Compression-friendly Image Encryption Algorithm Based on Order Relation

被引:0
作者
Gankhuyag, Ganzorig [1 ]
Choe, Yoonsik [1 ]
机构
[1] Yonsei Univ, Dept Elect & Elect Engn, Seoul, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 04期
关键词
Image encryption; Order relation; Compression-friendly encryption; Order permutation; Image scrambling; SCHEME; PERMUTATION; MAP;
D O I
10.3966/160792642020072104011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce an image encryption algorithm that can be used in combination with compression algorithms. Existing encryption algorithms focus on either encryption strength or speed without compression, whereas the proposed algorithm improves compression efficiency while ensuring security. Our encryption algorithm decomposes images into pixel values and pixel intensity subsets, and computes the order of permutations. An encrypted image becomes unpredictable after permutation. Order permutation reduces the discontinuity between signals in an image, increasing compression efficiency. The experimental results show that the security strength of the proposed algorithm is similar to that of existing algorithms. Additionally, we tested the algorithm on the JPEG and the JPEG2000 with variable compression ratios. Compared to existing methods applied without encryption, the proposed algorithm significantly increases PSNR and SSIM values.
引用
收藏
页码:1013 / 1023
页数:11
相关论文
共 33 条
[1]  
[Anonymous], 2012, International Journal on Cryptography and Information Security (IJCIS)
[2]   Self-Adaptive Chaotic Logistic Map: An Efficient Image Encryption Method [J].
Cheng, Hai ;
Song, Yu ;
Huang, Chunguang ;
Ding, Qun .
JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (04) :743-752
[3]   The JPEG2000 still image coding system: An overview [J].
Christopoulos, C ;
Skodras, A ;
Ebrahimi, T .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :1103-1127
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
Gankhuyag G, 2013, IEEE ICCE, P568, DOI 10.1109/ICCE.2013.6487020
[6]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157
[7]  
Halmos Paul R., 1960, Naive Set Theory
[8]   Secure transmission of images based on chaotic systems and cipher block chaining [J].
Lakhani, Mahdieh Karimi ;
Behnam, Hamid ;
Karimi, Arash .
JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (01)
[9]  
Lipschutz S., 1995, SCHAUMS OUTLINE THEO
[10]   Image encryption using DNA complementary rule and chaotic maps [J].
Liu, Hongjun ;
Wang, Xingyuan ;
Kadir, Abdurahman .
APPLIED SOFT COMPUTING, 2012, 12 (05) :1457-1466