An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images

We describe an effective method for image encryption which employs magnitude and phase manipulation using carrier images. Although it involves traditional methods like magnitude and phase encryptions, the novelty of this work lies in deploying the concept of carrier images for encryption purpose. To this end, a carrier image is randomly chosen from a set of stored images. One dimensional (1-D) discrete Fourier transform (DFT) is then carried out on the original image to be encrypted along with the carrier image. Row wise spectral addition and scaling is performed between the magnitude spectra of the original and carrier images by randomly selecting the rows. Similarly, row wise phase addition and scaling is performed between the original and carrier images phase spectra by randomly selecting the rows. The encrypted image obtained by these two operations is further subjected to one more level of magnitude and phase manipulation using another randomly chosen carrier image by 1-D DFT along the columns. The resulting encrypted image is found to be fully distorted, resulting in increasing the robustness of the proposed work. Further, applying the reverse process at the receiver, the decrypted image is found to be distortionless.




References:
[1] H. J. Beker and F. C. Piper, Cipher Systems: The Protection of Communications.
John Wiley & Sons, New York, 1982.
[2] C. P. Wu and C. J. Kuo, "Design of Integrated Multimedia Compression
and Encryption Systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp.
828-839, Oct. 2005.
[3] J. A. Buchmann, Introduction to Cryptography. Springer, New Delhi,
2004.
[4] O. Goldreich, Foundations of Cryptography: Vol I Basic Tools. Cambridge
University Press, UK, 2005.
[5] O. Goldreich, Foundations of Cryptography: Vol II Basic Applications.
Cambridge University Press, UK, 2005.
[6] K. S. Chan and F. Fekri, "A Block Cipher Crypto System using Wavelet
Transforms over Finite Fields," IEEE Trans. Signal Processing, vol. 52,
no. 10, pp. 2975-2991, Oct. 2004.
[7] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential
Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-
757, Feb. 2005.
[8] A. Martin et. al., "Is Image Steganography Natural?," IEEE Trans. Image
Processing, vol. 14, no. 12, pp. 2040-2050, Dec. 2005.
[9] K. Satish et. al., "Chaos based Spread Spectrum Image Steganography,"
IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 587-590, May.
2004.
[10] M. Ramkumar and A. N. Akansu, "Signaling methods for multimedia
steganography," IEEE Trans. Signal Processing, vol. 52, no. 4, pp. 1100-
1111, Apr. 2004.
[11] A. Takahashi et. al., "Multiple Watermarks for Stereo Audio Signals
using Phase-Modulation Techniques," IEEE Trans. Signal Processing,
vol. 53, no. 2, pp. 806-815, Feb. 2005.
[12] F. H. Wang et. al., "Hiding Watermark in Watermark," in Proc. IEEE Int.
symp. Circuits Syst. (ISCAS), Kobe, May 23-26, 2005, pp. 4018-4021.
[13] V. Solachidis and L. Pitas, "Circularly Symmetric Watermark Embedding
in 2-D DFT Domain," IEEE Trans. Image Processing, vol. 10, no.
11, pp. 1741-1753, Nov. 2001.
[14] I. J. Cox et. al., Digital Watermarking. Morgan Kaufmann Publishers,
CA, USA, 2002.
[15] H. J. Beker and F. C. Piper, Secure Speech Communications. Academic
Press, London, 1985.
[16] O. Goldreich, Foundations of Cryptography: Volume I Basic Applications.
Cambridge University Press, London, UK, 2005.
[17] O. Goldreich, Foundations of Cryptography: Volume II Basic Tools.
Cambridge University Press, London, UK, 2005.
[18] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling
of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129,
Mar. 2003.
[19] S. Sridharan et. al., "A fast fourier transform based speech encryption
system," Proc. IEE Communication, Speech and Vision, vol. 138, no. 3,
pp. 215-223, June 1991.
[20] A. K. Jain, Fundamentals of Digital Image Processing. Englewood
Cliffs, NJ: Prentice Hall, 1989.
[21] A. V. Oppenheim et. al., Signals and Systems. Englewood Cliffs, NJ:
Prentice Hall, 1996.
[22] A. V. Oppenheim and R. W. Schafer, Digital Signal Processing. Englewood
Cliffs, NJ: Prentice Hall, 1975.