4.6 Article

Content-adaptive image encryption with partial unwinding decomposition

Journal

SIGNAL PROCESSING
Volume 181, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.sigpro.2020.107911

Keywords

Information security; Image encryption; Image-content-adaptive encryption; Partial unwinding decomposition

Funding

  1. National Natural Science Foundation of China [61901292]
  2. Natural Science Foundation of Shanxi Province, China [201801D221186, 201901D211080]
  3. Science and Technology Development Fund of Macao SAR [FDCT 079/2016/A2, 0123/2018/A3]
  4. University of Macau Fund [MYRG2018-00111-FST]

Ask authors/readers for more resources

This study presents a novel image encryption cryptosystem based on two-dimensional partial unwinding decomposition (2D-PUD) and diffusion scheme for generating security key and cipher image. The adaptive attribute of the 2D-PUD results in completely distinct 1D decomposition components for different images, effectively resisting cryptographic attacks.
This study designs a novel image encryption cryptosystem through the two-dimensional partial unwinding decomposition (2D-PUD). It consists of three stages. Firstly, a stream sequence (first part of the security key) is generated by pseudo-random number. Secondly, the plain image is decomposed into three parts by 2D-PUD: one 2D decomposition component, two 1D decomposition components, and the average intensity value of the image. Finally, the 2D decomposition component is shuffled by a generalized Arnold transform where the average intensity value is selected as second part of the security key. The diffusion scheme is subsequently applied to the scrambled image via exclusive OR operations with the randomized 1D decomposition components (third part of the security key) along rows and columns to obtain the cipher image. Due to the adaptive attribute of 2D-PUD, the generated 1D decomposition components are completely distinct for different images. In addition, we can also make them significantly different by tuning the decomposition times for the same image. Thus, the proposed algorithm is an image-content-adaptive encryption scenario that can effectively resist cryptographic attacks. Simulation results demonstrate that our proposed method has excellent encryption performance and can resist against various typical attacks, including brute force, statistical, entropy, and differential attacks. (C) 2020 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available