Back to Search
Start Over
Selective encryption of JPEG images with chaotic based novel S-box
- Source :
- Multimedia Tools and Applications. 80:9639-9656
- Publication Year :
- 2020
- Publisher :
- Springer Science and Business Media LLC, 2020.
-
Abstract
- Increased demand of multimedia data over heterogeneous networks has led to the requirement for increased compression and suitable security. Both of these demands require heavy computation, and are contradictory to each other, as encryption may severely affect the compression efficiency. On the other hand, handheld devices have limited energy and computational resources, making compression friendly encryption a challenging issue. One of the solutions is to encrypt a subset of data based on perceptual importance. But, that too may not be compression efficient, format compliant and secure. To address the security issue in such applications the substitution box (S-box), which is one of the most important and the only non-linear operation of the block ciphers is redesigned using chaotic equations. These equations have the characteristics that easily meet the requirements of the block ciphers. In this research work, the S-box based on the chaotic equation was designed and tested for security strength and then used for selective encryption of the multimedia (image) data. To increase the security and generate a key dependant S-box, Mackey Glass equation is used due to its inherent properties like sensitivity, pseudo random characteristics, non-uniform behaviour, ergodicity, and high confusion and diffusion. The security of the proposed S-box was tested in terms of non-linearity, Bit Independence and Strict Avalanche Criteria etc. This S-box is then used to selectively encrypt a subset of image data during the process of compression, giving an encryption-compression strategy. The subset of image data was selected such that the statistical and structural dependencies were not violated due to encryption. This resulted in compression efficient and format friendly encryption. In this regard the quantization table is selected for encryption along with a subset of bits that have already encoded and their statistical dependencies are exploited for compression. This approach not only reduced the computational burden due to the selective nature of encryption but also kept the security at the required level due to introduction of key dependent S-Box. The results of encrypted images were compared with that of the AES in terms of compression ratio, correlation and Peak Signal to Noise Ratio (PSNR), giving better results for the proposed algorithm.
- Subjects :
- S-box
Computer Networks and Communications
Computer science
business.industry
020207 software engineering
02 engineering and technology
computer.file_format
Encryption
JPEG
Computer engineering
Hardware and Architecture
Computer Science::Multimedia
0202 electrical engineering, electronic engineering, information engineering
Media Technology
Confusion and diffusion
Quantization (image processing)
business
computer
Software
Computer Science::Cryptography and Security
Block cipher
Subjects
Details
- ISSN :
- 15737721 and 13807501
- Volume :
- 80
- Database :
- OpenAIRE
- Journal :
- Multimedia Tools and Applications
- Accession number :
- edsair.doi...........ad308b492db06b7577946648dd45b0c0