An advanced Double Domain image encryption technique using modified DCT encryption (original) (raw)
Related papers
A novel image encryption scheme based on DCT transform and DNA sequence
Indonesian Journal of Electrical Engineering and Computer Science, 2021
Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Furthermore, empirical results on real images and security analysis demonstrate that our scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack and statistical attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null.
International Journal of Computational Vision and Robotics, 2015
The authors have proposed an image cryptosystem on the compressed version of the secret image to reduce the computational overhead and also to utilise the limited bandwidth of the communication channel maintaining the security. The compression has been done using transformation tool like discrete cosine transform (DCT). In the proposed scheme, the insignificant DCT coefficients of the secret image are discarded for compression of the secret image and the significant DCT coefficients are encrypted employing Arnold transformation (ACM) followed by fractional Fourier transform (FrFt). The parameters used in Arnold transformation and fractional Fourier transformation are kept confidential and considered as secret keys. The proposed scheme has been tested on a set of standard gray scale images and satisfactory results have been found. Besides, the security analysis has been carried out to demonstrate the effectiveness of the proposed scheme against some possible cryptographic attacks.
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
Selective encryption presents a great solution to optimize time efficiency during encryption process. In this paper a novel selective encryption scheme based on DCT transform with AES algorithm is presented. In the DCT method, the basic idea is to decompose the image into 8×8 blocks and these blocks are transformed from the spatial domain to the frequency domain by the DCT. Then, the DCT coefficients correlated to the lower frequencies of the image block are encrypted. The proposed cryptosystem is evaluated using various security and statistical analysis; results show that the proposed algorithm is strong against attacks and suitable for practical application.
Simple and Secure Image Encryption
2012
Image Encryption is a wide area of research. Encryption basically deals with converting data or information from its original form to some other form that hides the information in it. The protection of image data from unauthorized access is important. Encryption is employed to increase the data security. The Encrypted Image is secure from any kind cryptanalysis. In the proposed work, the image to be encrypted is decomposed into 8X8 blocks, these blocks are transformed from the spatial domain to frequency domain by the DCT , Then, only selected DCT coefficients i.e the DCT coefficients correlated to the higher frequencies of the image block are encrypted. For encryption the DCT coefficients are xored with pseudorandom bit, Pseudorandom bit is generated by Non-Linear Shift back Register. The bits generated by NonLinear Shift back Register cannot be predicted so cryptanalysis becomes difficult. To enhance the security further the unencrypted DCT coefficients are shuffled, since some in...
Concealing Encrypted Messages using DCT in JPEG Images
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In this paper we present an image based steganography that combines Discrete Cosine Transform (DCT), and compression techniques with LSB techniques on raw images to enhance the security of the payload. Initially the coverimage is transformed from spatial domain to the frequency domain using DCT. The image is then quantized. and LSB technique is used to insert in pixels specified according to a range.
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
Iraqi Journal of Science, 2020
Most of today's techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YC b C r and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key. The results showed a significant reduction in image quality degradation when applying the system based on YC b C r over RGB, where the compression ratio was raised in some of the tested images to 50% for the same Peak Signal to Noise Ratio (PSNR). The usage of 1-D DCT reduced the transform time by 47:1 times compared to the same transform using 2-D DCT. The values of the adaptive scalar quantization parameters were reduced to the half for the luminance (Y band) to preserve the visual quality, while the chrominance (C b and C r bands) were quantized by the predetermined quantization parameters. In the hybrid encoder horizontal zigzag, block scanning was applied to scan the image. The Detailed Coefficient (DC) coefficients are highly correlated in this arrangement-where DC are losslessly compressed by Differential Pulse Coding Modulation (DPCM) and the Accumulative Coefficients (AC) are compressed using Run Length Encoding (RLE). As a consequence, for the compression algorithm, the compression gain obtained was up to 95%. Three arrays are resulted from each band (DC coefficients, AC values, and AC runs), where the cipher is applied to some or all of those bulks selectively. This reduces the encryption decryption time significantly, where encrypting the DC coefficients provided the second best randomness and the least encryption/decryption time recorded (3 10-3 sec.) for the entire image. Although the compression algorithm consumes time but it is more efficient than the saved encryption time.
Secure Image Data by Double encryption
International Journal of Computer Applications, 2010
Security is the main concern in today's world and securing data from unauthorized access is very important. Different techniques should be used to protect confidential image data from unauthorized access as each type of data has its own features. In the natural images the values of the neighboring pixels are strongly correlated. Correlation means that the value of any given pixel can be reasonably predicted from the values of its neighbors. The proposed technique "secure image data by double encryption" provides image data security using cryptographic technique. The proposed method breaks the correlation among neighboring pixel by dividing original image into blocks of size of n pixels*n pixels (n is provided by user) and then encrypt each pixel by their position (x, y) and then encrypt each block by AES Encryption algorithm by using public key of the receiver. The result shows that the correlation between image pixels is decreased and higher entropy is achieved by using this technique.
A DCT-Based Secure JPEG Image Authentication Scheme
World Academy of …, 2009
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting.
Secure Image Steganography Algorithm Based on DCT with OTP Encryption
Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and normalized cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter.