Skip to main content
Top
Published in: Wireless Personal Communications 4/2014

01-08-2014

A Noisy Channel Tolerant Image Encryption Scheme

Published in: Wireless Personal Communications | Issue 4/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we present an image encryption scheme that has the capability to tolerate noisy effects of a wireless channel. This means if the encrypted image data is corrupted by channel noise up to a certain level, correct decryption is possible with some distortion. The proposed image encryption scheme relies on some very interesting properties of orthogonal matrices containing columns that form a set of orthonormal basis vectors. Besides being tolerant to noisy channels, the proposed scheme also provides good security against well-known cryptographic attacks as demonstrated in this paper by a number of experimental results and security analysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yang, M., Bourbakis, N., & Li, S. (2004). Data–image–video encryption. IEEE Potentials, 28–34. Yang, M., Bourbakis, N., & Li, S. (2004). Data–image–video encryption. IEEE Potentials, 28–34.
2.
go back to reference Lian, S. (2008). Multimedia content encryption: Techniques and applications. Boca Raton, FL: CRC Press. Lian, S. (2008). Multimedia content encryption: Techniques and applications. Boca Raton, FL: CRC Press.
4.
go back to reference Banu, R. (2009). Fault-tolerant encryption for space application. IEEE Transactions for Aerospace and Electronic System, 45(1), 266–279.CrossRef Banu, R. (2009). Fault-tolerant encryption for space application. IEEE Transactions for Aerospace and Electronic System, 45(1), 266–279.CrossRef
5.
go back to reference Chunren, L. (2009). An Efficient fault tolerant cryptosystem. In System: Internastional conference E-business and information security (pp. 1–5). Chunren, L. (2009). An Efficient fault tolerant cryptosystem. In System: Internastional conference E-business and information security (pp. 1–5).
6.
go back to reference Kumar, A., Gambhir, D., & Rajpal, N. (2007). Robust and secret data transmission over the noisy channel. In International conference signal processing, communications and networking (pp. 199–203). Kumar, A., Gambhir, D., & Rajpal, N. (2007). Robust and secret data transmission over the noisy channel. In International conference signal processing, communications and networking (pp. 199–203).
7.
go back to reference Korrai, P. K., Swamy, M. N. S., & Deergha, R. K. (2012). Robust transmission of watermarked medical images over wireless channels. In IEEE Global Humanitarian Technology Conference (pp. 242–246). Korrai, P. K., Swamy, M. N. S., & Deergha, R. K. (2012). Robust transmission of watermarked medical images over wireless channels. In IEEE Global Humanitarian Technology Conference (pp. 242–246).
8.
go back to reference Ahmad, M., Haque, M. E., & Farooq, O. (2011). A noise resilient scrambling scheme for noisy transmission channel. In International conference on multimedia signal processing and communication technologies (pp. 91–94). Ahmad, M., Haque, M. E., & Farooq, O. (2011). A noise resilient scrambling scheme for noisy transmission channel. In International conference on multimedia signal processing and communication technologies (pp. 91–94).
9.
go back to reference Wang, Y., & Zhu, Q. F. (May 1998). Error control and concealment for video communication: A review. Proceedings of the IEEE, 86(5), 974–997. Wang, Y., & Zhu, Q. F. (May 1998). Error control and concealment for video communication: A review. Proceedings of the IEEE, 86(5), 974–997.
10.
go back to reference Wang, Y., Wenger, S., Wen, J., & Katsaggelos, A. K. (July 2000). Error resilient video coding techniques. IEEE Signal Processing Magazine, 17(4), 61–82. Wang, Y., Wenger, S., Wen, J., & Katsaggelos, A. K. (July 2000). Error resilient video coding techniques. IEEE Signal Processing Magazine, 17(4), 61–82.
11.
go back to reference Lin, C. Y., Sow, D., & Chang, S. F. (2001). Using self-authentication-and-recovery images for error concealment in wireless environments. In Proceedings of SPIE (Vol. 4518, pp. 267–274). Lin, C. Y., Sow, D., & Chang, S. F. (2001). Using self-authentication-and-recovery images for error concealment in wireless environments. In Proceedings of SPIE (Vol. 4518, pp. 267–274).
12.
