..............................
            ..............................
            ..............................
            
Selective Image Encryption using Singular Value Decomposition and Arnold Transform
        
        Selective  image  cryptosystem is a popular method due  to its low computational overhead for enciphering the  large 
volume  of digital  images.  Generally  selective  cryptosystem  encrypts  the  significant  part  of  the  data  set while  the insignificant 
part is considered  in  compression  process.  As  a  result,  such kind  of  approaches  reduces  the computational  overhead of 
encryption process as well as properly utilizes the limited bandwidth of communication channel. In this paper the authors have 
proposed  an  image  cryptosystem  for  a  compressed  image.  Initially,  the  original  image  was  compressed  using  Singular Value 
Decomposition (SVD) and subsequently, the  selective  parts of the  compressed image  are considered for enciphering purpose. 
We have followed the confusion-diffusion mechanism to encrypt the compressed image. In encryption process, the Arnold Cat 
Map (ACM) is used and the associated parameters of ACM are kept secret. The scheme is tested on a set of standard grayscale 
images  and  satisfactory  results  have  been  found in  terms  of  various  subjective  and  objective  analysis  like the visual 
appearance  of  cipher  image,  disparity  of  histogram  with  original  one,  computation  of  Peak  Signal  to  Noise  Ratio  (PSNR), 
Number of Pixel Change Rate (NPCR), correlation coefficient and entropy.    
            [1] Bahrami S. and Naderi M., Encryption of Multimedia Content in Partial Encryption Scheme of DCT Transform Coefficients using a Lightweight Stream Algorithm, Optik- International Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3693-3700, 2013.
[2] Bhatnagar G. and Wu Q., Selective Image Encryption based on Pixels of Interest and Singular Value Decomposition, Digital Signal Processing, vol. 22, no. 4, pp. 648-663, 2012.
[3] Chen L., Zhao D., and Ge F., Image Encryption based on Singular Value Decomposition and Arnold Transform in Fractional Domain, Optics Communications, vol. 291, pp. 98-103, 2013.
[4] Chen J., Zhu Z., and Yu H., A Fast Chaos- based Symmetric Image Cryptosystem with an Improved Diffusion Scheme, Optik- International Journal for Light and Electron Optics, vol. 125, no. 11, pp. 2472-2478, 2014.
[5] Chen W., Quan C., and Tay C., Optical Color Image Encryption based on Arnold Transform and Interference Method, Optics Communications, vol. 282, no. 18, pp. 3680- 3685, 2009.
[6] Gupta M. and Garg A., Analysis Of Image Compression Algorithm using DCT, International Journal of Engineering Research and Applications, vol. 2, no. 1, pp. 515-521, 2012.
[7] Khashan O. and Zin A., An Efficient Adaptive of Transparent Spatial Digital Image Encryption Procedia Technology, vol. 11, pp. 288-297, 2013.
[8] Kong D. and Shen X., Multiple-image Encryption based on Optical Wavelet Transform and Multichannel Fractional Fourier Transform, Optics and Laser Technology, vol. 57, pp. 343- 349, 2014. (12) ,, 100%ijD i j NPCRWH 12 12 0 ( , ) ( , )( , )1 ( , ) ( , ) if C i j C i jD i jf C i j C i j 22p q n t Selective Image Encryption using Singular Value Decomposition and Arnold Transform 747
[9] Kumar A. and Ghose M., Extended Substitution-diffusion based Image Cipher using Chaotic Standard Map, Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 1, pp. 372-382, 2011.
[10] Lian S., Multimedia Content Encryption: Techniques and Applications, Taylor and Francis Group, 2009.
[11] Lin K., Hybrid Encoding Method by Assembling the Magic-matrix Scrambling Method and the Binary Encoding Method in Image Hiding, Optics Communications, vol. 284, no. 7, pp. 1778-1784, 2011.
[12] Liu Y., Lin J., Fan J., and Zhou N., Image Encryption Based on Cat Map and Fractional Fourier Transform, Journal of Computational Information Systems, vol. 8, no. 18, pp. 7485- 7492, 2012.
[13] Lookbaugh T., Selective Encryption, Information Theory and Compression, in Proceedings of Asilomar Conference on Signals, Systems and Computers, Pacific Grove, pp. 373- 376, 2004.
[14] Maniccam S. and Bourbakis N., Lossless Image Compression and Encryption using SCAN, Pattern Recognition, vol. 34, no. 6, pp. 1229- 1245, 2001.
[15] Naik K. and Pal A., An Image Cryptosystem based on Diffusion of Significant Bit-planes of Scrambled Image with Generated Binary Key Matrices, International Conference on Computational Intelligence and Computing Research, Enathi, pp. 1-4, 2013.
[16] Sadek R., SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges, International Journal of Advanced Computer Science and Applications, vol. 3, no. 7, pp. 26-34, 2012.
[17] Samson C. and Sastry V., A Novel Image Encryption Supported by Compression using Multilevel Wavelet Transform, International Journal of Advanced Computer Science and Applications, vol. 3, no. 9, pp. 178-183, 2012.
[18] Schneier B., Cryptography: Theory and Practice, CRC Press, 1995.
[19] Li G. and Wang Y., A Privacy-Preserving Classification Method Based on Singular Value Decomposition, The International Arab Journal of Information Technology, vol. 9, no. 6, pp. 529- 534, 2012.
[20] Taneja N., Raman B., and Gupta I., Selective Image Encryption in Fractional Wavelet Domain, International Journal of Electronics and Communications, vol. 65, no. 4, pp. 338-344, 2011.
[21] Uhl A. and Pommer A., Image and Video Encryption: from Digital Rights Management to Secured Personal Communication, Springer Science and Business Media, 2005.
[22] Xu S., Chen X., Zhang R., Yang Y., and Guo Y., An Improved Chaotic Cryptosystem based on Circular bit Shift and XOR Operations, Physics Letters A, vol. 376, no. 10-11, pp. 1003-1010, 2012.
[23] Zhang Y. and Xiao D., An Image Encryption Scheme based on Rotation Matrix Bit-level Permutation and Block Diffusion, Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 1, pp. 74-82, 2014.
[24] Zhou Y., Bao L., and Chen C., A New 1D Chaotic System for Image Encryption, Signal Processing, vol. 97, pp. 172-182, 2014.
[25] Zhou Y., Panetta K., Agaian S., and Chen C., (n; k; p)-Gray Code for Image Systems, IEEE Transactions on Systems, Man and Cybernetics Part b: Cybernetics, vol. 43, no. 2, pp. 515-529, 2013. Kshiramani Naik is currently working as a full time Research Scholar in the Dept. of Computer Science & Engineering, Indian school of Mines, Dhanbad, India. She received her BE in CSE and M.Tech in CSE from BPUT Rourkela and NIT Rourkela respectively. Her research interest includes Image Cryptosystem, Steganography and Watermarking. Arup Kumar Pal is presently working as an Assistant Professor in the Dept. of Computer Science and Engineering, Indian School of Mines, Dhanbad, India. He did his Ph.D in Computer Science and Engineering from Indian School of Mines, Dhanbad in 2011. His main research interest includes Vector Quantization, Image Compression, Image Cryptosystem, Steganography, Watermarking and CBIR. Rohit Agarwal is currently working as an Assistant Professor at the Dept. of Computer Science & Engineering, JSS Academy of Technical Education Noida (U.P.), India. He has completed his M.Tech degree in Computer Application from the Indian School of Mines Dhanbad (India) in 2013. His research interests include Digital Image Processing and Numerical Linear Algebra.
