An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images
We describe an effective method for image encryption
which employs magnitude and phase manipulation using carrier
images. Although it involves traditional methods like magnitude and
phase encryptions, the novelty of this work lies in deploying the
concept of carrier images for encryption purpose. To this end, a
carrier image is randomly chosen from a set of stored images. One
dimensional (1-D) discrete Fourier transform (DFT) is then carried
out on the original image to be encrypted along with the carrier
image. Row wise spectral addition and scaling is performed between
the magnitude spectra of the original and carrier images by randomly
selecting the rows. Similarly, row wise phase addition and scaling is
performed between the original and carrier images phase spectra by
randomly selecting the rows. The encrypted image obtained by these
two operations is further subjected to one more level of magnitude
and phase manipulation using another randomly chosen carrier image
by 1-D DFT along the columns. The resulting encrypted image is
found to be fully distorted, resulting in increasing the robustness
of the proposed work. Further, applying the reverse process at the
receiver, the decrypted image is found to be distortionless.
[1] H. J. Beker and F. C. Piper, Cipher Systems: The Protection of Communications.
John Wiley & Sons, New York, 1982.
[2] C. P. Wu and C. J. Kuo, "Design of Integrated Multimedia Compression
and Encryption Systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp.
828-839, Oct. 2005.
[3] J. A. Buchmann, Introduction to Cryptography. Springer, New Delhi,
2004.
[4] O. Goldreich, Foundations of Cryptography: Vol I Basic Tools. Cambridge
University Press, UK, 2005.
[5] O. Goldreich, Foundations of Cryptography: Vol II Basic Applications.
Cambridge University Press, UK, 2005.
[6] K. S. Chan and F. Fekri, "A Block Cipher Crypto System using Wavelet
Transforms over Finite Fields," IEEE Trans. Signal Processing, vol. 52,
no. 10, pp. 2975-2991, Oct. 2004.
[7] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential
Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-
757, Feb. 2005.
[8] A. Martin et. al., "Is Image Steganography Natural?," IEEE Trans. Image
Processing, vol. 14, no. 12, pp. 2040-2050, Dec. 2005.
[9] K. Satish et. al., "Chaos based Spread Spectrum Image Steganography,"
IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 587-590, May.
2004.
[10] M. Ramkumar and A. N. Akansu, "Signaling methods for multimedia
steganography," IEEE Trans. Signal Processing, vol. 52, no. 4, pp. 1100-
1111, Apr. 2004.
[11] A. Takahashi et. al., "Multiple Watermarks for Stereo Audio Signals
using Phase-Modulation Techniques," IEEE Trans. Signal Processing,
vol. 53, no. 2, pp. 806-815, Feb. 2005.
[12] F. H. Wang et. al., "Hiding Watermark in Watermark," in Proc. IEEE Int.
symp. Circuits Syst. (ISCAS), Kobe, May 23-26, 2005, pp. 4018-4021.
[13] V. Solachidis and L. Pitas, "Circularly Symmetric Watermark Embedding
in 2-D DFT Domain," IEEE Trans. Image Processing, vol. 10, no.
11, pp. 1741-1753, Nov. 2001.
[14] I. J. Cox et. al., Digital Watermarking. Morgan Kaufmann Publishers,
CA, USA, 2002.
[15] H. J. Beker and F. C. Piper, Secure Speech Communications. Academic
Press, London, 1985.
[16] O. Goldreich, Foundations of Cryptography: Volume I Basic Applications.
Cambridge University Press, London, UK, 2005.
[17] O. Goldreich, Foundations of Cryptography: Volume II Basic Tools.
Cambridge University Press, London, UK, 2005.
[18] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling
of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129,
Mar. 2003.
[19] S. Sridharan et. al., "A fast fourier transform based speech encryption
system," Proc. IEE Communication, Speech and Vision, vol. 138, no. 3,
pp. 215-223, June 1991.
[20] A. K. Jain, Fundamentals of Digital Image Processing. Englewood
Cliffs, NJ: Prentice Hall, 1989.
[21] A. V. Oppenheim et. al., Signals and Systems. Englewood Cliffs, NJ:
Prentice Hall, 1996.
[22] A. V. Oppenheim and R. W. Schafer, Digital Signal Processing. Englewood
Cliffs, NJ: Prentice Hall, 1975.
[1] H. J. Beker and F. C. Piper, Cipher Systems: The Protection of Communications.
John Wiley & Sons, New York, 1982.
[2] C. P. Wu and C. J. Kuo, "Design of Integrated Multimedia Compression
and Encryption Systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp.
828-839, Oct. 2005.
[3] J. A. Buchmann, Introduction to Cryptography. Springer, New Delhi,
2004.
[4] O. Goldreich, Foundations of Cryptography: Vol I Basic Tools. Cambridge
University Press, UK, 2005.
[5] O. Goldreich, Foundations of Cryptography: Vol II Basic Applications.
Cambridge University Press, UK, 2005.
[6] K. S. Chan and F. Fekri, "A Block Cipher Crypto System using Wavelet
Transforms over Finite Fields," IEEE Trans. Signal Processing, vol. 52,
no. 10, pp. 2975-2991, Oct. 2004.
[7] S. Trivedi and R. Chandramouli, "Secret Key Estimation in Sequential
Steganography," IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-
757, Feb. 2005.
[8] A. Martin et. al., "Is Image Steganography Natural?," IEEE Trans. Image
Processing, vol. 14, no. 12, pp. 2040-2050, Dec. 2005.
[9] K. Satish et. al., "Chaos based Spread Spectrum Image Steganography,"
IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 587-590, May.
2004.
[10] M. Ramkumar and A. N. Akansu, "Signaling methods for multimedia
steganography," IEEE Trans. Signal Processing, vol. 52, no. 4, pp. 1100-
1111, Apr. 2004.
[11] A. Takahashi et. al., "Multiple Watermarks for Stereo Audio Signals
using Phase-Modulation Techniques," IEEE Trans. Signal Processing,
vol. 53, no. 2, pp. 806-815, Feb. 2005.
[12] F. H. Wang et. al., "Hiding Watermark in Watermark," in Proc. IEEE Int.
symp. Circuits Syst. (ISCAS), Kobe, May 23-26, 2005, pp. 4018-4021.
[13] V. Solachidis and L. Pitas, "Circularly Symmetric Watermark Embedding
in 2-D DFT Domain," IEEE Trans. Image Processing, vol. 10, no.
11, pp. 1741-1753, Nov. 2001.
[14] I. J. Cox et. al., Digital Watermarking. Morgan Kaufmann Publishers,
CA, USA, 2002.
[15] H. J. Beker and F. C. Piper, Secure Speech Communications. Academic
Press, London, 1985.
[16] O. Goldreich, Foundations of Cryptography: Volume I Basic Applications.
Cambridge University Press, London, UK, 2005.
[17] O. Goldreich, Foundations of Cryptography: Volume II Basic Tools.
Cambridge University Press, London, UK, 2005.
[18] W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling
of Digital Video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129,
Mar. 2003.
[19] S. Sridharan et. al., "A fast fourier transform based speech encryption
system," Proc. IEE Communication, Speech and Vision, vol. 138, no. 3,
pp. 215-223, June 1991.
[20] A. K. Jain, Fundamentals of Digital Image Processing. Englewood
Cliffs, NJ: Prentice Hall, 1989.
[21] A. V. Oppenheim et. al., Signals and Systems. Englewood Cliffs, NJ:
Prentice Hall, 1996.
[22] A. V. Oppenheim and R. W. Schafer, Digital Signal Processing. Englewood
Cliffs, NJ: Prentice Hall, 1975.
@article{"International Journal of Electrical, Electronic and Communication Sciences:63584", author = "S. R. M. Prasanna and Y. V. Subba Rao and A. Mitra", title = "An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images", abstract = "We describe an effective method for image encryption
which employs magnitude and phase manipulation using carrier
images. Although it involves traditional methods like magnitude and
phase encryptions, the novelty of this work lies in deploying the
concept of carrier images for encryption purpose. To this end, a
carrier image is randomly chosen from a set of stored images. One
dimensional (1-D) discrete Fourier transform (DFT) is then carried
out on the original image to be encrypted along with the carrier
image. Row wise spectral addition and scaling is performed between
the magnitude spectra of the original and carrier images by randomly
selecting the rows. Similarly, row wise phase addition and scaling is
performed between the original and carrier images phase spectra by
randomly selecting the rows. The encrypted image obtained by these
two operations is further subjected to one more level of magnitude
and phase manipulation using another randomly chosen carrier image
by 1-D DFT along the columns. The resulting encrypted image is
found to be fully distorted, resulting in increasing the robustness
of the proposed work. Further, applying the reverse process at the
receiver, the decrypted image is found to be distortionless.", keywords = "Encryption, Carrier images, Magnitude manipulation,Phase manipulation.", volume = "2", number = "2", pages = "320-6", }