INFORMATION CHANGE THE WORLD

International Journal of Image, Graphics and Signal Processing(IJIGSP)

ISSN: 2074-9074 (Print), ISSN: 2074-9082 (Online)

Published By: MECS Press

IJIGSP Vol.8, No.7, Jul. 2016

A Secure Algorithm for Region of Interest (ROI) Encryption for RGB Color Images

Full Text (PDF, 694KB), PP.67-72


Views:60   Downloads:0

Author(s)

Aniruddha G. Phatak

Index Terms

Image encryption;Region of Interest;XOR;Pseudorandom generator;Cipher Block Chaining

Abstract

An algorithm optimized towards encrypting a specific region in an image is proposed. The encryption of specific region(s) in an image is often of more practical relevance than encrypting the entire image, thus avoiding wastage of time and processing power. The algorithm proposed is ideal for encrypting images with relatively small Region of Interest (ROI). It makes novel use of the XOR operation and the relative visual redundancy of the blue-plane components in a RGB color image. A pseudorandom number generator is used as a basic security feature. Furthermore, Cipher Block Chaining (CBC) is also suggested as an improvement to further enhance the security of the algorithm. The algorithm may be classified as lossy since some visual data is sacrificed in the decrypting process. However, in case of encryption algorithms, the high security of the encrypted image is often given priority over faithful reproduction of images.

Cite This Paper

Aniruddha G. Phatak,"A Secure Algorithm for Region of Interest (ROI) Encryption for RGB Color Images", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.8, No.7, pp.67-72, 2016.DOI: 10.5815/ijigsp.2016.07.08

Reference

[1]Robert Matthews, "On the derivation of a 'chaotic' encryption algorithm", Cryptographia, Volume 13, Issue 1, 1989.

[2]MS Baptista, "Cryptography with chaos", Elsevier, 1998.

[3]Zhi-Hong Guan, Wenjie Guan and Fangjun Huang, "Chaos based image encryption algorithm", Elsevier, October 2005.

[4]G Chen, Y Mao, CK Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps", Elsevier, 2004.

[5]NK Pareek, V Patidar, KK Sud, "Image encryption using chaotic logistic map", Elsevier, 2006.

[6]L Kocarev, G Jakimoski "Logistic map as a block encryption algorithm", Physical letters, Elsevier, 2001.

[7]Jui Cheng, "A new chaotic key-based design for image encryption and decryption ", IEEE Circuits and Systems, 2000.

[8]Auguste Kerckhoffs, "La cryptographie militaire" Journal des sciences militaires, vol. IX, pp. 5–83, January 1883.

[9]Phillipe Refregier and Bahram Javidi," Optical image encryption using input plane and Fourier plane random encoding", SPIE, 1998.

[10]B Hennelly, JT Sheridan, "Optical image encryption by random shifting in fractional Fourier domains", Optics Letters, 2003.

[11]Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah Berdai, "A Secure Image Encryption Algorithm Based on the Rubik's Cube Principle", Journal of Electrical and Computer Engineering, 2012.

[12]M Bellare, J Killian, P Rogaway, "The security of cipher block chaining", CRYPTO'94 Journal, 1994.

[13]L Blum, M Blum, M Shub, "A simple Unpredictable Pseudo-random Number generator", SIAM Journal of Computing, 1986.