scispace - formally typeset
Search or ask a question
Book ChapterDOI

A novel image encryption framework based on markov map and singular value decomposition

TL;DR: A novel yet simple encryption technique is proposed based on toral automorphism, Markov map and singular value decomposition (SVD) and a reliable decryption scheme is proposed to construct original image from encrypted image.
Abstract: In this paper, a novel yet simple encryption technique is proposed based on toral automorphism, Markov map and singular value decomposition (SVD). The core idea of the proposed scheme is to scramble the pixel positions by the means of toral automorphism and then encrypting the scrambled image using Markov map and SVD. The combination of Markov map and SVD changed the pixels values significantly in order to confuse the relationship among the pixels. Finally, a reliable decryption scheme is proposed to construct original image from encrypted image. Experimental results demonstrate the efficiency and robustness of the proposed scheme.
Citations
More filters
Journal ArticleDOI
TL;DR: A novel encryption scheme is proposed for securing multiple images during communication and transmission over insecure channel by discretizing continuous fractional wavelet transform and chaotic maps.

117 citations

Journal ArticleDOI
TL;DR: Experimental results prove the first ETC approach for processing ECG data using the singular value decomposition technique to be an effective technique for assuring data security as well as compression performance forECG data.
Abstract: Electrocardiogram (ECG) monitoring systems are widely used in healthcare. ECG data must be compressed for transmission and storage. Furthermore, there is a need to be able to directly process biomedical signals in encrypted domains to ensure the protection of patients’ privacy. Existing encryption-then-compression (ETC) approaches for multimedia using the state-of-the-art encryption techniques inevitably sacrifice the compression efficiency or signal quality. This paper presents the first ETC approach for processing ECG data. The proposed approach not only can protect data privacy but also provide the same quality of the reconstructed signals without sacrificing the compression efficiency relative to unencrypted compressions. Specifically, the singular value decomposition technique is used to compress the data such that the proposed system can provide quality-control compressed data, even though the data has been encrypted. Experimental results prove the proposed system to be an effective technique for assuring data security as well as compression performance for ECG data.

52 citations


Cites methods from "A novel image encryption framework ..."

  • ...In [30], the SVD is exploited to produce an orthogonal key matrix which is used to encrypt images....

    [...]

Proceedings ArticleDOI
01 May 2012
TL;DR: Simulation results justify the feasibility of the proposed scheme in image encryption purpose and show the ability to enforce security in chaotic systems and singular value decomposition.
Abstract: This paper presents an efficient image encryption scheme based on chaotic systems and singular value decomposition. In this scheme, the image pixel's positions are scrambled using chaotic systems with variable control parameters. To further enforce the security, the pixel gray values are modified using a combination between singular value decomposition (SVD) and chaotic polynomial map. Simulation results justify the feasibility of the proposed scheme in image encryption purpose.

12 citations


Cites methods from "A novel image encryption framework ..."

  • ...Scrambling is done by various methods based on toral automorphism ([3]), two or high-dimentional chaotic system with fixed control parameters [4] etc....

    [...]

  • ..., and the diffusion is done through the diffusion cipher like chaos based methods ([2-5]), DNA based methods ([6]), and other assorted methods [7, ....

    [...]

  • ...[3] Considered items Bhantnagar et al....

    [...]

  • ...3 Resistance to differential attack To test the influence of a one-pixel change in cipher image, two common measures [1-5] are used, i....

    [...]

Proceedings ArticleDOI
01 Nov 2014
TL;DR: Experimental results shows that the proposed algorithm is lossless in nature, robust against statistical attacks and has high key sensitivity, and low PSNR values indicate thatThe proposed algorithm provides a high level of perceptual security for the biometric data.
Abstract: In the recent past we have been facing security challenges towards the transmission of biometric data over unsecured data channels. A lot of techniques have been developed and implemented for the secure transmission of the data. Taking the security concept in mind we introduce an efficient method based on chaotic theory for secured data transmission. The core idea of the proposed method is to shuffle the adjacent pixel correlation using the combination of Arnold Cat Map, Holmes Map and Singular Value Decomposition (SVD). The pixel values are scrambled using the Arnold Cat Map and further Holmes Map and SVD are used to alter the pixel values to complicate the relationship. Finally, decryption method is proposed to reconstruct the original data from encrypted data. Performance of proposed algorithm has been experimentally analyzed using statistical attack analysis, key sensitivity analysis and Peak Signal to Noise Ratio (PSNR). Experimental results shows that the proposed algorithm is lossless in nature, robust against statistical attacks and has high key sensitivity. Further low PSNR values indicate that the proposed algorithm provides a high level of perceptual security for the biometric data.

