Skip to main content

SIE: An Application to Secure Stereo Images Using Encryption

  • Chapter
  • First Online:

Abstract

To provide the security to image contents, most encryption techniques are designed for synthetic and real images which is, however, not applicable to stereo images. Stereo images generally consists of two views (left and right views) of a scene with known viewpoints. The only way is to encrypt both left and right images separately. To address this issue, this chapter introduces a new and effective encryption technique to encrypt left and right stereo images simultaneously to produce a single encrypted image. A decryption process is finally introduced to generate left and right stereo images from the final encrypted image. The extensive experiments on different stereo images demonstrate the efficiency and the robustness of the proposed encryption technique.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. S. Lian, MultiMedia Content Encryption: Techniques and Applications, CRC Press, Boca Raton, FL, 2008.

    Book  MATH  Google Scholar 

  2. S.S. Maniccam and N.G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition, 37(4), 2004, 725–737.

    Article  Google Scholar 

  3. H. Gao, Y. Zhang, S. Liang and D. Li, A new chaotic algorithm for image encryption, Chaos, Solitons & Fractals, 29(2), 2006, 393–399.

    Article  MATH  Google Scholar 

  4. T.G. Gao and Z.Q. Chen, Image encryption based on a new total shuffling algorithm, Chaos, Solitons & Fractals, 38(1), 2008, 213–220.

    Article  MathSciNet  MATH  Google Scholar 

  5. X. Tong and M. Cui, Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator, Signal Processing, 89(4), 2009, 480–491.

    Article  MATH  Google Scholar 

  6. Y. Wang, K.W. Wong, X.F. Liao and G.R. Chen, A new chaos-based fast image encryption algorithm, Applied Soft Computing, 11(1), 2011, 514–522.

    Article  Google Scholar 

  7. X. Li, J. Knipe and H. Cheng, Image compression and encryption using tree structures, Pattern Recognition Letters, 18(11–13), 1997, 1253–1259.

    Article  Google Scholar 

  8. Y. Mao, G. Chen and S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps, International Journal of Bifurcation and chaos, 14(10), 2004, 3613–3624.

    Article  MathSciNet  MATH  Google Scholar 

  9. M.G. Perkins, Data compression of stereopairs, IEEE Transactions on Communications, 40, 1992, pp. 684–696.

    Article  Google Scholar 

  10. H. Aydinoglu and M. H. Hayes, Stereo image coding: A projection approach, IEEE Transactions on Image Processing, 7(4), 1998, 507–516

    Article  Google Scholar 

  11. T. Frajka, and K. Zeger, Residual Image Coding for Stereo Image Compression, Optical Engineering, 42(1), 2003, 182–189.

    Article  Google Scholar 

  12. M. Kaaniche, A. Benazza-Benyahia, B. Pesquet-Popescu and J.C. Pesquet, Vector Lifting Schemes for Stereo Image Coding, IEEE Transactions on Image Processing, 18(11), 2009, 2463–2475.

    Article  MathSciNet  MATH  Google Scholar 

  13. Gaurav Bhatnagar, Sanjeev Kumar, R. Balasubramanian and N. Sukavanam, Stereo image coding via digital watermarking, Journal of Electronic Imaging, 18(3), 2009, 0330121–9.

    Google Scholar 

  14. L.F.R. Lucas, N.M.M. Rodrigues, E.A.B. da Silva and S.M.M. de Faria, Stereo image coding using dynamic template-matching prediction, In proceeding of International Conference on Computer as a Tool (EUROCON), Lisbon, 2011, 1–4.

    Google Scholar 

  15. S. Kumar, G. Bhatnagar, B. raman and N. Sukavanam, Security of Stereo Images During Communication and Transmission, Advanced Science Letters, 6, 2012, 173–179.

    Article  Google Scholar 

  16. F. A El-Samie, H.H. Ahmed, I.F. Elashry, M.H. Shahieen, O.S. Faragallah, E.M. El-Rabaie, S.A. Alshebeili, Image Encryption: A Communication Perspective, CRC Press, 2014.

    Google Scholar 

  17. D. Stinson, Cryptography: Theory and Practice, 2nd edition, Chapman & Hall/CRC Press, Boca Raton, FL, 2002.

    MATH  Google Scholar 

  18. Y. Kim, J. Song, I. Moon and Y. Lee, Interference-based multiple-image encryption using binary phase masks, Optics and Lasers in Engineering, 7, 2018, 81–287.

