Wavelet Domain Image Encryption by Subband Selection and Data Bit Slelection

نویسندگان

  • Young-Ho Seo
  • Dong-Wook Kim
چکیده

Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be either private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resourceconstrained wireless devices. In this paper, we propose a selective partial image encryption scheme, which enables a trade-off between the effectiveness of the encryption method and the cost of using the method. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes have been used as part of the partial encryption scheme: subband selection, data bit selection, and random selection of pixel data. The experimental results for over 500 test images reveals that the fraction of data to be encrypted with our scheme is between 1/4,096 and 1/256 and the PSNRs are between about 9.5dB to 7.5dB. Since the encryption cost is very low and the effectiveness is good, the proposed scheme can potentially be used to provide secure communications in a variety of wired/wireless scenarios.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimized computational Afin image algorithm using combination of update coefficients and wavelet packet conversion

Updating Optimal Coefficients and Selected Observations Affine Projection is an effective way to reduce the computational and power consumption of this algorithm in the application of adaptive filters. On the other hand, the calculation of this algorithm can be reduced by using subbands and applying the concept of filtering the Set-Membership in each subband. Considering these concepts, the fir...

متن کامل

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography

Steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. In the discrete wavelet transform, an image signal can be analyzed by passing it through an analysis filter bank. This analysis filter bank consists of a low pass and a high pass filter at each decomposition stage. Another technology, the digital water...

متن کامل

Spatiotemporal Subband/Wavelet Coding of Video with Object-Based Motion Information

We present a novel object-based spatiotemporal (3-D) subband/wavelet coding scheme for very low bit-rate video compression. First, the image sequence is segmented into objects based on motion and color. The objects are then independently decomposed by sub-band/wavelet analysis, both in the temporal and spatial domain. The temporal analysis is greatly facilitated over existing methods by the obj...

متن کامل

A robust DHWT based AES encrypted image watermarking scheme

In this paper, we propose the blind watermarking algorithm based on Double Haar Wavelet Transform (DHWT) for copyright protection of encrypted images. Watermark embedding is performed in wavelet transform domain. DHWT is applied to the original cover image and binary watermark. Selected subband is encrypted by Advanced Encryption Standard (AES) encryption scheme. Singular Value Decomposition (S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003