Simultaneous compression and encryption of color video images
Section snippets
Introduction and motivation
Fast and secure image transmission requires decreasing the quantity of data to be transmitted (compression) and protecting the use of data against unauthorized access (encryption). Data compression refers to the process of reducing the amount of data required to represent, store, and transmit given quantity of information (image). Encryption is the process of encoding messages (or transmitted information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties
Simultaneous compression and encryption of images
To demonstrate the approach, we use earlier work [20], [21]. Let us start with a brief review of our method based on the synoptic scheme that is summarized in Fig. 1.
Optical setup and results for simultaneous compression and encryption of color images
Motivated by these considerations, we now introduce the adaptation of the above method for color images. In addition, we suggest an optical setup allowing us to implement it. For the purpose of illustration, we selected the RGB color model. An example of such decomposition is shown in Fig. 3 after gray-scale conversion of each component.
We propose an experiment, shown, schematically in Fig. 4(a), in which each RGB component is positioned (P(i)) in the setup once this decomposition is realized.
Optimized method of compression and encryption realized simultaneously: application to video sequence
Returning to our main topic and for the sake of simplicity, we will consider in the remainder of this work the case of a video sequence composed of 6 images (i1, i2, i3, i4, i5, and i6) to be compressed and encrypted. The encryption stage of the method is similar as was done in Section 3. Fig. 5 depicts the basic principle of our optimization method which consists to use 3 images instead of 6, i.e. i1, i6, and the image resulting from multiplexing the parts of i2, i3, i4, and i5 which have the
Resistance against attacks
To appreciate the generality of our method, it is helpful to test the strength of our algorithm against various known-plaintext attacks. In recent years there have been a number of proposed attacks on many type encryption systems. Here, we want to gain a deeper understanding of our scheme and to investigate its vulnerability to attacks. If the receiver wants to decrypt the data based on our algorithm, he or she needs the compressed and encrypted image, his or her digital print, and the random
Concluding remarks and outlook
In summary, we have introduced a simultaneous compression and encryption method which is optically implementable and well adapted to color images. This work highlights the benefits of DCT properties and digital print based encryption to achieve simultaneously compression by image fusion and encryption. Based on this understanding, an optical setup has been proposed for the processing of color images. We believe that our analysis offers a step advancement for the rational analysis of color video
Acknowledgments
This Pwork was supported in part by Lab-STICC which is UMR CNRS 6285.
References (21)
- et al.
Asymmetric multiple-image hiding using phase retrieval technique based on amplitude- and phase-truncation in fractional Fourier domain
Optik
(2013) - et al.
Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains
Opt. Commun.
(2011) - et al.
Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction
Opt. Commun.
(2013) - et al.
Optical image compression and encryption methods,
Adv. Opt. Photon.
(2009) - et al.
Optical compression scheme to multiplex and simultaneously encode images,
in: Optical and Digital Image Processing Fundamentals and Applications
(2011) - et al.
Optical image encryption based on input plane and Fourier plane random encoding
Opt. Lett.
(1995) - et al.
Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform
Appl. Opt.
(2013) - et al.
Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain
Appl. Opt.
(2013) - et al.
Dual encryption scheme of images using polarized light
Opt. Lett.
(2010) Color image security system using double random-structured phase encoding in gyrator transform domain
Appl. Opt.
(2012)
Cited by (39)
Chaos based 3D color image encryption
2020, Ain Shams Engineering JournalCitation Excerpt :Additionally, A. Alfalou, et al. studied theoretically a simultaneous compression and encryption method which was optically implementable and well adapted to color images. The major strength of this method was in its generality and robustness against various only known-plaintext attacks making this algorithm appealing for color video images [23]. In 2017, M. A. Mohamed, et al. introduced six proposed techniques for optical color image encryption.
Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion
2018, Optics and Lasers in EngineeringCitation Excerpt :The permutation is set as the encryption key and the inverse of this permutation is used for decryption. Moreover, discrete chaotic maps are extensively implemented in image and video processing [20–24]. These maps are based on the generation of chaotic sequences that can be used to create robust scrambling schemes.
Multiple information encryption by user-image-based gyrator transform hologram
2017, Optics and Lasers in EngineeringCitation Excerpt :The pioneering work of Réfrégier and Javidi for optical encryption based on double-random phase encoding (DRPE) [3] has stimulated a number of researchers to advance optical security systems. So, the various optical methods have been applied for encrypting/hiding information [4–16]. Digital holography (DH) is an emerging technology of new paradigm in imaging applications.
Amplitude-phase retrieval attack free image encryption based on two random masks and interference
2016, Optics and Lasers in EngineeringA chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem
2016, Applied Soft Computing Journal