Skip to main content

A Partial Image Encryption Method with Pseudo Random Sequences

  • Conference paper
Information Systems Security (ICISS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4332))

Included in the following conference series:

Abstract

We propose an effective approach for partial image encryption with pseudo random sequences (PRS). It is known that an image can be considered as a combination of correlated and uncorrelated data as well as most of the perceptual information are present in the correlated data rather than the uncorrelated data. Hence, the amount of residual intelligence present in an encrypted image depends on the correlated data. It is, therefore, sufficient to encrypt the correlated data instead of encrypting the entire image in order to speed up the entire operation. From the perception point of view, the most significant bit (MSB) planes have high adjacent correlation between the pixels whereas the least significant bit (LSB) planes contain comparatively more uncorrelated data. PRS with simple hardware like m-sequences and Gold sequences have less correlation between the adjacent bits. These can therefore serve as a good alternative for partially encrypting the MSB planes with low complexity to provide security against casual listeners. It is observed from the results that the new approach is able to reduce the residual intelligence as would have been obtained by encrypting the entire image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feng, Y., Li, L., Huang, F.: A Symmetric Image Encryption Approach based on Line Maps. In: Proc. Int. Symp. Sys. and Cont. Aeros. Astro., pp. 1362–1367 (2006)

    Google Scholar 

  2. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. Info. Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  3. Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  4. Elbirt, A.J., Paar, C.: An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. IEEE Trans. Parallel and Distributed Systems 16, 468–480 (2005)

    Article  Google Scholar 

  5. Yang, S., Lu, Z., Han, S.: An Asymmetric Image Encryption Based on Matrix Transformation. In: Proc. IEEE Int. Symp. Comm. and Info. Tech (ISCIT), vol. 1, pp. 66–69 (2004)

    Google Scholar 

  6. Dang, P.P., Chau, P.M.: Image Encryption for Secure Internet Multimedia Applications. IEEE Trans. Consumer Electronics 46, 395–403 (2000)

    Article  Google Scholar 

  7. Hou, Q., Wang, Y.: Security Traffic Image Transmission Based on EZW and AES. In: Proc. IEEE Intelligent Transportation Sys., vol. 1, pp. 86–89 (2003)

    Google Scholar 

  8. Ziedan, I.E., Fouad, M.M., Salem, D.H.: Application of Data Encryption Standard to bitmap and JPEG Images. In: Proc. IEEE National Radio Science Conf (NRSC), pp. 1–8 (2003)

    Google Scholar 

  9. Droogenbroeck, M.V., Benedett, R.: Techniques for a Selective Encryption of Uncompressed and Compressed Images. In: Proc. Advanced Concepts for Intelligent Vision Systems (ACIVS), pp. 90–96 (2002)

    Google Scholar 

  10. Chaeng, H., Li, X.: Partial Encryption of Compressed Images and Videos. IEEE Trans. Signal Processing 48, 2439–2451 (2000)

    Article  Google Scholar 

  11. Podesser, M., Schmidt, H.P., Uhl, A.: Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: Proc. 5th IEEE Nordic Signal Processing symp. (NORSIG) (2002)

    Google Scholar 

  12. Pommer, A., Uhl, A.: Selective Encryption of Wavelet Packet Subband Structures for Obscured Transmission of Visual Data. In: Proc. IEEE Benelux Signal Processing symp., pp. 25–28 (2002)

    Google Scholar 

  13. Wang, L.T., McCluskey, E.J.: Linear Feedback Shift Register Design Using Cyclic Codes. IEEE Trans. Computers 37, 1302–1306 (1988)

    Article  Google Scholar 

  14. Fuster, A., Garcia, L.J.: An efficient algorithm to generate binary sequences for cryptographic purposes. Theoretical Computer Science 259, 679–688 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  15. Golomb, S.W.: Shift Register Sequences. Alegan park press (1982)

    Google Scholar 

  16. Sudharsanan, S.: Shared Key Encryption of JPEG Color Images. IEEE Trans. Consumer Electronics 51, 1204–1211 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Subba Rao, Y.V., Mitra, A., Mahadeva Prasanna, S.R. (2006). A Partial Image Encryption Method with Pseudo Random Sequences. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_22

Download citation

  • DOI: https://doi.org/10.1007/11961635_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68962-1

  • Online ISBN: 978-3-540-68963-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics