Abstract
One of the major application areas of the fractional-order discrete transform (FrDTs) is in signal and information security, particularly in signal and image/video encryption. Recently, many researchers proposed techniques that implemented not only the fractional transforms, but also various randomized versions of the FrDTs, which add more security features to signal’s encryption. In this paper, we propose a new image/video encryption scheme based on fractional-order discrete Tchebichef transform (FrDTT) using singular value decomposition. The FrDTTs are derived algebraically using the spectral decomposition of discrete Tchebichef polynomials, then the singular value decomposition technique in order to build a basic set of orthonormal eigenvectors which help to develop FrDTTs. Finally, we implement and apply the scheme proposed in this paper for encrypting test images and video sequences. Moreover, we methodically perform the security evaluation in terms of brute force and statistical attacks as well as comparisons with the existing methods in terms of secret key sensitivity and space. The promising experiment results demonstrate the effectiveness and efficiency of our proposed FrDTTs based image encryption techniques.
Similar content being viewed by others
Data availability
The datasets generated in our experiments are available from CVG - UGR - Image database, URL link: http://decsai.ugr.es/cvg/dbimagenes/. (2017). Accessed 12 February 2020.
The datasets used or analysed during the current study are available from the corresponding author on reasonable request.
Abbreviations
- FrDTs:
-
Fractional-order Discrete Transform.
- FrDTTs:
-
Fractional-order Discrete Tchebichef Transform.
- FrDTPs:
-
Fractional-order Discrete Tchebichef Polynomials.
- DTTs:
-
Discrete Tchebichef Transform.
- SVD:
-
Singular Value Decomposition.
- FrDFTs:
-
Fractional Discrete Fourier Transform.
- DFrSTs:
-
Discrete Fractional Sine Transform.
- FrDMMs:
-
Fractional discrete Meixner moments.
- DFrKTs:
-
Discrete Fractional Krawtchouk Transform.
- FrHTs:
-
Fractional Hartley Transform.
- FrMTs:
-
Fractional Mellin Transform.
- DCTs:
-
Discrete Cosine Transform.
- FrDCTs:
-
Fractional Discrete Cosine Transform.
- NPCR:
-
Number of Pixels Change Rate.
- UACI:
-
Unified Averaged Changed Intensity.
- MSE:
-
Mean Square Error.
- NIST:
-
National Institute of Standards and Technology
- PSNR:
-
Peak Signal to Noise Ratio
References
Acharya B, Patra SK, Panda G (2008) “Image encryption by novel cryptosystem using matrix transformation,” in 2008 First International Conference on Emerging Trends in Engineering and Technology, pp. 77–81
Bahrami S, Naderi M (2014) Encryption of video main frames in the field of DCT transform using A5/1 and W7 stream encryption algorithms. Arab J Sci Eng 39(5):4077–4088
Batham S, Acharya AK, Yadav VK, Paulo R (2013) A new video encryption algorithm based on indexed based chaotic sequence. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), Noida, pp 139–143. https://doi.org/10.1049/cp.2013.2307
Bhatnagar G, Wu QJ (2014) Biometric inspired multimedia encryption based on dual parameter fractional fourier transform. IEEE Trans Syst Man Cybern Syst 44(9):1234–1247
Chebyshev PL (1853) Théorie Des Mécanismes Connus Sous Le Nom De Parallélogrammes. St.-Pétersbourg: Imprimerie de l'Académie impériale des sciences
Chen L, Zhao D, Ge F (2013) Image encryption based on singular value decomposition and Arnold transform in fractional domain. Opt Commun 291:98–103. https://doi.org/10.1016/j.optcom.2012.10.080
Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2451
Chihara TS (2011) An introduction to orthogonal polynomials. In: Dover Books on Mathematics. Dover Publications, New York
Daoui A, Karmouni H, Azzayani A, Sayyouri M, Qjidaa H (2020) “Large Size 1D Signal Analysis by Hybrid Tchebichef-Charlier Moments,” in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), pp. 1–6
El Ogri O, Karmouni H, Sayyouri M, Qjidaa H (2021) 3D image recognition using new set of fractional-order Legendre moments and deep neural networks. Signal Process Image Commun 98:116410. https://doi.org/10.1016/j.image.2021.116410
El Ogri O et al (2021) Novel fractional-order Jacobi moments and invariant moments for pattern recognition applications. Neural Comput & Applic 33(20):13539–13565
El Ogri O, Daoui A, Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2020) New set of fractional-order generalized Laguerre moment invariants for pattern recognition. Multimed Tools Appl 79:23261–23294. https://doi.org/10.1007/s11042-020-09084-1
Fatnassi A, Gharsellaoui H, Bouamama S (2020) New hybrid proposed solution for video steganography based on clustering algorithm. Int J Secur Priv Pervasive Comput IJSPPC 12(2):30–43
Fridrich J (1997) Image encryption based on chaotic maps, in 1997 IEEE international conference on systems, man, and cybernetics. Comput Cybern Simul 2:1105–1110