    Google Scholar 

  19. Yong Wang, Yi Zhao, Qing Zhou and Zehui Lin, Image encryption using partitioned cellular automata, Neurocomputing, 275, 2018, 1318–1332.

    Article  Google Scholar 

  20. Y. Xiong, C. Quan and C.J. Tay, Multiple image encryption scheme based on pixel exchange operation and vector decomposition, Optics and Lasers in Engineering, 101, 2018, 113–121.

    Article  Google Scholar 

  21. X. Li, C. Li and I. Lee, Chaotic image encryption using pseudo-random masks and pixel mapping, Signal Processing, 125, 2016, 48–63.

    Article  Google Scholar 

  22. W. Yap, R.C.-W. Phan, B. Goi, W. Yau and S. Heng, On the effective subkey space of some image encryption algorithms using external key, Journal of Visual Communication and Image Representation, 40, 2016, 51–57.

    Article  Google Scholar 

  23. M. García-Martínez, L.J. Ontañón-García, E. Campos-Cantón and S. Čelikovský, Hyper-chaotic encryption based on multi-scroll piecewise linear systems, Applied Mathematics and Computation, 270, 2015, 413–424.

    Article  MathSciNet  MATH  Google Scholar 

  24. D. Liu, W. Zhang, H. Yu and Z. Zhu, An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion, Signal Processing, 151, 2018, 130–143.

    Article  Google Scholar 

  25. M.K. Abdmouleh, A. Khalfallah and M.S. Bouhlel, A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm, Procedia Computer Science, 112, 2017, 369–376.

    Article  Google Scholar 

  26. M. Hamdi, R. Rhouma and S. Belghith, A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map, Signal Processing, 131, 2017, 514–526.

    Article  Google Scholar 

  27. T. Xiang, J. Hu and J. Sun, Outsourcing chaotic selective image encryption to the cloud with steganography, Digital Signal Processing, 43, 2015, 28–37.

    Article  Google Scholar 

  28. T.Xiang, J. Qu and D. Xiao, Joint SPIHT compression and selective encryption, Applied Soft Computing, 21, 2014, 159–170.

    Article  Google Scholar 

  29. G. Bhatnagar and Q.M. Jonathan Wu, Selective image encryption based on pixels of interest and singular value decomposition, Digital Signal Processing, 22(4), 2012, 648–663.

    Article  MathSciNet  Google Scholar 

  30. W. Zeng and S. Lei, Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia 5(1), 2003, 118–129.

    Article  MathSciNet  Google Scholar 

  31. C. Wu, and C.C. Jay Kuo, Efficient multimedia encryption via entropy codec design, In Proceeding of SPIE International Symposium on Electronic Imaging, San Jose, CA, 4314, 2001, 128–138.

    Google Scholar 

  32. Y. Zhang, B. Xu and N. Zhou, A novel image compression–encryption hybrid algorithm based on the analysis sparse representation, Optics Communications, 392, 2017, 223–233.

    Article  Google Scholar 

  33. G. Hu, D. Xiao, Y. Wang and T. Xiang, An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications, Journal of Visual Communication and Image Representation, 44, 2017, 116–127.

    Article  Google Scholar 

  34. X. Chai, Z. Gan, Y. Chen and Y. Zhang, A visually secure image encryption scheme based on compressive sensing, Signal Processing, 134, 2017, 35–51.

    Article  Google Scholar 

  35. R. Fay, Introducing the counter mode of operation to Compressed Sensing based encryption, Information Processing Letters, 116(4), 2016, 279–283.

    Article  MathSciNet  MATH  Google Scholar 

  36. C. Wang, J. Ni and Q. Huang, A new encryption-then-compression algorithm using the rate–distortion optimization, Signal Processing: Image Communication, 39, 2015, 141–150.

    Google Scholar 

  37. Z. Hua, F. Jin, B. Xu and H. Huang, 2D Logistic-Sine-coupling map for image encryption, Signal Processing, 149, 2018, 48–161.

    Article  Google Scholar 

  38. W. Cao, Y. Zhou, C.L.P. Chen and L. Xia, Medical image encryption using edge maps, Signal Processing, 132, 2017, 96–109.

    Article  Google Scholar 

  39. C. Li, Cracking a hierarchical chaotic image encryption algorithm based on permutation, Signal Processing, 118, 2016, 203–210.

    Article  Google Scholar 

  40. X. Wang, Q. Wang and Y. Zhang, A fast image algorithm based on rows and columns switch, Nonlinear Dynamics, 79(2), 2015, 1141–1149.

