Elsevier

Optics Communications

Volume 338, 1 March 2015, Pages 371-379
Optics Communications

Simultaneous compression and encryption of color video images

https://doi.org/10.1016/j.optcom.2014.10.020Get rights and content

Abstract

We study theoretically a simultaneous compression and encryption method which is optically implementable and well adapted to color images. Remarkably, we also show that an optimized version of this method can be used to process images from video sequences which are treated as multiple images with taking care of temporal redundancy. The major strength of the method is in its generality and robustness against various known-plaintext attacks making this algorithm appealing for color video images.

Section snippets

Introduction and motivation

Fast and secure image transmission requires decreasing the quantity of data to be transmitted (compression) and protecting the use of data against unauthorized access (encryption). Data compression refers to the process of reducing the amount of data required to represent, store, and transmit given quantity of information (image). Encryption is the process of encoding messages (or transmitted information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties

Simultaneous compression and encryption of images

To demonstrate the approach, we use earlier work [20], [21]. Let us start with a brief review of our method based on the synoptic scheme that is summarized in Fig. 1.

Optical setup and results for simultaneous compression and encryption of color images

Motivated by these considerations, we now introduce the adaptation of the above method for color images. In addition, we suggest an optical setup allowing us to implement it. For the purpose of illustration, we selected the RGB color model. An example of such decomposition is shown in Fig. 3 after gray-scale conversion of each component.

We propose an experiment, shown, schematically in Fig. 4(a), in which each RGB component is positioned (P(i)) in the setup once this decomposition is realized.

Optimized method of compression and encryption realized simultaneously: application to video sequence

Returning to our main topic and for the sake of simplicity, we will consider in the remainder of this work the case of a video sequence composed of 6 images (i1, i2, i3, i4, i5, and i6) to be compressed and encrypted. The encryption stage of the method is similar as was done in Section 3. Fig. 5 depicts the basic principle of our optimization method which consists to use 3 images instead of 6, i.e. i1, i6, and the image resulting from multiplexing the parts of i2, i3, i4, and i5 which have the

Resistance against attacks

To appreciate the generality of our method, it is helpful to test the strength of our algorithm against various known-plaintext attacks. In recent years there have been a number of proposed attacks on many type encryption systems. Here, we want to gain a deeper understanding of our scheme and to investigate its vulnerability to attacks. If the receiver wants to decrypt the data based on our algorithm, he or she needs the compressed and encrypted image, his or her digital print, and the random

Concluding remarks and outlook

In summary, we have introduced a simultaneous compression and encryption method which is optically implementable and well adapted to color images. This work highlights the benefits of DCT properties and digital print based encryption to achieve simultaneously compression by image fusion and encryption. Based on this understanding, an optical setup has been proposed for the processing of color images. We believe that our analysis offers a step advancement for the rational analysis of color video

Acknowledgments

This Pwork was supported in part by Lab-STICC which is UMR CNRS 6285.

References (21)

There are more references available in the full text version of this article.

Cited by (39)

  • Chaos based 3D color image encryption

    2020, Ain Shams Engineering Journal
    Citation Excerpt :

    Additionally, A. Alfalou, et al. studied theoretically a simultaneous compression and encryption method which was optically implementable and well adapted to color images. The major strength of this method was in its generality and robustness against various only known-plaintext attacks making this algorithm appealing for color video images [23]. In 2017, M. A. Mohamed, et al. introduced six proposed techniques for optical color image encryption.

  • Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion

    2018, Optics and Lasers in Engineering
    Citation Excerpt :

    The permutation is set as the encryption key and the inverse of this permutation is used for decryption. Moreover, discrete chaotic maps are extensively implemented in image and video processing [20–24]. These maps are based on the generation of chaotic sequences that can be used to create robust scrambling schemes.

  • Multiple information encryption by user-image-based gyrator transform hologram

    2017, Optics and Lasers in Engineering
    Citation Excerpt :

    The pioneering work of Réfrégier and Javidi for optical encryption based on double-random phase encoding (DRPE) [3] has stimulated a number of researchers to advance optical security systems. So, the various optical methods have been applied for encrypting/hiding information [4–16]. Digital holography (DH) is an emerging technology of new paradigm in imaging applications.

View all citing articles on Scopus
View full text