Skip to main content

A Selective Bitplane Based Encryption of Grayscale Images with Tamper Detection, Localization and Recovery Based on Watermark

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 339))

  • 1713 Accesses

Abstract

Ciphered data need an additional level of protection in order to safeguard them from being tampered after the decryption phase. Ciphered data, upon being deciphered by the intended receiver, is unprotected and it can be easily doctored by ever-developing, sophisticated image processing softwares. In the proposed scheme, we introduce a selective bitplane based encryption of grayscale images coupled with the facility of tamper detection, localization and restoration based on DWT based digital watermark. The original image is first sub-divided into blocks where Discrete Wavelet Transform (DWT) is applied to generate the watermark. This is embedded in four disjoint portions of the image to increase the probability of restoration of the tampered image from tampers. To add another level of security to the transmission of the watermarked image a selective bitplane based encryption based on chaos is applied. The watermarked image is first partitioned into its constituent bitplanes and then first four bitplanes from Most Significant Bitplane (MSB) is encrypted by a chaos based pseudorandom binary number generator (PRBG). The enciphered bitplanes are concatenated with unencrypted ones to produce the cipher watermarked image. The validity and novelty of the proposed scheme is verified through exhaustive simulations using different images of two well-known image databases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of chaotic standard map. Chaos Solitons Fractals 26(1), 117–129 (2005)

    Article  MATH  Google Scholar 

  2. Pisarchik, A.N., Flores-Carmona, N.J., Carpio-Valadez, M.: Encryption and decryption of images with chaotic map lattices. CHAOS J. 16(3), 033118-033118-6. American Institute of Physics (2006)

    Google Scholar 

  3. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)

    Article  Google Scholar 

  4. Dongming, C., Zhiliang, Z., Guangming, Y.: An improved image encryption algorithm based on chaos. In: Proceedings of IEEE International Conference for Young Computer Scientists, pp. 2792–2796 (2008)

    Google Scholar 

  5. Som, S., Kotal, A.: Confusion and diffusion of grayscale images using multiple chaotic maps. In: National Conference on Computing and Communication Systems (NCCCS) (2012)

    Google Scholar 

  6. Podesser, M., Schmidt, H.-P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: 5th Nordic Signal Processing Symposium in Mobile Environments

    Google Scholar 

  7. Lian, S., Liu, Z., Wang, H.: Commutative watermarking and encryption of media data. Optical Eng. Lett. 45(8), 080510 (2006)

    Google Scholar 

  8. Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)

    Article  Google Scholar 

  9. Schmitz, R., Li, S., Grecos, C., Zhang, X.: A new approach to commutative watermarking-encryption. In: CMS 2012, LNCS 7394, pp. 117–130 (2012)

    Google Scholar 

  10. Schmitz, R., Li, S., Grecos, C., Zhang, X.: Towards more robust commutative watermarking-encryption of images, In: IEEE International Symposium on Multimedia, pp. 283–286 (2013)

    Google Scholar 

  11. USC-SIPI image database available at http://sipi.usc.edu/database. Accessed 27 Feb 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sukalyan Som .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Som, S., Sen, S., Mahapatra, S., Palit, S. (2015). A Selective Bitplane Based Encryption of Grayscale Images with Tamper Detection, Localization and Recovery Based on Watermark. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_79

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2250-7_79

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2249-1

  • Online ISBN: 978-81-322-2250-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics