selective encryption of images using differential evolution
تأليف: ibrahim solyman i. abuhaiba(مشرف):: nadeen rawhi mahmoud salem deeb(اعداد)
النشر: gaza strip:author 2011
النوع: رسائل جامعية
عدد الصفحات: 89
المواضيع: cryptography – computer science:: data encryption – access control (computers systems):: التحكم في البيانات:: التشفير:: الشفرة (حاسبات الكترونية ):: الشيفرات:: تكنولوجيا المعلومات – تحكم:: سرية البيانات
رقم التصنيف: 005.82
العنوان : selective encryption of images using differential evolution
The security of multimedia data in digital distribution networks is commonly provided by encryption, i.e., the mathematical process that transforms a plaintext message into unintelligible ciphertext. Nevertheless, the classical and modern ciphers have all been developed for the simplest form of multimedia data, i.e., text, and are not appropriate for higher forms such as images and video with very large file sizes.
Selective encryption is a recent approach to reduce the computational requirements for huge volumes of multimedia data in distribution networks with different client device capabilities. In this research, we provide a new scheme of selective encryption of images based on Differential Evolution operations (crossover and mutation).
In this research, image data are encrypted efficiently in the frequency domain by employing selective crossover of DCT coefficients of the same frequency bands between selective segments. Correlation of the segment is used as a fitness function of the crossover to determine the selective segments.
The mutation function modifies the sign bit of certain DCT coefficients restricted to a specific number of blocks and segments determined by the user needs. Finally, Scaling DC coefficient is done to diffuse statistics.
Cryptographically, secure pseudo-random number generator whose seed values are the sub-keys generated from a 80- bits secret key is used to control the entire encryption process.
Thorough experimental tests are carried out with detailed analysis demonstrating considerable levels of security and different levels of visual degradation to target different applications requirements.
In additions, our new approach has very limited adverse impact on the compression efficiency and it allows scalability, and some other content processing functionalities without having to access the cryptographic key and to perform decryption, since it achieves format compliance.
These advantages make it suitable for image transmission over network.
Key words: Selective Encryption, Differential Evolution, Crossover, Mutation, DCT Coefficients, Visual Degradation, Compression Efficiency, Format Compliance.