Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.12.2933

A New Image Encryption Method using Quad-tree based Fresnelet Transform  

Seo, Young-ho (School of Liberal Arts, Kwangwoon University)
Lee, Yoon-hyuk (Department of Electronic Materials Engineering, Kwangwoon University)
Kim, Dong-wook (Department of Electronic Materials Engineering, Kwangwoon University)
Abstract
This paper proposes a new method which traces significant element of 2-dimensional natural images and encrypts them by using Fresnelet transform (FRNLT). After analyzing property of the subbands obtained by the FRNLT, we estimated the information for ciphering 2D images. Considering FRNLT levels, energy of subbands, and visual effect, we estimated the optimized point for encryption. By selecting various levels and encrypting region, we can encrypt 2D image with various robustness. Encryption effectiveness was showed by analyzing numerical result, executing time for encryption, area of encrypted region, and visual observation. Therefore encryption for various application can be applied by using the suggested parameters without additional analysis. Identifying the experimental result, in the case of $L_{TH}=4$ and $L_{TH}=4$, an image was not recognized through encrypting only 0.42% among the entire data.
Keywords
Encryption; Discrete Fresnelet Transform; Quad Tree; Subband Energy;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 L. Qiao and K. Nahrstedt, "Comparison of MPEG Encryption Algorithms," International Journal on Computer and Graphics(Special Issue on Data Security in Image Communication and Networks), Vol. 22, No. 3, pp. 437-444, 1998.
2 A. M. Alattar, et al., "Improved Selective Encryption Techniques for Secure Transmission of MPEG Video bit-Streams," International Conference on Image Processing (ICIP)'99, 1999.
3 C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. Of ACM Multimedia 1998, pp. 81-88, 1998.
4 Sung-Ho Park, Hyun-Jun Choi, Young-Ho Seo, and Dong-Wook Kim, "Ciphering Scheme and Hardware Implementation for MPEG-Based Image/Video Security," Journal of The Institute of Electronics and Information Engineers, vol.42, no.2, pp. 27-36, March. 2005.
5 Ho-Joon Lee, Hyung-Jun Lee, "Digital data Encryption on Digital Video Recorder System," Journal of the korean institute of communications and information sciences, vol.32, no.12, pp. 457-462, December. 2007.
6 H. Chaeng and X. Li, "Partial Encryption of Compressed Images and Videos," IEEE Trans, on Signal Processing, Vol. 48, No. 8, pp. 2439-2451, Aug. 2000.   DOI
7 A. Pommer and A. uhl, "Wavelet Packet Methods for Multimedia Compression and Encryption," IEEE Pacific Rim Conf. On Communications, Computers, and Signal Processing, pp. 1-4, 2001.
8 Young-Ho Seo, Moon Seok Kim, Dong-Wook Kim, "Quad-tree Subband Quantizer Design for Digital Hologram Encoding Based on Fresenelet," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 5, pp. 1180-1188 May. 2015.   DOI
9 Youngho Seo, Eui-Sun Choi, Dong-Wook Kim, "Efficient Encryption Technique of Image Using Packetized Discrete Wavelet Transform," Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 3, pp. 603-611 March. 2013.   DOI
10 A. Pommer and A. Uhl, "Selective Encryption of Wavelet Packet Subband Structures for Obscured Transmission of Visual Data," IEEE Benerux Signal Processing Symposium, pp. 25-28, 2002.
11 X. Wu and P. W. Moo, "Joint Image/Video Compression and Encryption via High-Order Conditional Entropy Coding of Wavelet Coefficients," Int'l Conference on Multimedia Computing and Systems, pp. 908-912, 1999.
12 T. Uehara and R. Safavi-Naini, "Attacking and Mending Arithmetic Coding Entropy Schemes," Proc. Of Australian Science Conference, pp. 408-419, Jan. 1999.
13 P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet Multimedia Applications," IEEE Trans. on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, Aug. 2000.   DOI
14 M. Podesser, H. P. Schmidt, and A. Uhl, "Selective Bitplane Encryption for Secure Transmission of Image data in Mobile Environments," Proc. 5th Nordic Signal Processing Symposium, 2002.
15 Ran Tao, Xiang-Yi Meng, Wang Yue, "Image Encryption with Multiorders of Fractional Fourier Transforms," IEEE Transactions on Information Forensics and Security, vol.5, no.4, pp.734-738, Dec, 2010.   DOI
16 A.S. Rajput, N. Mishra, S. Sharma, "Towards the Growth of Image Encryption and Authentication Schemes," 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.454-459, 22-25 Aug, 2013.
17 A.M. Elshamy, A.N.Z. Rashed, A.E.A. Mohamed, O.S. Faragalla, Yi Mu, S.A. Alshebeili, F.E.A. El-Samie, "Optical Image Encryption Based on Chaotic Baker map and Double Random Phase Encoding," Journal of Lightwave Technology, vol.31, no.15, pp.2533-2539, 2013.   DOI
18 G. J. Sullivan and R. L. Baker, "Efficient Quadtree Coding of Images and Videos," IEEE Trans. on Signal Processing, Vol. 3, pp. 327-331, May 1994.