Novel 3-D Image Encryption Using Computational Integral Imaging and Linear-Complemented MLCA

2013 ◽  
Vol 284-287 ◽  
pp. 2992-2997 ◽  
Author(s):  
Xiao Wei Li ◽  
Dong Hwan Kim ◽  
Sung Jin Cho ◽  
Seok Tae Kim

Three dimensional (3-D) images encryption schemes can provide feasible and secure for images encryption due to the 3-D properties of images. In this paper, we present a novel 3-D images encryption algorithm by combining use of integral imaging (II) and maximum-length cellular automata (MLCA) as the secret key ciphering for 3D image encryption technique. In this proposed algorithm, a lenslet array first decomposes the 3-D object into 2-D elemental images (EIs) via the pick-up process of II. We encrypt the 2-D EIs with an encryption method based on linear and complemented MLCA. Decryption process is the opposite of operation encryption process: The 2-D EIs is recovered by the MLCA key, 3-D object is reconstructed by the recovered EIs via computational integral imaging (CII) reconstruction. To verify the usefulness of the proposed algorithm, we carry out the computational experiments and present the experimental results for various attacks. Experimental results show that the proposed algorithm can improve the performance of encryption against various attacks due to large key space in MLCA and 3-D characteristic of data redundancy.

2013 ◽  
Vol 479-480 ◽  
pp. 958-962
Author(s):  
Xiao Wei Li ◽  
Seok Ki Lee ◽  
Sung Jin Cho ◽  
Seok Tae Kim

We propose a three-dimensional (3D) image encryption method based on the modified computational integral imaging (CII) technique with the smart pixel mapping (SPM) algorithm, which is introduced for reconstructing orthoscopic 3D images with improved image quality. The depth-converted two-dimensional (2D) elemental image array (EIA) is firstly obtained by SPM-based CII system, and then the 2D EIA is encrypted by Fibonacci transform for 3D image encryption. Compared with conventional encryption methods based on integral imaging (II), the proposed method enables us to reconstruct orthoscopic 3D images at long distance. In addition, the qualities of the reconstructed plane images are enhanced by applying the SPM and pixel average algorithm (PAA) in CII. To show the usefulness of the proposed method, we carry out the preliminary experiments and present the experimental results.


2012 ◽  
Vol 241-244 ◽  
pp. 2728-2731
Author(s):  
Yong Zhang

Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption method, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist chosen/known plaintext attacks.


2013 ◽  
Vol 479-480 ◽  
pp. 948-952
Author(s):  
Xiao Wei Li ◽  
Sung Jin Cho ◽  
Seok Tae Kim

In this paper, we propose a novel three-dimensional (3D) color image encryption scheme based on computational integral imaging (CII) and Arnold transform technique. An elemental image array (EIA) is firstly captured by recording the light rays emanating from 3D image through a lenslet array. Then, the captured color EIA is decomposed into three independent channels: red, green and blue, and each channel is encrypted by Arnold transform. In the reconstruction process, the pseudo-inverse filter is used to improve quality of the reconstructed 3D color image in CII system. Numerical simulations have been done to prove the validity and the security of the proposed 3D color image encryption method.


2015 ◽  
Vol 764-765 ◽  
pp. 970-974
Author(s):  
Xiao Wei Li ◽  
Arum Sulgi Cho ◽  
In Kwon Lee ◽  
Sung Jin Cho ◽  
Seok Tae Kim

In this paper, we propose a three-dimensional (3D) image encryption method using the computer-generated integral imaging and random phase mask encoding. The advantages of this proposed method can not only increase the resolution of the reconstructed plane images, but also greatly improve the robustness compared with conventional methods. We present the experimental results to verify the performance of our proposed encryption method.


Author(s):  
Sabyasachi Pramanik ◽  
Ramkrishna Ghosh ◽  
Mangesh M. Ghonge ◽  
Vipul Narayan ◽  
Mudita Sinha ◽  
...  

In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information security presents a challenge. Cryptography includes changing over a message text into an unintelligible figure and steganography inserts message into a spread media and shroud its reality. Both these plans are successfully actualized in images. To facilitate a safer transfer of image, many cryptosystems have been proposed for the image encryption scheme. This chapter proposes an innovative image encryption method that is quicker than the current researches. The secret key is encrypted using an asymmetric cryptographic algorithm and it is embedded in the ciphered image using the LSB technique. Statistical analysis of the proposed approach shows that the researcher's approach is faster and has optimal accuracy.


Entropy ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 44 ◽  
Author(s):  
Sameh Askar ◽  
Abdel Karawia ◽  
Abdulrahman Al-Khedhairi ◽  
Fatemah Al-Ammar

In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.


Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Qiang Zhang ◽  
Xianglian Xue ◽  
Xiaopeng Wei

We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.


Sign in / Sign up

Export Citation Format

Share Document