{"title":"A block-based image encryption algorithm in frequency domain using chaotic permutation","authors":"R. Munir","doi":"10.1109/TSSA.2014.7065906","DOIUrl":null,"url":null,"abstract":"Images can be encrypted in spatial domain, frequency domain, or both. Most of the image encryption algorithms operate in spatial domain. Encryption in frequency domain has an advantage of being resistante to many image processing operations. This paper presents an image encryption algorithm in frequency domain using a chaotic permutation. Because of the images represented in JPEG format, then to increase robustness to the image processing operations, the plain images are encrypted in blocks 8 × 8. After an image is encrypted, the cipher-image was modified by some common image processings. The experiments shows that the cipher-image was robust to the image processing operation, the decrypted images can be still recognized well.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSSA.2014.7065906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Images can be encrypted in spatial domain, frequency domain, or both. Most of the image encryption algorithms operate in spatial domain. Encryption in frequency domain has an advantage of being resistante to many image processing operations. This paper presents an image encryption algorithm in frequency domain using a chaotic permutation. Because of the images represented in JPEG format, then to increase robustness to the image processing operations, the plain images are encrypted in blocks 8 × 8. After an image is encrypted, the cipher-image was modified by some common image processings. The experiments shows that the cipher-image was robust to the image processing operation, the decrypted images can be still recognized well.