    Article  MathSciNet  Google Scholar 

  41. M. Murillo-Escobar, C. Cruz-Hernndez, F. Abundiz-Prez, R. Lpez-Gutirrez and O.A.D. Campo, A RGB image encryption algorithm based on total plain image characteristics and chaos, Signal Processing, 109, 2015, 119–131.

    Article  Google Scholar 

  42. G. Ye and J. Zhou, A block chaotic image encryption scheme based on self-adaptive modelling, Applied Soft Computing, 22, 2014, 351–357.

    Article  Google Scholar 

  43. Y. Zhou, K. Panetta, S. Agaian and C.L.P. Chen, Image encryption using P-Fibonacci transform and decomposition, Optics Communication, 285(5), 2012, 594–608.

    Article  Google Scholar 

  44. J. Hu and F. Han, A pixel-based scrambling scheme for digital medical images protection, Journal of Network and Computer Applications, 32(4), 2009, 788–794.

    Article  Google Scholar 

  45. C. Li, H. Li, F. Li, D. Wei, X. Yang and J. Zhang, Multiple-image encryption by using robust chaotic map in wavelet transform domain, Optik, 71, 2018, 277–286.

    Article  Google Scholar 

  46. X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong and H. Chen, Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain, Optics and Lasers in Engineering, 96, 2017, 7–16.

    Article  Google Scholar 

  47. L. Yuan, Q. Ran and T. Zhao, Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain, Optics & Laser Technology, 88, 2017, 111–120.

    Article  Google Scholar 

  48. J.B. Lima, E.S. da Silva and R.M. Campello de Souza, Cosine transforms over fields of characteristic: Fast computation and application to image encryption, Signal Processing: Image Communication, 54, 2017, 130–139.

    Google Scholar 

  49. J.B. Lima, F. Madeiro and F.J.R. Sales, Encryption of medical images based on the cosine number transform, Signal Processing: Image Communication, 35, 2015, 1–8.

    Google Scholar 

  50. H. Li and Y. Wang, Double-image encryption based on discrete fractional random transform and chaotic maps, Optics and Lasers in Engineering, 49(7), 2011, 753–757.

    Article  Google Scholar 

  51. B. Furht and D. Socek, Multimedia Security: Encryption Techniques, IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, 2003.

    Google Scholar 

  52. J. Kumar and S. Nirmala, A Novel and Efficient Perceptual Image Encryption Based on Knight Moves and Genetic Operations. In: Saeed K., Chaki N., Pati B., Bakshi S., Mohapatra D. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 563. Springer, Singapore.

    Google Scholar 

  53. P. Jagadeesh, P. Nagabhushan and R.P. Kumar, A Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel, International Journal of Computer Science and Information Technology, 5, 2013, 165–173.

    Article  Google Scholar 

  54. B. Yang, C. Busch and X. Niu, Perceptual image encryption via reversible histogram spreading, In Proceedings of International Symposium on Image and Signal Processing and Analysis, Salzburg, 2009, 471–476.

    Google Scholar 

  55. M.T.I. Ziad, A. Alanwar, M. Alzantot and M. Srivastava, CryptoImg: Privacy preserving processing over encrypted images, In Proceedings of IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, 70–575.

    Google Scholar 

  56. M. Li, X. Yi and H. Ma, A scalable encryption scheme for CCSDS image data compression standard, In Proceedings of IEEE International Conference on Information Theory and Information Security, Beijing, 2010, 646–649.

    Google Scholar 

  57. O. Watanabe, A. Nakazaki and H. Kiya, A scalable encryption method allowing backward compatibility with JPEG2000 images, In Proceedings of IEEE International Symposium on Circuits and Systems, Kobe, 2005, 6324–6327.

    Google Scholar 

  58. S.J. Wee and J.G. Apostolopoulos, Secure scalable video streaming for wireless networks, In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing,Salt Lake City, UT, 4, 2001, 2049–2052.

    Google Scholar 

  59. T. Sang, R. Wang and Y. Yan, Generating binary Bernoulli sequences based on a class of even-symmetric chaotic maps, IEEE Transactions on Communications, 49(4), 2001, 620–623.

    Article  MATH  Google Scholar 

  60. H. Sagan, Space-filling curves, Springer, New York, 1994.

    Book  MATH  Google Scholar 

  61. D.N. Bhat and S.K. Nayar, Ordinal Measures for Image Correspondence, IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 1998, 415–423.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Bhatnagar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kumar, S., Bhatnagar, G. (2019). SIE: An Application to Secure Stereo Images Using Encryption. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15887-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15886-6

  • Online ISBN: 978-3-030-15887-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics