Abstract
Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x10− 300. This is possible due to the fact that a user may purchase or acquire rights for an intended image by specifying a ‘key’ that can form a sequence of numbers 10 to 100 in length. The content provider uses this sequence as a base in developing another key sequence to scramble the image and transmit it to the user through regular channels such as an email attachment. Since the user is the only party apart from the provider to possess the key for descrambling, any third party will not be able to descramble it successfully as will be shown in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Renesse, R.L.: Hidden and Scrabbled Images- a Review. In: Conference on Optical Security and Counterfeit Deterence Techniques IV, vol. 4677, pp. 333–348. SPIE (2002)
Huang, H.: An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform. In: Int. Conf. China Communication, pp. 208–210 (2010)
Fang, L., YuKai, W.: Restoring of the Watermarking Image in Arnold Scrambling. In: 2nd International Conference on Signal Processing Systems (ICSPS), pp. 771–774 (2010)
Liu, Z., Chen, H., Liu, T., Li, P., Xu, L., Dai, J., Liu, S.: Image Encryption by Us-ing Gyrator Transform and Arnold Transform. Journal of Electronic Imaging 20(1) (2011)
Kong, T., Zhang, D.: A New Anti-Arnold Transformation Algorithm. Journal of Software 15(10), 1558–1564 (2004)
Zhou, Y., Joyner, V.M., Panetta, K.: Two Fibonacci P-code Based Image Scram-bling Algorithms. Image Processing: Algorithms and Systems VI 6812, 681215, 1–12 (2008)
Che, S., Che, Z., Ma, B.: An Improved Image Scrabbling Algorithm. In: Proc. Second Int. Conf. Genetics and Evolutionary Computing, pp. 495–499 (2008)
Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. Systems, Man, and Cybernetics, pp. 1105–1110 (1997)
Yeo, J., Guo, C.: Efficient Hierarchical Chaotic Image Encryption Algorithm and Its VLSI Realisation. In: IEE Proceedings Vision, Image and Signal Processing, vol. 147(2), pp. 167–175 (2000)
Liping, S., Zheng, Q., Bo, L., Jun, Q., Huan, L.: Image Scrambling Algorithm Based on Random Shuffling Strategy. In: 3rd IEEE Conference on Industrial Electronics and Applications, vol. 4677, pp. 2278–2283. SPIE (2008)
Ville, D., Philips, W., Walle, R., Lemahieu, I.: Image Scrambling Without Band-width Expansion. IEEE Trans. Circ. Sys. Video Tech. 14(6), 892–897 (2004)
Liu, S., Sheridan, J.T.: Optical Information Hiding by Combining Image Scrambling Techniques in Fractional Fourier Domains. In: Irish Signal and Systems Conference, pp. 249–254 (2001)
Zhou, Y., Panetta, K., Agaian, S.: An Image Scrambling Algorithm Using Parameter Based M-sequence. In: Proc. Seventh Inter. Conf. Mach. Learning and Cybern., pp. 3695–3698 (2008)
Gu, G., Han, G.: The Application of Chaos and DWT in Image Scrambling. In: Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, pp. 3729–3373 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Premaratne, P., Premaratne, M. (2012). Key-Based Scrambling for Secure Image Communication. In: Huang, DS., Gupta, P., Zhang, X., Premaratne, P. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2012. Communications in Computer and Information Science, vol 304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31837-5_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-31837-5_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31836-8
Online ISBN: 978-3-642-31837-5
eBook Packages: Computer ScienceComputer Science (R0)