Abstract
To provide the security to image contents, most encryption techniques are designed for synthetic and real images which is, however, not applicable to stereo images. Stereo images generally consists of two views (left and right views) of a scene with known viewpoints. The only way is to encrypt both left and right images separately. To address this issue, this chapter introduces a new and effective encryption technique to encrypt left and right stereo images simultaneously to produce a single encrypted image. A decryption process is finally introduced to generate left and right stereo images from the final encrypted image. The extensive experiments on different stereo images demonstrate the efficiency and the robustness of the proposed encryption technique.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
S. Lian, MultiMedia Content Encryption: Techniques and Applications, CRC Press, Boca Raton, FL, 2008.
S.S. Maniccam and N.G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition, 37(4), 2004, 725–737.
H. Gao, Y. Zhang, S. Liang and D. Li, A new chaotic algorithm for image encryption, Chaos, Solitons & Fractals, 29(2), 2006, 393–399.
T.G. Gao and Z.Q. Chen, Image encryption based on a new total shuffling algorithm, Chaos, Solitons & Fractals, 38(1), 2008, 213–220.
X. Tong and M. Cui, Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator, Signal Processing, 89(4), 2009, 480–491.
Y. Wang, K.W. Wong, X.F. Liao and G.R. Chen, A new chaos-based fast image encryption algorithm, Applied Soft Computing, 11(1), 2011, 514–522.
X. Li, J. Knipe and H. Cheng, Image compression and encryption using tree structures, Pattern Recognition Letters, 18(11–13), 1997, 1253–1259.
Y. Mao, G. Chen and S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps, International Journal of Bifurcation and chaos, 14(10), 2004, 3613–3624.
M.G. Perkins, Data compression of stereopairs, IEEE Transactions on Communications, 40, 1992, pp. 684–696.
H. Aydinoglu and M. H. Hayes, Stereo image coding: A projection approach, IEEE Transactions on Image Processing, 7(4), 1998, 507–516
T. Frajka, and K. Zeger, Residual Image Coding for Stereo Image Compression, Optical Engineering, 42(1), 2003, 182–189.
M. Kaaniche, A. Benazza-Benyahia, B. Pesquet-Popescu and J.C. Pesquet, Vector Lifting Schemes for Stereo Image Coding, IEEE Transactions on Image Processing, 18(11), 2009, 2463–2475.
Gaurav Bhatnagar, Sanjeev Kumar, R. Balasubramanian and N. Sukavanam, Stereo image coding via digital watermarking, Journal of Electronic Imaging, 18(3), 2009, 0330121–9.
L.F.R. Lucas, N.M.M. Rodrigues, E.A.B. da Silva and S.M.M. de Faria, Stereo image coding using dynamic template-matching prediction, In proceeding of International Conference on Computer as a Tool (EUROCON), Lisbon, 2011, 1–4.
S. Kumar, G. Bhatnagar, B. raman and N. Sukavanam, Security of Stereo Images During Communication and Transmission, Advanced Science Letters, 6, 2012, 173–179.
F. A El-Samie, H.H. Ahmed, I.F. Elashry, M.H. Shahieen, O.S. Faragallah, E.M. El-Rabaie, S.A. Alshebeili, Image Encryption: A Communication Perspective, CRC Press, 2014.
D. Stinson, Cryptography: Theory and Practice, 2nd edition, Chapman & Hall/CRC Press, Boca Raton, FL, 2002.
Y. Kim, J. Song, I. Moon and Y. Lee, Interference-based multiple-image encryption using binary phase masks, Optics and Lasers in Engineering, 7, 2018, 81–287.
Yong Wang, Yi Zhao, Qing Zhou and Zehui Lin, Image encryption using partitioned cellular automata, Neurocomputing, 275, 2018, 1318–1332.
Y. Xiong, C. Quan and C.J. Tay, Multiple image encryption scheme based on pixel exchange operation and vector decomposition, Optics and Lasers in Engineering, 101, 2018, 113–121.
X. Li, C. Li and I. Lee, Chaotic image encryption using pseudo-random masks and pixel mapping, Signal Processing, 125, 2016, 48–63.
W. Yap, R.C.-W. Phan, B. Goi, W. Yau and S. Heng, On the effective subkey space of some image encryption algorithms using external key, Journal of Visual Communication and Image Representation, 40, 2016, 51–57.
M. García-Martínez, L.J. Ontañón-García, E. Campos-Cantón and S. Čelikovský, Hyper-chaotic encryption based on multi-scroll piecewise linear systems, Applied Mathematics and Computation, 270, 2015, 413–424.
D. Liu, W. Zhang, H. Yu and Z. Zhu, An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion, Signal Processing, 151, 2018, 130–143.
M.K. Abdmouleh, A. Khalfallah and M.S. Bouhlel, A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm, Procedia Computer Science, 112, 2017, 369–376.
M. Hamdi, R. Rhouma and S. Belghith, A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map, Signal Processing, 131, 2017, 514–526.
T. Xiang, J. Hu and J. Sun, Outsourcing chaotic selective image encryption to the cloud with steganography, Digital Signal Processing, 43, 2015, 28–37.
T.Xiang, J. Qu and D. Xiao, Joint SPIHT compression and selective encryption, Applied Soft Computing, 21, 2014, 159–170.
G. Bhatnagar and Q.M. Jonathan Wu, Selective image encryption based on pixels of interest and singular value decomposition, Digital Signal Processing, 22(4), 2012, 648–663.
W. Zeng and S. Lei, Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia 5(1), 2003, 118–129.
C. Wu, and C.C. Jay Kuo, Efficient multimedia encryption via entropy codec design, In Proceeding of SPIE International Symposium on Electronic Imaging, San Jose, CA, 4314, 2001, 128–138.
Y. Zhang, B. Xu and N. Zhou, A novel image compression–encryption hybrid algorithm based on the analysis sparse representation, Optics Communications, 392, 2017, 223–233.
G. Hu, D. Xiao, Y. Wang and T. Xiang, An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications, Journal of Visual Communication and Image Representation, 44, 2017, 116–127.
X. Chai, Z. Gan, Y. Chen and Y. Zhang, A visually secure image encryption scheme based on compressive sensing, Signal Processing, 134, 2017, 35–51.
R. Fay, Introducing the counter mode of operation to Compressed Sensing based encryption, Information Processing Letters, 116(4), 2016, 279–283.
C. Wang, J. Ni and Q. Huang, A new encryption-then-compression algorithm using the rate–distortion optimization, Signal Processing: Image Communication, 39, 2015, 141–150.
Z. Hua, F. Jin, B. Xu and H. Huang, 2D Logistic-Sine-coupling map for image encryption, Signal Processing, 149, 2018, 48–161.
W. Cao, Y. Zhou, C.L.P. Chen and L. Xia, Medical image encryption using edge maps, Signal Processing, 132, 2017, 96–109.
C. Li, Cracking a hierarchical chaotic image encryption algorithm based on permutation, Signal Processing, 118, 2016, 203–210.
X. Wang, Q. Wang and Y. Zhang, A fast image algorithm based on rows and columns switch, Nonlinear Dynamics, 79(2), 2015, 1141–1149.
M. Murillo-Escobar, C. Cruz-Hernndez, F. Abundiz-Prez, R. Lpez-Gutirrez and O.A.D. Campo, A RGB image encryption algorithm based on total plain image characteristics and chaos, Signal Processing, 109, 2015, 119–131.
G. Ye and J. Zhou, A block chaotic image encryption scheme based on self-adaptive modelling, Applied Soft Computing, 22, 2014, 351–357.
Y. Zhou, K. Panetta, S. Agaian and C.L.P. Chen, Image encryption using P-Fibonacci transform and decomposition, Optics Communication, 285(5), 2012, 594–608.
J. Hu and F. Han, A pixel-based scrambling scheme for digital medical images protection, Journal of Network and Computer Applications, 32(4), 2009, 788–794.
C. Li, H. Li, F. Li, D. Wei, X. Yang and J. Zhang, Multiple-image encryption by using robust chaotic map in wavelet transform domain, Optik, 71, 2018, 277–286.
X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong and H. Chen, Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain, Optics and Lasers in Engineering, 96, 2017, 7–16.
L. Yuan, Q. Ran and T. Zhao, Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain, Optics & Laser Technology, 88, 2017, 111–120.
J.B. Lima, E.S. da Silva and R.M. Campello de Souza, Cosine transforms over fields of characteristic: Fast computation and application to image encryption, Signal Processing: Image Communication, 54, 2017, 130–139.
J.B. Lima, F. Madeiro and F.J.R. Sales, Encryption of medical images based on the cosine number transform, Signal Processing: Image Communication, 35, 2015, 1–8.
H. Li and Y. Wang, Double-image encryption based on discrete fractional random transform and chaotic maps, Optics and Lasers in Engineering, 49(7), 2011, 753–757.
B. Furht and D. Socek, Multimedia Security: Encryption Techniques, IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, 2003.
J. Kumar and S. Nirmala, A Novel and Efficient Perceptual Image Encryption Based on Knight Moves and Genetic Operations. In: Saeed K., Chaki N., Pati B., Bakshi S., Mohapatra D. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 563. Springer, Singapore.
P. Jagadeesh, P. Nagabhushan and R.P. Kumar, A Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel, International Journal of Computer Science and Information Technology, 5, 2013, 165–173.
B. Yang, C. Busch and X. Niu, Perceptual image encryption via reversible histogram spreading, In Proceedings of International Symposium on Image and Signal Processing and Analysis, Salzburg, 2009, 471–476.
M.T.I. Ziad, A. Alanwar, M. Alzantot and M. Srivastava, CryptoImg: Privacy preserving processing over encrypted images, In Proceedings of IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, 70–575.
M. Li, X. Yi and H. Ma, A scalable encryption scheme for CCSDS image data compression standard, In Proceedings of IEEE International Conference on Information Theory and Information Security, Beijing, 2010, 646–649.
O. Watanabe, A. Nakazaki and H. Kiya, A scalable encryption method allowing backward compatibility with JPEG2000 images, In Proceedings of IEEE International Symposium on Circuits and Systems, Kobe, 2005, 6324–6327.
S.J. Wee and J.G. Apostolopoulos, Secure scalable video streaming for wireless networks, In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing,Salt Lake City, UT, 4, 2001, 2049–2052.
T. Sang, R. Wang and Y. Yan, Generating binary Bernoulli sequences based on a class of even-symmetric chaotic maps, IEEE Transactions on Communications, 49(4), 2001, 620–623.
H. Sagan, Space-filling curves, Springer, New York, 1994.
D.N. Bhat and S.K. Nayar, Ordinal Measures for Image Correspondence, IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 1998, 415–423.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kumar, S., Bhatnagar, G. (2019). SIE: An Application to Secure Stereo Images Using Encryption. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-15887-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15886-6
Online ISBN: 978-3-030-15887-3
eBook Packages: Computer ScienceComputer Science (R0)