An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images

Authors: S. R. M. Prasanna, Y. V. Subba Rao, A. Mitra

Abstract:

We describe an effective method for image encryption which employs magnitude and phase manipulation using carrier images. Although it involves traditional methods like magnitude and phase encryptions, the novelty of this work lies in deploying the concept of carrier images for encryption purpose. To this end, a carrier image is randomly chosen from a set of stored images. One dimensional (1-D) discrete Fourier transform (DFT) is then carried out on the original image to be encrypted along with the carrier image. Row wise spectral addition and scaling is performed between the magnitude spectra of the original and carrier images by randomly selecting the rows. Similarly, row wise phase addition and scaling is performed between the original and carrier images phase spectra by randomly selecting the rows. The encrypted image obtained by these two operations is further subjected to one more level of magnitude and phase manipulation using another randomly chosen carrier image by 1-D DFT along the columns. The resulting encrypted image is found to be fully distorted, resulting in increasing the robustness of the proposed work. Further, applying the reverse process at the receiver, the decrypted image is found to be distortionless.

Keywords: Encryption, Carrier images, Magnitude manipulation, Phase manipulation.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1083255

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1600

References:


[1] H. J. Beker and F. C. Piper, Cipher Systems: The Protection of Communications. John Wiley & Sons, New York, 1982.
[2] C. P. Wu and C. J. Kuo, "Design of Integrated Multimedia Compression and Encryption Systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, Oct. 2005.
[3] J. A. Buchmann, Introduction to Cryptography. Springer, New Delhi, 2004.
[4] O. Goldreich, Foundations of Cryptography: Vol I Basic Tools. Cambridge University Press, UK, 2005.
[5] O. Goldreich, Foundations of Cryptography: Vol II Basic Applications. Cambridge University Press, UK, 2005.
[6] K. S. Chan and F. Fekri, "A Block Cipher Crypto System using Wavelet Transforms over Finite Fields," IEEE Trans. Signal Processing, vol. 52, no. 10, pp. 2975-2991, Oct. 2004.
[7] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746- 757, Feb. 2005.
[8] A. Martin et. al., "Is Image Steganography Natural?," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2040-2050, Dec. 2005.
[9] K. Satish et. al., "Chaos based Spread Spectrum Image Steganography," IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 587-590, May. 2004.
[10] M. Ramkumar and A. N. Akansu, "Signaling methods for multimedia steganography," IEEE Trans. Signal Processing, vol. 52, no. 4, pp. 1100- 1111, Apr. 2004.
[11] A. Takahashi et. al., "Multiple Watermarks for Stereo Audio Signals using Phase-Modulation Techniques," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 806-815, Feb. 2005.
[12] F. H. Wang et. al., "Hiding Watermark in Watermark," in Proc. IEEE Int. symp. Circuits Syst. (ISCAS), Kobe, May 23-26, 2005, pp. 4018-4021.
[13] V. Solachidis and L. Pitas, "Circularly Symmetric Watermark Embedding in 2-D DFT Domain," IEEE Trans. Image Processing, vol. 10, no. 11, pp. 1741-1753, Nov. 2001.
[14] I. J. Cox et. al., Digital Watermarking. Morgan Kaufmann Publishers, CA, USA, 2002.
[15] H. J. Beker and F. C. Piper, Secure Speech Communications. Academic Press, London, 1985.
[16] O. Goldreich, Foundations of Cryptography: Volume I Basic Applications. Cambridge University Press, London, UK, 2005.
[17] O. Goldreich, Foundations of Cryptography: Volume II Basic Tools. Cambridge University Press, London, UK, 2005.
[18] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129, Mar. 2003.
[19] S. Sridharan et. al., "A fast fourier transform based speech encryption system," Proc. IEE Communication, Speech and Vision, vol. 138, no. 3, pp. 215-223, June 1991.
[20] A. K. Jain, Fundamentals of Digital Image Processing. Englewood Cliffs, NJ: Prentice Hall, 1989.
[21] A. V. Oppenheim et. al., Signals and Systems. Englewood Cliffs, NJ: Prentice Hall, 1996.
[22] A. V. Oppenheim and R. W. Schafer, Digital Signal Processing. Englewood Cliffs, NJ: Prentice Hall, 1975.