Multi-level Security System for Image Transmission with Confidence Guarantee

Document Type : Original Article

Authors

1 Dept. of Electronics and Electrical Communications Eng. Faculty of Electronic Eng., Menoufia University, Menouf, 32952, EGYPT.

2 Dept. of Electronics and Electrical Communications Eng., Faculty of Electronic Engineering, Menoufia University, Egypt

3 Dept. of Electronics and Electrical Communications Eng., Faculty of Electronic Engineering, Menoufia University, Egyp

4 Dept. of Electrical Engineering, Jazan University, Jazan, SAUDI ARABIA hayamabdalmordy@yahoo.com, emad.hassan@el-eng.menofia.edu.eg,

Abstract

This paper presents multi-level security scheme for images
transmission, by applying signature with encryption schemes.
Signature is based on Discrete Cosine Transform (DCT) and
Encodingusing Double Random Phase Encoding (DRPE). The
proposed multi-level scheme exploits the benefit of signature and
encryption, which give strong images against image processing
attacks. Several experiments are executed to test the performance
of the scheme. The proposed scheme increases the level of
security for transmitting images and it has better immunity to
noise.


[1] J.Sravanthi, M. H. M. Krishna Prasad, "Robust and Secure Digital
Signature for Image Authentication, over Wireless Channels",
International Journal of Computer Trends and Technology, pp.245-250,
2011. [2] Seitz J., ''Digital Watermarking for Digital Media'', (Idea Group
Publishing, 2005), Ch. 2. [3] Schneider M., Chang S. F., „A content based Digital Signature for
Image Authentication‟, Proc. IEEE Int. Conf. Image Processing
(ICIP‟96), 1996, pp. 227–230. [4] HayamAbdel Hameed, Emad S. Hassan, Sami El-Dolil, and F.E. Abd ElSamie" A Discrete Cosine Transform Based-Watermarking Scheme, for
Confidence Guarantee Image Transmission,” Digital Image Processing,
Vol. 6, No. 3, pp. 131-138, 2014. [5] G. H. Situ and J. Zhang, “Double Random-Phase Encoding in the Fresnel
Domain,” Opt. Lett., Vol. 29, pp. 1584-1586, July 2004. [6] G. Unnikrishnan and K. Singh, “Double Random Fractional Fourier
Domain Encoding for Optical Security,” Opt. Eng., Vol. 39, pp. 2853-
2859, November 2000. [7] J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical Image
Encryption based on -XOR Operations,” Opt. Eng., Vol. 38, pp. 47-54,
January 1999.

[8] P. K. Wang, L. A. Watson, and C. Chatwin, “Random Phase Encooding
forOptical Security,” Opt. Eng., Vol. 35, pp. 2464-2469, September 1996. [9] Y. Li, K. Kreske, and J. Rosen, “Security and Encryption Optical System
Based on- a Correlator with Significant Output Images,” Appl. Opt., Vol.
39, pp. 5295-5301, October 2000. [10] N. Towhgi, B. Javidi, and Z. Luo, “Fully Phase Encrypted Image
Processor,” J. Opt. Soc. Am. A, Vol. 16, pp. 1915-1927, August 1999. [11] T. Nomura and B. Javidi, “Optical Encryption using a Joint
Transform Correlator Architecture,” Opt. Eng., Vol. 39, pp. 2031-2034,
August 2000. [12] X. F. Meng, L. Z. Cai, and X. L. Yang, “Information Security
Systems by-Iterative Multiple Phase Retrieval and Pixel Random
Permutation,” Appl. Opt., Vol. 45 pp. 3289-3297, May 2005. [13] Hayam A. Abdel Hameed, Emad S. Hassan, Sami A. El-Dolil,
and F.E. Abd El-Samie" A New Hybrid Scheme based on Digital
Watermarking and Signature for Confidence Guarantee Image
Transmission, “Wireless Personal Communications, DOI
10.1007/s11277-017-4381-2,2017. [14] P. Refregier and B. Javidi, “Optical Image Encryption, based onInput Plane and Fourier Plane Random Encoding,” Opt. Lett., Vol. 20,
pp. 767-769, April 1995. [15] G. Unnikrishnan, J. Joseph and K. Singh, “Optical Encryption by
Double Random Phase Encoding in the Fractional Fourier Domain,” Opt.
Lett., Vol.25, pp. 887889, December 2000. [16] F.M. Liu, H.C. Zhai and X.P. Yang, “Kino form Based Iterative
Random Phase Encryption,” Acta. Phys., Sin.52, pp.2462–2465, October
2003 (in Chinese). [17] X.P. Yang and H.C. Zhai, “Optimization of Kino form in DoubleRandom-Phase Encryption,” Acta. Phys., Sin.54, pp. 1578–1582, April
2005 (in Chinese). [18] B.Javidi, A.Sergent, G.Zhang, and L.Guibert,“Fault Tolerance
Properties of a Double Phase Encoding Encryption Technique,” Opt.
Eng., Vol. 36, pp. 992998, 1997. [19] Xiaojun Qi and KokSheik Wong, “An Adaptive DCT-Based
MOD-4 Steganography Method”, Proceedings of theIEEE,pp.7803-9134,
2005.

 
[20] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic
Approach for Image Hiding in DCT Domain, International Journal of
Advances in Engineering & Technology, Issn: 2231-1963, Vol. 1, Issue
3, pp.72-78, July 2011. [21] Frank Hartung and Martin Kutter, “Multimedia Watermarking
Techniques”, Proceedings of the IEEE, Vol. 87, IEEE Press, Piscataway,
No. 7,pp.1079-1107, July 1999. [22] Lou D.C., Liu J.L. and LI C.-T. „Digital Signature-Based Image
Authentication‟, in LU C.S. (EDS.) „Multimedia Security: Steganography
and Digital Watermarking Techniques for Protection of Intellectual
Property‟ (Idea Group Inc., 2003). [23] Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance
of the Double Random Phase Encryption Against Various Attacks,” Opt.
Express, Vol.15, pp.1025310265, (2007). [24] A. Carnicer, M. Montes Usategui, S. Arcos, and I. Juvells,
“Vulner Ability to Chosen-Cypher Text Attacks of Optical Encryption
Schemes based on Double Random Phase Keys,” Opt. Lett., Vol.30,
pp.16441646, (2005). [25] X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-Plaintext Attack
on Optical Encryption based on-Double Random Phase Encoding,” Opt.
Lett., Vol.31, pp.10441046, (2006). [26] Karuna Kesavan K.and RatheeshkumarM.,"OpticalColor Image
Encryption based on-Hartley Transform and Double Random Phase
Encoding System"7-77- 8111- pp.963-978. [27] Ahmed Elshamy, Ahmed Rashed, Abd El-Naser Mohamed,
Osama Faragalla, Yi Mu, SalehAlshebeili, and F. E. Abd El-Samie
"Optical Image Encryption based on-Chaotic Baker map and Double
Random Phase Encoding", Journal of Light Wave Technology IEEE,
Vol. 31, No. 15, pp. 2533-2539, August 2013. [28] E. M. El-Bakary, E. S. Hassan, O. Zahran, S. A. El-Dolil, and F.
E. Abd El-Samie “Efficient Image Transmission with Multi-Carrier
CDMA”, Wireless Personal Communication, DOI 10.1007/s11277-012-
0622-6. 2012. [29] E. S. Hassan, “Performance Enhancement of Continuous-Phase
Modulation Based OFDM System Using Chaotic Interleaving”, WSEAS
Transactions on Systems, Vol. 12, No. 1, pp. 1-10, Jan. 2013.