Novel method for thermal image encryption

Author(s):  
B S Lokesh ◽  
M B Manjunatha ◽  
Panduranga H T
2014 ◽  
Vol 6 (3) ◽  
pp. 16-29
Author(s):  
Xiyu Han ◽  
Zhenxing Qian ◽  
Guorui Feng ◽  
Xinpeng Zhang

This paper proposes a novel method for data hiding in encrypted image using image interpolation. Before the image encryption, the original image is sampled and an interpolation algorithm is used to calculate an estimation of the original image. Errors between the original image and the estimated image are compressed by Huffman encoding, which are further embedded into the estimated image to generate the redundant room. After image encryption using an encryption key, the secret bits are embedded into the reserved room. On the receiver side, the hidden bits can be extracted and the original content of the image can be perfectly recovered. Compared with the published results, the proposed method provides a larger embedding payload.


2018 ◽  
Vol 17 (3-4) ◽  
pp. 447-461 ◽  
Author(s):  
Iqtadar Hussain ◽  
Amir Anees ◽  
Abdulmohsen Algarni

Entropy ◽  
2018 ◽  
Vol 20 (12) ◽  
pp. 901 ◽  
Author(s):  
Dora Ballesteros ◽  
Jimmy Peña ◽  
Diego Renza

Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to 8 . 57 × 10 506 ). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 163729-163739
Author(s):  
Victor Manuel Silva Garcia ◽  
Marlon David Gonzalez Ramirez ◽  
Rolando Flores Carapia ◽  
Eduardo Vega-Alvarado ◽  
Eduardo Rodriguez Escobar

Molecules ◽  
2018 ◽  
Vol 23 (8) ◽  
pp. 1878 ◽  
Author(s):  
Bin Wang ◽  
Yingjie Xie ◽  
Shihua Zhou ◽  
Xuedong Zheng ◽  
Changjun Zhou

As a primary method, image encryption is widely used to protect the security of image information. In recent years, image encryption pays attention to the combination with DNA computing. In this work, we propose a novel method to correct errors in image encryption, which results from the uncertainty of DNA computing. DNA coding is the key step for DNA computing that could decrease the similarity of DNA sequences in DNA computing as well as correct errors from the process of image encryption and decryption. The experimental results show our method could be used to correct errors in image encryption based on DNA coding.


Author(s):  
Futian Wang ◽  
Songjian Hua ◽  
Xiao Wang ◽  
Zhengzheng Tu ◽  
Cheng Zhang ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Ming Li ◽  
Haiju Fan ◽  
Hua Ren ◽  
Dandan Lu ◽  
Di Xiao ◽  
...  

A novel method of meaningful image encryption is proposed in this paper. A secret image is encrypted into another meaningful image using the algorithm of reversible data hiding (RDH). High covertness can be ensured during the communication, and the possibility of being attacked of the secret image would be reduced to a very low level. The key innovation of the proposed method is that RDH is applied to compressive sensing (CS) domain, which brings a variety of benefits in terms of image sampling, communication and security. The secret image after preliminary encryption is embedded into the sparse representation coefficients of the host image with the help of the dictionary. The embedding rate could reach 2 bpp, which is significantly higher than those of other state-of-art schemes. In addition, the computational complexity of receiver is reduced. Simulations verify our proposal.


Sign in / Sign up

Export Citation Format

Share Document