TY - JOUR
T1 - Cipher image damage and decisions in real time
AU - Silva-García, Victor Manuel
AU - Flores-Carapia, Rolando
AU - Rentería-Márquez, Carlos
AU - Luna-Benoso, Benjamín
AU - Jiménez-Vázquez, Cesar Antonio
AU - González-Ramírez, Marlon David
N1 - Publisher Copyright:
© The Authors. Published by SPIE under a Creative Commons Attribution 3.0 Unported License.
PY - 2015/1/1
Y1 - 2015/1/1
N2 - This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0, 1, ⋯, m - 1 array, knowing m - 1 constants, is presented. The transcendental numbers are used to select these m - 1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.
AB - This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0, 1, ⋯, m - 1 array, knowing m - 1 constants, is presented. The transcendental numbers are used to select these m - 1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.
KW - advanced encryption standard
KW - damage in encrypted images
KW - decision in real time
KW - encrypted images
KW - transcendental numbers
KW - variable permutations
UR - http://www.scopus.com/inward/record.url?scp=84922569476&partnerID=8YFLogxK
U2 - 10.1117/1.JEI.24.1.013012
DO - 10.1117/1.JEI.24.1.013012
M3 - Artículo
AN - SCOPUS:84922569476
SN - 1017-9909
VL - 24
JO - Journal of Electronic Imaging
JF - Journal of Electronic Imaging
IS - 1
M1 - 013012
ER -