Image Encryption Algorithm Based on Image Element and DFRCT

Article Preview

Abstract:

A discrete fractional cosine transform with arbitrary period is proposed, which is a linear combination of discrete fractional cosine transform (DFRCT). We propose a new image encryption algorithm based on the discrete fractional cosine transform with arbitrary period, and set up some experiments by the different image block methods. The specific steps of encryption and decryption are given, and this encryption algorithm in items of many evaluation indexes is analyzed. The results of the detailed analysis demonstrate that the encryption algorithm effectiveness, efficiency and ability to resist brute-force attack are satisfying.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

1403-1408

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Soo-Chang Pei, Min-Hung Yeh. The discrete fractional cosine and sine transforms [J]. IEEE Transactions on Signal Processing, 2001, 49(6): 1198-1207.

DOI: 10.1109/78.923302

Google Scholar

[2] Qiwen Ran. Wavelet Transform and Fractional Fourier Transform Theory and Applications [M]. Harbin Institute of Technology Press, 2001, 1(2): 8-14, 262-273.

Google Scholar

[3] Tao Ran, Deng Bing, Wang Yue. Frational Fourier Transform and Its Applications[J]. Tsinghua University Press, 2009, 9(1): 71-78, 153-171.

Google Scholar

[4] Jianghua Wu, Lin Zhang, Nanrun Zhou, Image encryption based on the multiple-order discrete fractional cosine transform[J]. Optics Communications, 2010: 1720–1725.

DOI: 10.1016/j.optcom.2009.12.066

Google Scholar

[5] Gui-liang Zhu, Xiao-qiang Zhang, Mixed image element encryption algorithm based on an elliptic curve cryptosystem[J]. Journal of Electronic Imaging, 2008, 17(2).

DOI: 10.1117/1.2931495

Google Scholar

[6] Douglas R. Stinson. Cryptography: Theory and practice (Third Edition)[M]. Florida: CRC Press, (2005).

Google Scholar

[7] G. Alvarez, Shujun Li. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption[J]. Communications in Nonlinear Science and Numerical Simulation, 2009, 14(11): 3743-3749.

DOI: 10.1016/j.cnsns.2009.02.033

Google Scholar

[8] Shiguo Lian, Jinsheng Sun, Zhiquan Wang. Security analysis of a chaos-based image encryption algorithm[J]. Physical A: Statistical Mechanics and its Applications, 2005, 351(2-4): 645-661.

DOI: 10.1016/j.physa.2005.01.001

Google Scholar