Abstract

The JPEG2000 is the more efficient next generation coding standard than the current JPEG standard. It can code files witless visual loss, and the file format is less likely to be affected by system file or bit errors. On the encryption side, the current 128-bit image encryption schemes are reported to be vulnerable to brute force. So there is a need for stronger schemes that not only utilize the efficient coding structure of the JPEG2000, but also apply stronger encryption with better key management. This research investigated a two-layer 256-bit encryption technique proposed for the JPEG2000 compatible images. In the first step, the technique used a multilayer neural network with a 128-bit key to generate single layer encrypted sequences. The second step used a cellular neural network with a different 128-bit key to finally generate a two-layer encrypted image. The projected advantages were compatible with the JPEG2000, 256-bit long key, managing each 128-bit key at separate physical locations, and flexible to opt for a single or a two-layer encryption. In order to test the proposed encryption technique for robustness, randomness tests on random sequences, correlation and histogram tests on encrypted images were conducted. The results show that random sequences pass the NIST statistical tests and the 0/1 balancedness test; the bit sequences are decorrelated, and the histogram of the resulting encrypted images is fairly uniform with the statistical properties of those of the white noise.

Highlights

  • In the current multimedia environment, security and protection of data is essential to fulfil vendor rights and client requirements

  • Looking at the averages column in the original and the encrypted images, it is clear that the correlation coefficient average for all the cases has dropped from nearly one (~0.9) to insignificant has vdaroluppeesdinfrotmhenreanrlgyeonoef (1~0.-49.) Ltoikineswiginsiefi,cavnetrvyalsumesailnl vthaeluraensgeofofst1a0n-4d. aLridkedweisvei,avtieorynsmall reflect the fact that variation in pixel decorrelation along horizontal, vertical valuaensdofdsitaagndoanradlddeivrieatciotinornesfliesctvteheryfascmt tahlaltreilnatiaolnl aclaosnegsh.orizontal, vertical and diagonal directions is very small in all cases

  • In a single level encryption, random sequences are generated through random key generation by the 8-4-2-1

Read more

Summary

INTRODUCTION

In the current multimedia environment, security and protection of data is essential to fulfil vendor rights and client requirements. A neural network was proposed by Lian (2009), which was composed of a chaotic neuron layer and a linear neuron layer. In another research Bigdeli, Farid, & Afshar (2012a), proposed an image encryption/ decryption algorithm based on chaotic neural network. Zhang, Liao, (2009) showed that as the number of cells increases beyond four, a hyper chaotic behavior is observed in the cellular neural network, and requires more keys to describe the state of the system. Neural network structures are examined in combination with wavelet transform for image encryption and decryption.

BACKGROUND
CONCLUSIONS
Findings
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call