Improved reference image encryption methods based on 2k correction in the integer wavelet domain
International Journal of Applied Mathematics and Computer Science, Tome 29 (2019) no. 4, pp. 817-829.

Voir la notice de l'article provenant de la source Library of Science

Many visually meaningful image encryption (VMIE) methods have been proposed in the literature using reference encryption. However, the most important problems of these methods are low visual quality and blindness. Owing to the low visual quality, the pre-encrypted image can be analyzed simply from the reference image and, in order to decrypt nonblind methods, users should use original reference images. In this paper, two novel reference image encryption methods based on the integer DWT (discrete wavelet transform) using 2k correction are proposed. These methods are blind and have high visual quality, as well as short execution times. The main aim of the proposed methods is to solve the problem of the three VMIE methods existing in the literature. The proposed methods mainly consist of the integer DWT, pre-encrypted image embedding by kLSBs (k least significant bits) and 2k correction. In the decryption phase, the integer DWT and preencrypted image extraction with the mod operator are used. Peak signal-to-noise ratio (PSNR) measures the performances of the proposed methods. Experimental results clearly illustrate that the proposed methods improve the visual quality of the reference image encryption methods. Overall, 2k correction and kLSBs provide high visual quality and blindness.
Keywords: visually meaningful image encryption, 2k correction, discrete wavelet transform, least significant bits embedding
Mots-clés : szyfrowanie obrazu, dyskretna transforma falkowa, metoda szyfrowania
@article{IJAMCS_2019_29_4_a14,
     author = {Tuncer, Turker and Dogan, Sengul and Tadeusiewicz, Ryszard and P{\l}awiak, Pawe{\l}},
     title = {Improved reference image encryption methods based on 2\protect\textsuperscript{k} correction in the integer wavelet domain},
     journal = {International Journal of Applied Mathematics and Computer Science},
     pages = {817--829},
     publisher = {mathdoc},
     volume = {29},
     number = {4},
     year = {2019},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/}
}
TY  - JOUR
AU  - Tuncer, Turker
AU  - Dogan, Sengul
AU  - Tadeusiewicz, Ryszard
AU  - Pławiak, Paweł
TI  - Improved reference image encryption methods based on 2k correction in the integer wavelet domain
JO  - International Journal of Applied Mathematics and Computer Science
PY  - 2019
SP  - 817
EP  - 829
VL  - 29
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/
LA  - en
ID  - IJAMCS_2019_29_4_a14
ER  - 
%0 Journal Article
%A Tuncer, Turker
%A Dogan, Sengul
%A Tadeusiewicz, Ryszard
%A Pławiak, Paweł
%T Improved reference image encryption methods based on 2k correction in the integer wavelet domain
%J International Journal of Applied Mathematics and Computer Science
%D 2019
%P 817-829
%V 29
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/
%G en
%F IJAMCS_2019_29_4_a14
Tuncer, Turker; Dogan, Sengul; Tadeusiewicz, Ryszard; Pławiak, Paweł. Improved reference image encryption methods based on 2k correction in the integer wavelet domain. International Journal of Applied Mathematics and Computer Science, Tome 29 (2019) no. 4, pp. 817-829. http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/

[1] Avci, E., Tuncer, T. and Avci, D. (2016). A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain, Arabian Journal for Science and Engineering 41(8): 3153–3161, DOI: 10.1007/s13369-016-2124-4.

[2] Bao, L. and Zhou, Y. (2015). Image encryption: Generating visually meaningful encrypted images, Information Sciences 324: 197–207.

[3] Chai, X., Gan, Z., Chen, Y. and Zhang, Y. (2017). A visually secure image encryption scheme based on compressive sensing, Signal Processing 134: 35–51.

[4] Chang, C.-C., Lin, C.-C. and Chen, Y.-H. (2008). Reversible data-embedding scheme using differences between original and predicted pixel values, IET Information Security 2(2): 35–46.

[5] Chen, B., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.L. and Shu, H. (2014). Full 4-d quaternion discrete Fourier transform based watermarking for color images, Digital Signal Processing 28: 106–119.

[6] Chen, G., Mao, Y. and Chui, C.K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps, Chaos, Solitons Fractals 21(3): 749–761.

[7] Dhall, S., Pal, S. K. and Sharma, K. (2018). Cryptanalysis of image encryption scheme based on a new 1d chaotic system, Signal Processing 146: 22–32.

[8] Faragallah, O.S. (2013). Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain, International Journal of Electronics and Communications 67(3): 189–196.

[9] Ghebleh, M., Kanso, A. and Noura, H. (2014). An image encryption scheme based on irregularly decimated chaotic maps, Signal Processing: Image Communication 29(5): 618–627.

[10] Kanso, A. and Ghebleh, M. (2017). An algorithm for encryption of secret images into meaningful images, Optics and Lasers in Engineering 90: 196–208.

[11] Lee, S.-H. (2014). DWT based coding DNA watermarking for DNA copyright protection, Information Sciences 273: 263–286.

[12] Liu, F. and Wu, C. (2011). Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners, IET Information Security 5(2): 121–128.

[13] Peng, F., Li, X. and Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform, Signal Processing 92(1): 54 – 62.

[14] Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2017). A robust semi-blind watermarking for color images based on multiple decompositions, Multimedia Tools and Applications 76(24): 25623–25656, DOI: 10.1007/s11042-017-4355-0.

[15] Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2018). Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation, Multimedia Tools and Applications 77(5): 5609–5635, DOI: 10.1007/s11042-017-4476-5.

[16] Sun, S. (2016). A novel edge based image steganography with 2k correction and Huffman encoding, Information Processing Letters 116(2): 93–99.

[17] Tanchenko, A. (2014). Visual-PSNR measure of image quality, Journal of Visual Communication and Image Representation 25(5): 874–878.

[18] Tuncer, T. and Avci, E. (2016). A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays 41: 1–8.

[19] Yang, Y.-G., Zhang, Y.-C., Chen, X.-B., Zhou, Y.-H. and Shi, W.-M. (2018). Eliminating the texture features in visually meaningful cipher images, Information Sciences 429: 102–119.