Cipher image damage and decisions in real time

Victor Manuel Silva-García, Rolando Flores-Carapia, Carlos Rentería-Márquez, Benjamín Luna-Benoso, Cesar Antonio Jiménez-Vázquez, Marlon David González-Ramírez

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0, 1, ⋯, m - 1 array, knowing m - 1 constants, is presented. The transcendental numbers are used to select these m - 1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.

Original languageEnglish
Article number013012
JournalJournal of Electronic Imaging
Volume24
Issue number1
DOIs
StatePublished - 1 Jan 2015

Keywords

  • advanced encryption standard
  • damage in encrypted images
  • decision in real time
  • encrypted images
  • transcendental numbers
  • variable permutations

Fingerprint

Dive into the research topics of 'Cipher image damage and decisions in real time'. Together they form a unique fingerprint.

Cite this