9 citations


Cites background from "A novel image encryption framework ..."

  • ...Although lot of research has been done in field of chaotic theory [6, 7] but still there is need for more robustness and perceptual security to make encryption schemes more efficient and secured....

    [...]

  • ...Experimental results of the proposed algorithm indicates significant reduction of the correlation coefficient among adjacent pixels and significantly low PSNR values[6] makes it difficult to retrieve the original image from its encrypted one without the knowledge of correct decryption key....

    [...]

Proceedings ArticleDOI
01 Mar 2018
TL;DR: A novel image encryption technique is proposed based on reference sets with some prime numbers and polar decomposition using a recursive random number generation process, and a reliable decryption process has been presented to reconstruct the original image.
Abstract: In this paper, a novel image encryption technique is proposed based on reference sets with some prime numbers and polar decomposition. In this technique, a primary secret key and reference sets are used in the generation of feature vector using a recursive random number generation (RRNG) process. This feature vector is then used for encryption process. Finally, a reliable decryption process has been presented to reconstruct the original image. The Simulated results demonstrate the efficiency and robustness of the proposed technique.

8 citations


Cites background from "A novel image encryption framework ..."

  • ...In [7], the authors have proposed an encryption framework based on singular value decomposition (SVD)....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme based on Henon chaotic maps provides an efficient and secure way for image encryption.
Abstract: Recent researches of image encryption algorithms have been increasingly based on chaotic systems, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper presents a new nonlinear chaotic algorithm (NCA) which uses power function and tangent function instead of linear function. Its structural parameters are obtained by experimental analysis. And an image encryption algorithm in a one-time-one-password system is designed. The experimental results demonstrate that the image encryption algorithm based on NCA shows advantages of large key space and high-level security, while maintaining acceptable efficiency. Compared with some general encryption algorithms such as DES, the encryption algorithm is more secure.

485 citations

MonographDOI
29 Jan 1998
TL;DR: In this article, the authors present an application of ergodic theory to arithmetic progressions in the context of topological dynamics and topological entropy, and show that it can be used to define invariant measures for commuting transformations.
Abstract: Introduction and preliminaries Part I. Topological Dynamics: 1. Examples and basic properties 2. An application of recurrence to arithmetic progressions 3. Topological entropy 4. Interval maps 5. Hyperbolic toral automorphisms 6. Rotation numbers Part II. Measurable Dynamics: 7. Invariant measures 8. Measure theoretic entropy 9. Ergodic measures 10. Ergodic theorems 11. Mixing 12. Statistical properties Part III. Supplementary Chapters: 13. Fixed points for the annulus 14. Variational principle 15. Invariant measures for commuting transformations 16. An application of ergodic theory to arithmetic progressions.

262 citations

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the new image total shuffling algorithm has a low time complexity and the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.
Abstract: This paper presents image encryption scheme, which employs a new image total shuffling matrix to shuffle the positions of image pixels and then uses the states combination of two chaotic systems to confuse the relationship between the plain-image and the cipher-image. The experimental results demonstrate that the new image total shuffling algorithm has a low time complexity and the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.

256 citations

Journal ArticleDOI
TL;DR: The main characteristics of the proposed methods are image encryption, first stage compression-based frames differences and encryption of video whose compression error can be bounded pixelwise by a user specified value, very large number of encryption keys, and ability to encrypt large blocks of any digital data.

230 citations


"A novel image encryption framework ..." refers background or methods in this paper

  • ...A one dimensional map M : U → U, U ⊂ R, U usually taken to be [0, 1 ] or [-1,1] is defined by the difference relation...

    [...]

  • ...In second phase, the scrambled image is then passed through some cryptographic algorithm like SCAN based methods [ 1 , 2], chaos based methods [3‐8], tree structure based methods [9, 10] and other miscellaneous methods [11, 12]....

    [...]

Journal ArticleDOI
TL;DR: Through the comparison to compound chaos with 2D baker and DES encryption methods, it is concluded that the new image encryption method with speed and high security solves the problem unable to resist chosen plaintext attack and low precision of one-dimensional chaotic function by perturbation.

184 citations