Image encryption based on the finite field cosine transform

https://doi.org/10.1016/j.image.2013.05.008Get rights and content

Highlights

  • A novel image encryption scheme is proposed.

  • The technique involves two steps, where the finite field cosine transform is applied to blocks of an image.

  • The proposed scheme provides benefits related to computational complexity and encoding of the ciphered-images.

Abstract

In this paper, a novel image encryption scheme is proposed. The technique involves two steps, where the finite field cosine transform is recursively applied to blocks of a given image. In the first step, the image blocks to be transformed result from the regular partition of subimages of the original image. The transformed subimages are regrouped and an intermediate image is constructed. In the second step, a secret-key determines the positions of the intermediate image blocks to be transformed. Besides complying with the main properties required by image encryption methods, the proposed scheme provides benefits related to computational complexity and encoding of the ciphered-images.

Introduction

The ever-increasing multimedia communication traffic has demanded high transmission rates and security in distribution and storage of data. In manifold applications, such as medical imaging systems, military image database and television, schemes devoted to reliability and security of image and video are particularly important [1], [2], [3]. This scenario has attracted the attention of companies and academia and led to the development of techniques with different purposes and based on several principles.

This paper encompasses image encryption, where visual and statistical aspects of an image are modified in order to obtain a noisy ciphered-image. In [4], for example, image encryption is done by employing chaotic sequences. In [5] and [6], image encryption schemes based on local random phase encoding in fractional Fourier transform and gyrator transform domains, respectively, are proposed; in such schemes, random phase encoding is iteratively applied to different regions of an input image. Other encryption techniques use fractional Fourier transforms, discrete cosine transform, Arnold transform, jigsaw transform and discrete fractional random transforms in the intensity-hue-saturation space [7], [8], [9], [10], [11]. Furthermore, image encryption can be implemented by the means of optical systems [12], [13], [14], [15]. Although a method for image encryption has specific theoretical foundations, it should be resistant against statistical analysis, differential attacks and other strategies that can be used by an adversary [1].

In this work, an image encryption technique based on the finite field cosine transform (FFCT) is introduced. The FFCT was first defined in [16] and corresponds to a finite field version of the discrete cosine transform (DCT). It exhibits interesting properties which are valuable for cryptographic purposes. In particular, it is possible to obtain FFCT matrices with large periods, compared to the periods of other transforms [17]. This means that the FFCT of an image block can be recursively computed a large number of times before returning to the original block. Such a property was previously explored in [18], where a simple method for uniformizing histograms of digital images was introduced (encryption was not performed in that case).

The image encryption scheme proposed in this paper consists of two steps. In the first step, 64 subimages are generated from the original image by a systematic pixel selection procedure. Each subimage is regularly divided into non-superposed 8×8 blocks, which are submitted to the recursive application of the FFCT. An intermediate image is produced by regrouping the transformed subimages. In the second step, a permutation is used as a key to determine the position of new superposed8×8 blocks of the intermediate image. Such blocks are then sequentially processed by the FFCT also in a recursive manner. The decryption scheme consists simply in inverting the order of the operations applied to the image in the encryption process.

The most attractive property of our approach is that only modular arithmetic is necessary to process the images. This means that arithmetic operations can be done with less complexity, compared to those performed using floating-point computations [19], [20]. Since rounding is not needed, round-off errors are avoided and the decrypted image is rigorously equal to the original one. Moreover, due to the recursive application of the FFCT, the ciphered-image can be stored using the same encoding scheme of the original image. Such benefits are not present in image encryption schemes based on transforms defined over real (or complex) numbers [7]. Additionally, the steps which compose our approach do not depend on any iterative strategy to achieve specific security constraints. This contrasts with most image encryption methods based on pixel scrambling and chaotic sequences, which may require several rounds of iterations to give acceptable results [9], [21].

This paper is organized as follows. After this introduction, the theory of the finite field cosine transform is reviewed in Section 2. We briefly discuss some important characteristics of the FFCT and give the transform matrix to be used in the proposed application. In Section 3, we introduce our image encryption scheme and explain the steps necessary to its implementation. In Section 4, we present computer simulations used to illustrate and evaluate the performance of our approach. In particular, the security of the method is analyzed by the use of some well-known metrics. Finally, in Section 5, the concluding remarks of the paper are presented.

Section snippets

The finite field cosine transform

The technique proposed in this paper is based on the finite field cosine transform (FFCT), which was originally introduced in [16]. The family of finite field trigonometric transforms (FFTT), which is completely described in [22], is composed of 8 types of finite field cosine transforms and also 8 types of finite field sine transforms. The following definition related to trigonometry in finite fields is needed to introduce the FFCT [23].

Definition 1 Finite field cosine function

Let ζ be a nonzero element in the finite field GF(p), p is

The encryption scheme

The proposed image encryption scheme is implemented in two steps. Such steps are concisely illustrated in Fig. 2 and explained in details in the following paragraphs. In the first step, the original image I is initially divided into blocks with dimensions 8×8 pixels.2 Such blocks are taken from the left to the right and from the top to the bottom and

Simulations and security analysis

In this section, we describe the simulations carried out to evaluate the proposed scheme and discuss their result. The experiments run in Matlab®, where programs to implement the encryption technique, presented in Section 3, were developed. The evaluation of the simulation results is based on metrics which allow a security analysis of the proposed scheme. Particularly, in Section 4.7, a speed analysis of the encryption/decryption procedure is done and some aspects related to the complexity of

Concluding remarks

In this paper, a procedure to encrypt digital images based on the finite field cosine transform was introduced. In the first step of the proposed technique, 64 subimages are constructed from the original image. Such subimages are then regularly divided into 8×8 blocks to which the FFCT is recursively applied. The transformed subimages are regrouped in order to produce an intermediate image, with the same dimensions of the original image. In the second step, a permutation is used as a

Acknowledgments

This research was supported by Fundação de Amparo à Ciência e Tecnologia do Estado de Pernambuco – FACEPE – under Grant APQ 1196-3.04/10, and by Conselho Nacional de Desenvolvimento Científico e Tecnológico – CNPq.

References (35)

  • D.T. Birtwistle

    The eigenstructure of the number theoretic transforms

    Signal Processing

    (1982)
  • H. Hermassi et al.

    Security analysis of image cryptosystems only or partially based on a chaotic permutation

    Journal of Systems and Software

    (2012)
  • A. Akhshani et al.

    A novel scheme for image encryption based on 2D piecewise chaotic maps

    Optics Communications

    (2010)
  • Y. Wang et al.

    A new chaos-based fast image encryption algorithm

    Applied Soft Computing

    (2011)
  • S. Behnia et al.

    A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps

    Physics Letters A

    (2007)
  • J.B. Lima et al.

    The fractional Fourier transform over finite fields

    Signal Processing

    (2012)
  • S. Cimato et al.

    Visual Cryptography and Secret Image Sharing

    (2011)
  • Cited by (41)

    • Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain

      2020, Signal Processing
      Citation Excerpt :

      At the same time, image encryption plays an important role in information secure storage and transmission nowadays and has been widely used in various aspects of life. Many encryption methods have been proposed and used in watermarking algorithm to improve the security of the algorithm [1–19]. Compared with the traditional encryption method, optical encryption is widely used because of its fast processing speed and low cost.

    • Index-based permutation-diffusion in multiple-image encryption using DNA sequence

      2019, Optics and Lasers in Engineering
      Citation Excerpt :

      To date, many single image encryption algorithms have been introduced by researchers to tackle multiple image encryption algorithms. The well-known single image encryption algorithms include chaotic-based image encryption [3–8], evolutionary algorithm-based image encryption [9–11], image encryption in transform domain [12–17], DNA-based image encryption [3,18,19]. In theory, the single image encryption algorithms can frequently encrypt multiple plain-images; however in practice the encryption performance is often unacceptable.

    • Cosine transforms over fields of characteristic 2: Fast computation and application to image encryption

      2017, Signal Processing: Image Communication
      Citation Excerpt :

      The decryption is done by applying, in reserve order, the same steps used in the encryption. We highlight the advantages of this scheme compared to that based on cosine transforms over fields of odd characteristic [17,18] and perform computer simulations to demonstrate its resistance against the main cryptographic attacks. This paper is divided as follows.

    View all citing articles on Scopus
    View full text