High security image encryption by two-stage process

C. K. Huang, Y. H. Hsu, W. Y. Chen, S. K. Changchien, C. M. Hung, C. H. Liu, Y. R. Tian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Image-Multi-Encryption (IME). This method completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, effectively protects against the decryption of exhaustive attack method, and more over, increases the key space of encrypted images. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Also NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) are proceeded for the proof of the distinguished characteristic of pixels in the encrypted image. Eventually, empirical images are conducted as illustrations, which show that the proposed method has the great encryption performance and achieves the high confidential security.

Original languageEnglish
Title of host publicationICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing
DOIs
Publication statusPublished - 2009 Dec 1
Event7th International Conference on Information, Communications and Signal Processing, ICICS 2009 - Macau Fisherman's Wharf, Macao
Duration: 2009 Dec 82009 Dec 10

Publication series

NameICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing

Other

Other7th International Conference on Information, Communications and Signal Processing, ICICS 2009
CountryMacao
CityMacau Fisherman's Wharf
Period09-12-0809-12-10

Fingerprint

Cryptography
Chaotic systems
Pixels
Color
Dynamic response

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Signal Processing

Cite this

Huang, C. K., Hsu, Y. H., Chen, W. Y., Changchien, S. K., Hung, C. M., Liu, C. H., & Tian, Y. R. (2009). High security image encryption by two-stage process. In ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing [5397629] (ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing). https://doi.org/10.1109/ICICS.2009.5397629
Huang, C. K. ; Hsu, Y. H. ; Chen, W. Y. ; Changchien, S. K. ; Hung, C. M. ; Liu, C. H. ; Tian, Y. R. / High security image encryption by two-stage process. ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing. 2009. (ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing).
@inproceedings{510d72adcabd4403af76af69ee458364,
title = "High security image encryption by two-stage process",
abstract = "The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Image-Multi-Encryption (IME). This method completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, effectively protects against the decryption of exhaustive attack method, and more over, increases the key space of encrypted images. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Also NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) are proceeded for the proof of the distinguished characteristic of pixels in the encrypted image. Eventually, empirical images are conducted as illustrations, which show that the proposed method has the great encryption performance and achieves the high confidential security.",
author = "Huang, {C. K.} and Hsu, {Y. H.} and Chen, {W. Y.} and Changchien, {S. K.} and Hung, {C. M.} and Liu, {C. H.} and Tian, {Y. R.}",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/ICICS.2009.5397629",
language = "English",
isbn = "9781424446575",
series = "ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing",
booktitle = "ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing",

}

Huang, CK, Hsu, YH, Chen, WY, Changchien, SK, Hung, CM, Liu, CH & Tian, YR 2009, High security image encryption by two-stage process. in ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing., 5397629, ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing, 7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau Fisherman's Wharf, Macao, 09-12-08. https://doi.org/10.1109/ICICS.2009.5397629

High security image encryption by two-stage process. / Huang, C. K.; Hsu, Y. H.; Chen, W. Y.; Changchien, S. K.; Hung, C. M.; Liu, C. H.; Tian, Y. R.

ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing. 2009. 5397629 (ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - High security image encryption by two-stage process

AU - Huang, C. K.

AU - Hsu, Y. H.

AU - Chen, W. Y.

AU - Changchien, S. K.

AU - Hung, C. M.

AU - Liu, C. H.

AU - Tian, Y. R.

PY - 2009/12/1

Y1 - 2009/12/1

N2 - The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Image-Multi-Encryption (IME). This method completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, effectively protects against the decryption of exhaustive attack method, and more over, increases the key space of encrypted images. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Also NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) are proceeded for the proof of the distinguished characteristic of pixels in the encrypted image. Eventually, empirical images are conducted as illustrations, which show that the proposed method has the great encryption performance and achieves the high confidential security.

AB - The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines Pixel-Chaotic-Shuffle (PCS) and Image-Multi-Encryption (IME). This method completely eradicates the outlines of the encrypted images, blurs the distribution characteristics of RGB-level matrices, effectively protects against the decryption of exhaustive attack method, and more over, increases the key space of encrypted images. The test methods involving key space and correlation coefficient r are adopted for the security analysis. Also NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) are proceeded for the proof of the distinguished characteristic of pixels in the encrypted image. Eventually, empirical images are conducted as illustrations, which show that the proposed method has the great encryption performance and achieves the high confidential security.

UR - http://www.scopus.com/inward/record.url?scp=77949613584&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77949613584&partnerID=8YFLogxK

U2 - 10.1109/ICICS.2009.5397629

DO - 10.1109/ICICS.2009.5397629

M3 - Conference contribution

AN - SCOPUS:77949613584

SN - 9781424446575

T3 - ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing

BT - ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing

ER -

Huang CK, Hsu YH, Chen WY, Changchien SK, Hung CM, Liu CH et al. High security image encryption by two-stage process. In ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing. 2009. 5397629. (ICICS 2009 - Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing). https://doi.org/10.1109/ICICS.2009.5397629