Browse > Article
http://dx.doi.org/10.12673/jant.2016.20.6.625

Color Image Encryption Technique Using Quad-tree Decomposition Method  

Choi, Hyunjun (Department of Electronic Engineering, Mokpo Maritime University)
Abstract
Recently, various types of image contents are being produced, and interest in copyright protection technology is increasing. In this paper, we propose an image encryption technology for color images. This technique divides the image into RGB color components and then performs quad-tree decomposition based on the edge of image. After the quad-tree partitioning, encryption is performed on the selected blocks. Encryption is performed on color components to measure encryption efficiency, and encryption efficiency is measured even after reconstitution into a color image. The encryption efficiency uses a visual measurement method and an objective image quality evaluation method. The PSNR values were measured as 7~10 dB for color difference components and 16~19 dB for color images. The proposed image encryption technology will be used to protect copyright of various digital image contents in the future.
Keywords
Digital contents; Copyright; Image encryption; Quad-tree decomposition; Color image;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 W. Stallings, Cryptography and Network Security, Principles and Practices, New Jersey, NJ: Prentice Hall 2003.
2 Y. H. Seo, H. J. Choi, J. S. Yoo and D. W. Kim, "Selective and adaptive signal hiding technique for security of JPEG2000," International Journal of Imaging Systems and Technology, Vol.23, No. 3, pp. 277-284, Aug. 2010.
3 Y. H. Seo, E. S. Choi, and D. W. Kim, "Efficient encryption technique of image using packetized discrete wavelet transform," Journal of Korea Institute of Information and Communication Engineering, Vol.17, No. 3, pp. 603-611, Mar. 2013.   DOI
4 S. H. Park, H. J. Choi, Y. H. Seo, and D. W. Kim, "Ciphering scheme and hardware implementation for MPEG-based image/video security," Journal of the Institute of Electronics and Information Engineers, Vol. 42, No. 2, pp. 27-36, Mar. 2005.
5 R. C. Gonzalez and R. E. Woods, Digital Image Processing, New Jersey, NJ: Prentice Hall, 2002.
6 F. Stajano and H. Isozaki, "Security issues for Internet applications," in Proceedings of Applications and the Internet (SAINT) Workshop, Nara: JP, pp. 18-24, 2002.
7 Middlebury Stereo Vision Page [Internet]. Available: http://vision.middlebury.edu/stereo/.
8 J. S. Jeong and Y. J. Kim, "Structural Similarity Index for Image Assessment Using Pixel Difference and Saturation Awareness," Journal of The Korean Institute of Information Scientists and Engineers, Vol. 41, No. 10, pp. 847-858, Oct. 2014.