Guizani S, Nasser N (2012) “An audio/video crypto—Adaptive optical steganography technique,” in 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1057–1062
Hanna MT, Seif NPA, Ahmed WAEM (2004) Hermite-Gaussian-like eigenvectors of the discrete Fourier transform matrix based on the singular-value decomposition of its orthogonal projection matrices. IEEE Trans Circuits Syst Regul Pap 51(11):2245–2254
Jindal N, Singh K (2014) Image and video processing using discrete fractional transforms. Signal Image Vid Process 8(8):1543–1553
Joshi M, Shakher C, Singh K (2010) Fractional Fourier plane image encryption technique using radial hilbert-, and jigsaw transform. Opt Lasers Eng 48(7–8):754–759
Kang X, Tao R (2019) Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE Trans Circuits Syst Vid Technol 29(7):1919–1932. https://doi.org/10.1109/TCSVT.2018.2859253
Kang X, Ming A, Tao R (2019) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circuits Syst Vid Technol 29(6):1595–1607. https://doi.org/10.1109/TCSVT.2018.2851983
Karmouni H, Yamni M, Daoui A, Sayyouri M, Qjidaa H (2021) A new fast algorithm to compute moment 3D invariants of generalized Laguerre modified by fractional-order for pattern recognition. Multidim Syst Sign Process 32(2):431–464
Karmouni H, Sayyouri M, Qjidaa H A novel image encryption method based on fractional discrete Meixner moments. Opt Lasers Eng 137:106346
Karuna Y, Reddy GR (2020) Broadband subspace decomposition of convoluted speech data using polynomial EVD algorithms. Multimed Tools Appl 79(7):5281–5299
Kaur G, Agarwal R, Patidar V (2021) “Color image encryption scheme based on fractional Hartley transform and chaotic substitution–permutation,” Vis Comput, https://doi.org/10.1007/s00371-021-02066-w
Kaur G, Agarwal R, Patidar V (2021) “Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation,” J King Saud Univ Comput Inf Sci, https://doi.org/10.1016/j.jksuci.2021.03.007.
Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57(11):2517–2533
Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063
Lang J, Tao R, Wang Y (2010) Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function. Opt Commun 283(10):2092–2096
Li S, Zheng X (2002) “Cryptanalysis of a chaotic image encryption method,” in 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No. 02CH37353), vol. 2, p. II–II
Lian S (2008) Multimedia content encryption: techniques and applications (1st ed.). Auerbach Publications. https://doi.org/10.1201/9781420065282
Lima JB, Novaes LFG (2014) Image encryption based on the fractional Fourier transform over finite fields. Signal Process 94:521–530
Liu X (2015) Analysis and improvement for image encryption algorithm based on multiple chaotic mapping. Open Autom Control Syst J 7(1):1560–1565
Liu L, Miao S (2017) An image encryption algorithm based on baker map with varying parameter. Multimed Tools Appl 76(15):16511–16527
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903. https://doi.org/10.1016/j.optcom.2011.04.001
Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466. https://doi.org/10.1016/j.asoc.2012.01.016
Liu X, Han G, Wu J, Shao Z, Coatrieux G, Shu H (2017) Fractional Krawtchouk transform with an application to image watermarking. IEEE Trans Signal Process 65(7):1894–1908
Liu X, Wu Y, Zhang H, Wu J, Zhang L (2021) Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking. Signal Process 189:108275
McBride AC, Kerr FH (1987) On Namias’s fractional Fourier transforms. IMA J Appl Math 39(2):159–175
Mukundan R, Ong SH, Lee PA (2001) Image analysis by Tchebichef moments. IEEE Trans Image Process 10(9):1357–1364
Oliveira PA, Cintra RJ, Bayer FM, Kulasekera S, Madanayake A (2016) Low-complexity image and video coding based on an approximate discrete Tchebichef transform. IEEE Trans Circuits Syst Vid Technol 27(5):1066–1076
Rajesh GR, Nargunam AS (2013) “Steganography algorithm based on discrete cosine transform for data embedding into raw video streams,” in IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), pp. 554–558
Ramalingam M, Isa NAM, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171:1147–1156
Salunke S, Venkatadri M, Hashmi MF, Ahuja B (2021) Novel beta function-based image encryption with fractional sine transform. Mater. Today Proc 47:6991–699
Stewart GW (1973) Introduction to matrix computations. Elsevier
Sui L, Lu H, Ning X, Wang Y (2014) Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt Eng 53(2):026108
Sun Q, Guan P, Qiu Y, Xue Y (2012) “A novel digital image encryption method based on one-dimensional random scrambling,” in 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 1669–1672
Suresh M, Sam IS (2021) “A Secure Video Steganography Using Framelet Transform and Singular Value Decomposition,” in Data Intelligence and Cognitive Informatics, Springer, pp. 781–790
“Test Sequences.” (2021) https://pi4.informatik.uni-mannheim.de/~kiess/test_sequences/download/ (accessed Dec. 12, 2021)
Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25(12):887–889
Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214. https://doi.org/10.1016/j.ins.2020.06.030
Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36. https://doi.org/10.1016/j.ins.2019.08.041
Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst Regul Pap 69(3):1291–1301
Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217–240. https://doi.org/10.1016/j.ins.2021.04.013
Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149. https://doi.org/10.1016/j.ins.2021.07.096
Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522
Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108. https://doi.org/10.1016/j.sigpro.2011.10.023
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005
Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61. https://doi.org/10.1016/j.optlaseng.2015.03.022
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527
Watkins DS (2007) The matrix eigenvalue problem. Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9780898717808
Wu J, Guo F, Zeng P, Zhou N (2013) Image encryption based on a reality-preserving fractional discrete cosine transform and a chaos-based generating sequence. J Mod Opt 60(20):1760–1771
Wu J, Zhang M, Zhou N (2017) Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion. J Mod Opt 64(4):334–346
Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169. https://doi.org/10.1016/j.ins.2020.09.055
Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32(6):4028–4037. https://doi.org/10.1109/TCSVT.2021.3108767
Yamni M, Daoui A, Karmouni H, Sayyouri M, Qjidaa H, Flusser J (2020) Fractional Charlier moments for image reconstruction and image watermarking. Signal Process 171:107509
Yang T, Ma J, Wang Q, Miao Y, Wang X, Meng Q (2018) Image feature extraction in encrypted domain with privacy-preserving Hahn moments. IEEE Access 6:47521–47534. https://doi.org/10.1109/ACCESS.2018.2866861
“YUV Sequences.” (2021) http://trace.eas.asu.edu/yuv/index.html (accessed Dec. 12, 2021).
Zhang L, Chen D (2020) The large capacity embedding algorithm for H. 264/AVC intra-prediction mode video steganography based on linear block code over Z4. Multimed Tools Appl 79:1–19
Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20. https://doi.org/10.1016/j.asoc.2014.09.039
Zhou N, Wang Y, Wu J (2011) Image encryption algorithm based on the multi-order discrete fractional Mellin transform. Opt Commun 284(24):5588–5597
Zhou N, Wang Y, Gong L, Chen X, Yang Y (2012) Novel color image encryption algorithm based on the reality preserving fractional Mellin transform. Opt Laser Technol 44(7):2270–2281
Zhou N, Liu X, Zhang Y, Yang Y (2013) Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain. Opt Laser Technol 47:341–346. https://doi.org/10.1016/j.optlastec.2012.08.033
Acknowledgements
The authors would like to thank the anonymous referees for their valuable comments and suggestions.
Funding
No funding has been granted for this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A
Proof of property (v)
Let λ be an eigenvalue of Tchebichef polynomial matrix and u the corresponding eigenvector, then Cu = λu, using the properties (iii) and (iv), we have:
thus. {Key1, Key2}
The matrix C has only two eigenvalues {1, −1}, The proof of Eq. (19) has been completed
Appendix B
Proof of properties (a)-(b)
Let C ∈ ℂN × Nbe Tchebichef polynomial matrix, with their eigenvalues on the diagonal of a diagonal matrix Λ = diag (λ1, ……λN) ∈ ℂN × N and the corresponding eigenvectors forming the columns of a matrix V = [u1, ……, uN] ∈ ℂN × N, we have:
where, the orthonormal vectors u1, ……uN are eigenvectors of C, corresponding to eigenvalues λ1, ……λN.
Notice that the matrices
are orthogonal projectors, since \( {\mathrm{P}}_j^T={\mathrm{P}}_j \)and \( {\mathrm{P}}_j^2:= {u}_j\left({u}_j^T{u}_j\right){u}_j^T={u}_j{u}_j^T={\mathrm{P}}_j \)
if j ≠ k, then the orthogonality of the eigenvectors implies
The proof of properties (a) and (b) has been completed.
Proof of propriety (c)
Let γ, η and λ be respectively the eigenvalues of the matrices P0,P1 and C of size N × N, using Eq. (18), we have:
Similarly, we have
From (B.7) and (B.8), we have
Hence, if λ = 1, there is γ = 1, η = 0, and if λ = − 1, then γ = 0, η = 1.
The proof of propriety (c) has been completed.
Appendix C
Let P0 and P1 the spectral projection matrices of Tchebichef polynomial matrix C ∈ ℂN × N, and u,v be their eigenvectors corresponding to λ = 1, respectively.
Proof of Lemma 1
From Table 1 and Property (c), we have:
using (C.1) and Property (b), we have:
The proof of Lemma 1 has been completed.
Proof of Lemma 2
From Eq. (15), Lemma 1 and property (b) we have:
The proof of Lemma 2 has been completed.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
El Ogri, O., Karmouni, H., Sayyouri, M. et al. A new image/video encryption scheme based on fractional discrete Tchebichef transform and singular value decomposition. Multimed Tools Appl 82, 33465–33497 (2023). https://doi.org/10.1007/s11042-023-14573-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14573-0