Skip to main content
Log in

A Noisy Channel Tolerant Image Encryption Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we present an image encryption scheme that has the capability to tolerate noisy effects of a wireless channel. This means if the encrypted image data is corrupted by channel noise up to a certain level, correct decryption is possible with some distortion. The proposed image encryption scheme relies on some very interesting properties of orthogonal matrices containing columns that form a set of orthonormal basis vectors. Besides being tolerant to noisy channels, the proposed scheme also provides good security against well-known cryptographic attacks as demonstrated in this paper by a number of experimental results and security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Yang, M., Bourbakis, N., & Li, S. (2004). Data–image–video encryption. IEEE Potentials, 28–34.

  2. Lian, S. (2008). Multimedia content encryption: Techniques and applications. Boca Raton, FL: CRC Press.

    Google Scholar 

  3. Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001. http://csrc.nist.gov/publications/fips/fips197/fips197.pdf.

  4. Banu, R. (2009). Fault-tolerant encryption for space application. IEEE Transactions for Aerospace and Electronic System, 45(1), 266–279.

    Article  Google Scholar 

  5. Chunren, L. (2009). An Efficient fault tolerant cryptosystem. In System: Internastional conference E-business and information security (pp. 1–5).

  6. Kumar, A., Gambhir, D., & Rajpal, N. (2007). Robust and secret data transmission over the noisy channel. In International conference signal processing, communications and networking (pp. 199–203).

  7. Korrai, P. K., Swamy, M. N. S., & Deergha, R. K. (2012). Robust transmission of watermarked medical images over wireless channels. In IEEE Global Humanitarian Technology Conference (pp. 242–246).

  8. Ahmad, M., Haque, M. E., & Farooq, O. (2011). A noise resilient scrambling scheme for noisy transmission channel. In International conference on multimedia signal processing and communication technologies (pp. 91–94).

  9. Wang, Y., & Zhu, Q. F. (May 1998). Error control and concealment for video communication: A review. Proceedings of the IEEE, 86(5), 974–997.

    Google Scholar 

  10. Wang, Y., Wenger, S., Wen, J., & Katsaggelos, A. K. (July 2000). Error resilient video coding techniques. IEEE Signal Processing Magazine, 17(4), 61–82.

    Google Scholar 

  11. Lin, C. Y., Sow, D., & Chang, S. F. (2001). Using self-authentication-and-recovery images for error concealment in wireless environments. In Proceedings of SPIE (Vol. 4518, pp. 267–274).

  12. Kang, L. W., & Leou, J. J. (2003). A new error resilient coding scheme for JPEG image transmission based on data embedding and vector quantization. InProceedings of IEEE international symposium on circuits and systems, Bangkok, Thailand (Vol. 2, pp. 532–535).

  13. Kang, L. W., & Leou, J. J. (2003). Two error resilient coding schemes for wavelet-based image transmission based on data embedding and genetic algorithms. In Proceedings of IEEE international conference on image processing, Barcelona, Spain (pp. 461–464).

  14. Lay, D. C. (2009). Linear algebra and its applications. Upper Saddle River: Pearson Education.

  15. Meyer, C. D. (2000). Matrix analysis and applied linear algebra, SAIM.

  16. Andrews, H., & Patterson, C. L. (1976). Singular value decomposition and digital image processing. IEEE Transactions on Acoustics, Speech and Signal Processing, ASSP–24(1), 26–53.

    Article  Google Scholar 

  17. Liu, R., & Tan, T. (2002). An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia, 4(1), 121–128.

    Article  Google Scholar 

  18. Ghaderpanah, M., & Hamza, A. B. (2006). Secure copyright protection of digital images using non negative matrix factorization. In 23rd Biennial symposium on communication (pp. 344–347).

  19. Koh, M. S., Marek, E. R., & Talarico, C. (2007). A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks. In International conference on multimedia and expo, Beijing, China (pp. 1527–1530).

  20. Schneier, B. (1996). Applied cryptography. USA: Wiley.

    Google Scholar 

  21. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28, 656–715.

    Article  MATH  MathSciNet  Google Scholar 

  22. Ahmed, F., Siyal, M. Y., & Abbas, V. U. (2010). A perceptually scalable and JPEG compression tolerant image encryption scheme. In Fourth Pacific rim symposium on image and video technology (pp. 232–238).

  23. Montgomery, D. C., & Runger, G. C. (2004). Applied statistics and probability for engineers (3rd ed.). New York: Wiley.

    Google Scholar 

  24. Walpole, R. E., & Myers, R. H. (1990). Probability and statistics for engineers and scientists. New York: Maxwell Macmillan International Editions.

  25. Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Anees.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ahmed, F., Anees, A., Abbas, V.U. et al. A Noisy Channel Tolerant Image Encryption Scheme. Wireless Pers Commun 77, 2771–2791 (2014). https://doi.org/10.1007/s11277-014-1667-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1667-5

Keywords

Navigation