Open Access
9 January 2015 Cipher image damage and decisions in real time
Victor Manuel Silva-García, Rolando Flores-Carapia, Carlos Rentería-Márquez, Benjamín Luna-Benoso, Cesar A. Jiménez-Vázquez, Marlon D. González-Ramírez
Author Affiliations +
Abstract
This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m−1 array, knowing m−1 constants, is presented. The transcendental numbers are used to select these m−1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.
CC BY: © The Authors. Published by SPIE under a Creative Commons Attribution 4.0 Unported License. Distribution or reproduction of this work in whole or in part requires full attribution of the original publication, including its DOI.
Victor Manuel Silva-García, Rolando Flores-Carapia, Carlos Rentería-Márquez, Benjamín Luna-Benoso, Cesar A. Jiménez-Vázquez, and Marlon D. González-Ramírez "Cipher image damage and decisions in real time," Journal of Electronic Imaging 24(1), 013012 (9 January 2015). https://doi.org/10.1117/1.JEI.24.1.013012
Published: 9 January 2015
Lens.org Logo
CITATIONS
Cited by 4 scholarly publications.
Advertisement
Advertisement
KEYWORDS
Image encryption

Image processing

Image compression

Computer security

Failure analysis

Image analysis

Veins

Back to Top