The International Arab Journal of Information Technology (IAJIT)


Selective Image Encryption using Singular Value Decomposition and Arnold Transform

Selective image cryptosystem is a popular method due to its low computational overhead for enciphering the large volume of digital images. Generally selective cryptosystem encrypts the significant part of the data set while the insignificant part is considered in compression process. As a result, such kind of approaches reduces the computational overhead of encryption process as well as properly utilizes the limited bandwidth of communication channel. In this paper the authors have proposed an image cryptosystem for a compressed image. Initially, the original image was compressed using Singular Value Decomposition (SVD) and subsequently, the selective parts of the compressed image are considered for enciphering purpose. We have followed the confusion-diffusion mechanism to encrypt the compressed image. In encryption process, the Arnold Cat Map (ACM) is used and the associated parameters of ACM are kept secret. The scheme is tested on a set of standard grayscale images and satisfactory results have been found in terms of various subjective and objective analysis like the visual appearance of cipher image, disparity of histogram with original one, computation of Peak Signal to Noise Ratio (PSNR), Number of Pixel Change Rate (NPCR), correlation coefficient and entropy.

[1] Bahrami S. and Naderi M., Encryption of Multimedia Content in Partial Encryption Scheme of DCT Transform Coefficients using a Lightweight Stream Algorithm, Optik- International Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3693-3700, 2013.

[2] Bhatnagar G. and Wu Q., Selective Image Encryption based on Pixels of Interest and Singular Value Decomposition, Digital Signal Processing, vol. 22, no. 4, pp. 648-663, 2012.

[3] Chen L., Zhao D., and Ge F., Image Encryption based on Singular Value Decomposition and Arnold Transform in Fractional Domain, Optics Communications, vol. 291, pp. 98-103, 2013.

[4] Chen J., Zhu Z., and Yu H., A Fast Chaos- based Symmetric Image Cryptosystem with an Improved Diffusion Scheme, Optik- International Journal for Light and Electron Optics, vol. 125, no. 11, pp. 2472-2478, 2014.

[5] Chen W., Quan C., and Tay C., Optical Color Image Encryption based on Arnold Transform and Interference Method, Optics Communications, vol. 282, no. 18, pp. 3680- 3685, 2009.

[6] Gupta M. and Garg A., Analysis Of Image Compression Algorithm using DCT, International Journal of Engineering Research and Applications, vol. 2, no. 1, pp. 515-521, 2012.

[7] Khashan O. and Zin A., An Efficient Adaptive of Transparent Spatial Digital Image Encryption Procedia Technology, vol. 11, pp. 288-297, 2013.

[8] Kong D. and Shen X., Multiple-image Encryption based on Optical Wavelet Transform and Multichannel Fractional Fourier Transform, Optics and Laser Technology, vol. 57, pp. 343- 349, 2014. (12) ,, 100%ijD i j NPCRWH 12 12 0 ( , ) ( , )( , )1 ( , ) ( , ) if C i j C i jD i jf C i j C i j 22p q n t Selective Image Encryption using Singular Value Decomposition and Arnold Transform 747

[9] Kumar A. and Ghose M., Extended Substitution-diffusion based Image Cipher using Chaotic Standard Map, Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 1, pp. 372-382, 2011.

[10] Lian S., Multimedia Content Encryption: Techniques and Applications, Taylor and Francis Group, 2009.

[11] Lin K., Hybrid Encoding Method by Assembling the Magic-matrix Scrambling Method and the Binary Encoding Method in Image Hiding, Optics Communications, vol. 284, no. 7, pp. 1778-1784, 2011.

[12] Liu Y., Lin J., Fan J., and Zhou N., Image Encryption Based on Cat Map and Fractional Fourier Transform, Journal of Computational Information Systems, vol. 8, no. 18, pp. 7485- 7492, 2012.

[13] Lookbaugh T., Selective Encryption, Information Theory and Compression, in Proceedings of Asilomar Conference on Signals, Systems and Computers, Pacific Grove, pp. 373- 376, 2004.

[14] Maniccam S. and Bourbakis N., Lossless Image Compression and Encryption using SCAN, Pattern Recognition, vol. 34, no. 6, pp. 1229- 1245, 2001.

[15] Naik K. and Pal A., An Image Cryptosystem based on Diffusion of Significant Bit-planes of Scrambled Image with Generated Binary Key Matrices, International Conference on Computational Intelligence and Computing Research, Enathi, pp. 1-4, 2013.

[16] Sadek R., SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges, International Journal of Advanced Computer Science and Applications, vol. 3, no. 7, pp. 26-34, 2012.

[17] Samson C. and Sastry V., A Novel Image Encryption Supported by Compression using Multilevel Wavelet Transform, International Journal of Advanced Computer Science and Applications, vol. 3, no. 9, pp. 178-183, 2012.

[18] Schneier B., Cryptography: Theory and Practice, CRC Press, 1995.

[19] Li G. and Wang Y., A Privacy-Preserving Classification Method Based on Singular Value Decomposition, The International Arab Journal of Information Technology, vol. 9, no. 6, pp. 529- 534, 2012.

[20] Taneja N., Raman B., and Gupta I., Selective Image Encryption in Fractional Wavelet Domain, International Journal of Electronics and Communications, vol. 65, no. 4, pp. 338-344, 2011.

[21] Uhl A. and Pommer A., Image and Video Encryption: from Digital Rights Management to Secured Personal Communication, Springer Science and Business Media, 2005.

[22] Xu S., Chen X., Zhang R., Yang Y., and Guo Y., An Improved Chaotic Cryptosystem based on Circular bit Shift and XOR Operations, Physics Letters A, vol. 376, no. 10-11, pp. 1003-1010, 2012.

[23] Zhang Y. and Xiao D., An Image Encryption Scheme based on Rotation Matrix Bit-level Permutation and Block Diffusion, Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 1, pp. 74-82, 2014.

[24] Zhou Y., Bao L., and Chen C., A New 1D Chaotic System for Image Encryption, Signal Processing, vol. 97, pp. 172-182, 2014.

[25] Zhou Y., Panetta K., Agaian S., and Chen C., (n; k; p)-Gray Code for Image Systems, IEEE Transactions on Systems, Man and Cybernetics Part b: Cybernetics, vol. 43, no. 2, pp. 515-529, 2013. Kshiramani Naik is currently working as a full time Research Scholar in the Dept. of Computer Science & Engineering, Indian school of Mines, Dhanbad, India. She received her BE in CSE and M.Tech in CSE from BPUT Rourkela and NIT Rourkela respectively. Her research interest includes Image Cryptosystem, Steganography and Watermarking. Arup Kumar Pal is presently working as an Assistant Professor in the Dept. of Computer Science and Engineering, Indian School of Mines, Dhanbad, India. He did his Ph.D in Computer Science and Engineering from Indian School of Mines, Dhanbad in 2011. His main research interest includes Vector Quantization, Image Compression, Image Cryptosystem, Steganography, Watermarking and CBIR. Rohit Agarwal is currently working as an Assistant Professor at the Dept. of Computer Science & Engineering, JSS Academy of Technical Education Noida (U.P.), India. He has completed his M.Tech degree in Computer Application from the Indian School of Mines Dhanbad (India) in 2013. His research interests include Digital Image Processing and Numerical Linear Algebra.