Skip to main content

Key-Based Scrambling for Secure Image Communication

  • Conference paper
Emerging Intelligent Computing Technology and Applications (ICIC 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 304))

Included in the following conference series:

Abstract

Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x10− 300. This is possible due to the fact that a user may purchase or acquire rights for an intended image by specifying a ‘key’ that can form a sequence of numbers 10 to 100 in length. The content provider uses this sequence as a base in developing another key sequence to scramble the image and transmit it to the user through regular channels such as an email attachment. Since the user is the only party apart from the provider to possess the key for descrambling, any third party will not be able to descramble it successfully as will be shown in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Renesse, R.L.: Hidden and Scrabbled Images- a Review. In: Conference on Optical Security and Counterfeit Deterence Techniques IV, vol. 4677, pp. 333–348. SPIE (2002)

    Google Scholar 

  2. Huang, H.: An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform. In: Int. Conf. China Communication, pp. 208–210 (2010)

    Google Scholar 

  3. Fang, L., YuKai, W.: Restoring of the Watermarking Image in Arnold Scrambling. In: 2nd International Conference on Signal Processing Systems (ICSPS), pp. 771–774 (2010)

    Google Scholar 

  4. Liu, Z., Chen, H., Liu, T., Li, P., Xu, L., Dai, J., Liu, S.: Image Encryption by Us-ing Gyrator Transform and Arnold Transform. Journal of Electronic Imaging 20(1) (2011)

    Google Scholar 

  5. Kong, T., Zhang, D.: A New Anti-Arnold Transformation Algorithm. Journal of Software 15(10), 1558–1564 (2004)

    MathSciNet  MATH  Google Scholar 

  6. Zhou, Y., Joyner, V.M., Panetta, K.: Two Fibonacci P-code Based Image Scram-bling Algorithms. Image Processing: Algorithms and Systems VI 6812, 681215, 1–12 (2008)

    Google Scholar 

  7. Che, S., Che, Z., Ma, B.: An Improved Image Scrabbling Algorithm. In: Proc. Second Int. Conf. Genetics and Evolutionary Computing, pp. 495–499 (2008)

    Google Scholar 

  8. Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. Systems, Man, and Cybernetics, pp. 1105–1110 (1997)

    Google Scholar 

  9. Yeo, J., Guo, C.: Efficient Hierarchical Chaotic Image Encryption Algorithm and Its VLSI Realisation. In: IEE Proceedings Vision, Image and Signal Processing, vol. 147(2), pp. 167–175 (2000)

    Google Scholar 

  10. Liping, S., Zheng, Q., Bo, L., Jun, Q., Huan, L.: Image Scrambling Algorithm Based on Random Shuffling Strategy. In: 3rd IEEE Conference on Industrial Electronics and Applications, vol. 4677, pp. 2278–2283. SPIE (2008)

    Google Scholar 

  11. Ville, D., Philips, W., Walle, R., Lemahieu, I.: Image Scrambling Without Band-width Expansion. IEEE Trans. Circ. Sys. Video Tech. 14(6), 892–897 (2004)

    Google Scholar 

  12. Liu, S., Sheridan, J.T.: Optical Information Hiding by Combining Image Scrambling Techniques in Fractional Fourier Domains. In: Irish Signal and Systems Conference, pp. 249–254 (2001)

    Google Scholar 

  13. Zhou, Y., Panetta, K., Agaian, S.: An Image Scrambling Algorithm Using Parameter Based M-sequence. In: Proc. Seventh Inter. Conf. Mach. Learning and Cybern., pp. 3695–3698 (2008)

    Google Scholar 

  14. Gu, G., Han, G.: The Application of Chaos and DWT in Image Scrambling. In: Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, pp. 3729–3373 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Premaratne, P., Premaratne, M. (2012). Key-Based Scrambling for Secure Image Communication. In: Huang, DS., Gupta, P., Zhang, X., Premaratne, P. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2012. Communications in Computer and Information Science, vol 304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31837-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31837-5_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31836-8

  • Online ISBN: 978-3-642-31837-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics