Aug. 2000
18 G. J. Sullivan and R. L. Baker, 'Efficient Quadtree coding of images and videos', IEEE Trans. on Signal Processing, Vol. 3, pp. 327-331, May 1994   DOI   ScienceOn
19 P. P. Dang, P. M. Chau, 'Image Encryption for Secure Internet Multimedia Applications', IEEE Trans. on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, Aug. 2000   DOI   ScienceOn
20 I. Chisalita, N. Shahmehri, 'Issues in image utilization within mobile e-services' Proceedings of WET ICE 2001. Proceedings. pp. 62-67, 2001   DOI
21 J. D. Gibson, et al., Digital Compression for Multimedia, Principles and Standards, Morgan Kaufmann Pub., San Francisco CA, 1998