go back to reference Kang, L. W., & Leou, J. J. (2003). A new error resilient coding scheme for JPEG image transmission based on data embedding and vector quantization. InProceedings of IEEE international symposium on circuits and systems, Bangkok, Thailand (Vol. 2, pp. 532–535). Kang, L. W., & Leou, J. J. (2003). A new error resilient coding scheme for JPEG image transmission based on data embedding and vector quantization. InProceedings of IEEE international symposium on circuits and systems, Bangkok, Thailand (Vol. 2, pp. 532–535).
13.
go back to reference Kang, L. W., & Leou, J. J. (2003). Two error resilient coding schemes for wavelet-based image transmission based on data embedding and genetic algorithms. In Proceedings of IEEE international conference on image processing, Barcelona, Spain (pp. 461–464). Kang, L. W., & Leou, J. J. (2003). Two error resilient coding schemes for wavelet-based image transmission based on data embedding and genetic algorithms. In Proceedings of IEEE international conference on image processing, Barcelona, Spain (pp. 461–464).
14.
go back to reference Lay, D. C. (2009). Linear algebra and its applications. Upper Saddle River: Pearson Education. Lay, D. C. (2009). Linear algebra and its applications. Upper Saddle River: Pearson Education.
15.
go back to reference Meyer, C. D. (2000). Matrix analysis and applied linear algebra, SAIM. Meyer, C. D. (2000). Matrix analysis and applied linear algebra, SAIM.
16.
go back to reference Andrews, H., & Patterson, C. L. (1976). Singular value decomposition and digital image processing. IEEE Transactions on Acoustics, Speech and Signal Processing, ASSP–24(1), 26–53.CrossRef Andrews, H., & Patterson, C. L. (1976). Singular value decomposition and digital image processing. IEEE Transactions on Acoustics, Speech and Signal Processing, ASSP–24(1), 26–53.CrossRef
17.
go back to reference Liu, R., & Tan, T. (2002). An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia, 4(1), 121–128.CrossRef Liu, R., & Tan, T. (2002). An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia, 4(1), 121–128.CrossRef
18.
go back to reference Ghaderpanah, M., & Hamza, A. B. (2006). Secure copyright protection of digital images using non negative matrix factorization. In 23rd Biennial symposium on communication (pp. 344–347). Ghaderpanah, M., & Hamza, A. B. (2006). Secure copyright protection of digital images using non negative matrix factorization. In 23rd Biennial symposium on communication (pp. 344–347).
19.
go back to reference Koh, M. S., Marek, E. R., & Talarico, C. (2007). A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks. In International conference on multimedia and expo, Beijing, China (pp. 1527–1530). Koh, M. S., Marek, E. R., & Talarico, C. (2007). A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks. In International conference on multimedia and expo, Beijing, China (pp. 1527–1530).
20.
go back to reference Schneier, B. (1996). Applied cryptography. USA: Wiley. Schneier, B. (1996). Applied cryptography. USA: Wiley.
22.
go back to reference Ahmed, F., Siyal, M. Y., & Abbas, V. U. (2010). A perceptually scalable and JPEG compression tolerant image encryption scheme. In Fourth Pacific rim symposium on image and video technology (pp. 232–238). Ahmed, F., Siyal, M. Y., & Abbas, V. U. (2010). A perceptually scalable and JPEG compression tolerant image encryption scheme. In Fourth Pacific rim symposium on image and video technology (pp. 232–238).
23.
go back to reference Montgomery, D. C., & Runger, G. C. (2004). Applied statistics and probability for engineers (3rd ed.). New York: Wiley. Montgomery, D. C., & Runger, G. C. (2004). Applied statistics and probability for engineers (3rd ed.). New York: Wiley.
24.
go back to reference Walpole, R. E., & Myers, R. H. (1990). Probability and statistics for engineers and scientists. New York: Maxwell Macmillan International Editions. Walpole, R. E., & Myers, R. H. (1990). Probability and statistics for engineers and scientists. New York: Maxwell Macmillan International Editions.
25.
go back to reference Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.CrossRefMATHMathSciNet Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.CrossRefMATHMathSciNet
Metadata
Title
A Noisy Channel Tolerant Image Encryption Scheme
Publication date
01-08-2014
Published in
Wireless Personal Communications / Issue 4/2014
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1667-5

Other articles of this Issue 4/2014

Wireless Personal Communications 4/2014 Go to the issue