Cover image for Image encryption : a communication perspective
Title:
Image encryption : a communication perspective
Personal Author:
Publication Information:
Boca Raton, Florida : CRC Press, Tayllor & Francis Group, 2014
Physical Description:
xiv, 404 pages : illlustrations ; 24 cm.
ISBN:
9781466576988
Abstract:
"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--provided by publisher

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010329112 TA1637 A23 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches.

Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems.

Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations.

Complete with simulation experiments and MATLAB® codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.


Author Notes

Fathi E. Abd El-Samie received the BSc(Honors), MSc, and PhD degrees from Menoufia University, Menouf, Egypt, in 1998, 2001, and 2005, respectively. Since 2005, he has been a teaching staff member with the Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University. He is currently a researcher at KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICs). He is a co-author of about 200 papers in international conference proceedings and journals and four textbooks. His current research interests include image enhancement, image restoration, image interpolation, superresolution reconstruction of images, data hiding, multimedia communications, medical image processing, optical signal processing, and digital communications.

Dr. Abd El-Samie was a recipient of the Most Cited Paper Award from the Digital Signal Processing journal in 2008.
Hossam Eldin H. Ahmed received a BSC(Honors) in nuclear engineering in June 1969 (Faculty of Engineering, Alexandria University, Egypt); an MSc in microelectronic electron diffraction in April 1977 (Nuclear Department, Faculty of Engineering, Alexandria University); and a PhD in June 1983 (High Institute of Electronic and Optics, Paul Sabatier University, Toulouse, France). From 1970 to 1977, he was in the Egyptian marine forces. He was a demonstrator in 1977, teaching lectures and staff members with the Department of Electronic and Electrical Communications, Faculty of Engineering and Technology, Menoufia University. In 1993, he became a professor of microelectronics, VLSI design technology, communication systems, and computer networks. From 1993 until 1999, he was vice dean for education and student affairs at the Faculty of Electronic Engineering. In 2001, he became a chairman of the Electronics and Electrical Communications Department. He is a member of the Menoufia periodic electronic faculty journal and since 1995 has been the director, designer, and constructor of the Menoufia University wide-area network (WAN) (21 LANs). He is the developer of the Menoufia University libraries and FRCU universities libraries. His current research interests are electron microscopy; transmission and backscattering of electrons and ion beams into amorphous or polycrystalline targets; optical fibers; VLSI design; nanotechnology; lithography; digital, optical, and multimedia communications; digital images; multimedia and database communications; security applications; telemetry microcomputer applications in satellites; and OBC and satellite communications.

Ibrahim F. Elashry graduated from the Faculty of Engineering, Kafrelshiekh University, Egypt, in 2007. He is now a teaching assistant and PhD student at the University of Wollongong (UOW), Australia. His research interests are in security over wired and wireless networks and image processing.

Mai H. Shahieen graduated in May 2005 from the Faculty of Electronic Engineering, Menoufia University. Her 2011 MSc degree is in encrypted image transmission over wireless channels. She is now a PhD student at the Faculty of Electronic Engineering. Her research interests are broadband wireless distribution systems, image and video compression, multimedia systems, and wireless networks.
Osama S. Faragallah received BSc, MSc, and PhD degrees in computer science and engineering from Menoufia University, Menouf, Egypt, in 1997, 2002, and 2007, respectively. He is currently associate professor with the Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, where he was a demonstrator from 1997 to 2002 and assistant lecturer from 2002 to 2007. Since 2007, he has been a teaching staff member with the same department. His research interests are network security, cryptography, Internet security, multimedia security, image encryption, watermarking, steganography, data hiding, medical image processing, and chaos theory.

El-Sayed M. El-Rabaie (senior member, IEEE 1992, MIEE chartered electrical engineer) was born in Sires Elian (Menoufia), Egypt, in 1953. He received the PhD degree in microwave device engineering from the Queen''s University of Belfast in 1986. He was a postdoctoral fellow at Queen''s (Department of Electronic Engineering) until February 1989. In his doctoral research, he constructed a CAD (computer-aided design) package in nonlinear circuit simulations based on harmonic balance techniques. Since then, he has been involved in different research areas, including CAD of nonlinear microwave circuits, nanotechnology, digital communication systems, and digital image processing. He was invited in 1992 as a Research Fellow at North Arizona University (College of Engineering and Technology) and in 1994 as a visiting professor at Ecole Polytechnique of Montreal, Quebec, Canada. Professor El-Rabaie has authored and co-authored more than 130 papers and technical reports and 15 books. In 1993, he was awarded the Egyptian Academic Scientific Research Award (Salah Amer Award of Electronics), and in 1995, he received the award of the Best Researcher on CAD from Menoufia University. He acts as a reviewer and member of the editorial board for several scientific journals. He participated in translating the first part of the Arabic encyclopedia. Professor El-Rabaie was the head of the Electronics and Electrical Communications Engineering Department, Faculty of Electronic Engineering, Menoufia University, and then the vice dean of postgraduate studies and research in the same faculty. He currently is the vice dean of the Scientific Committee for Professors and Assistant Professors promotion in Egypt.

Saleh A. Alshebeili is professor and chairman (2001-2005) of the Electrical Engineering Department, King Saud University, Riyadh, Saudi Arabia. He has more than 20 years of teaching and research experience in the area of communications and signal processing. Dr. Alshebeili is a member of the board of directors of Prince Sultan Advanced Technologies Research Institute (PSATRI) and has been the vice president of PSATRI (2008-2011), the director of Saudi-Telecom Research Chair (2008-2012), and the director (2011-present) of the Technology Innovation Center, RF and Photonics in the e-Society (RFTONICS), funded by King Abdulaziz City for Science and Technology (KACST). Dr. Alshebeili has been on the editorial board of the Journal of Engineering Sciences of King Saud University (2009-2012). He also has active involvement in the review process of a number of research journals, KACST general directorate grants programs, and national and international symposiums and conferences.


Table of Contents

Prefacep. ix
About the Authorsp. xi
Chapter 1 Introductionp. 1
Chapter 2 Fundamentals of Image Encryptionp. 3
2.1 Introductionp. 3
2.2 Basic Concepts of Cryptographyp. 4
2.2.1 Goals of Cryptographyp. 4
2.2.2 Principles of Encryptionp. 5
2.3 Classification of Encryption Algorithmsp. 6
2.3.1 Classification According to Encryption Structurep. 6
2.3.2 Classification According to Keysp. 7
2.3.3 Classification According to Percentage of Encrypted Datap. 8
2.4 Cryptanalysisp. 9
2.5 Features of Image Encryption Schemesp. 10
2.6 Conventional Symmetric Block Ciphersp. 11
2.6.1 Data Encryption Standardp. 11
2.6.2 Double DESp. 14
2.6.3 Triple DESp. 14
2.6.4 International Data Encryption Algorithmp. 15
2.6.5 Blowfishp. 16
2.6.6 RC5 Algorithmp. 16
2.6.6.1 RC5 Encryption Algorithmp. 17
2.6.6.2 RC5 Decryption Algorithmp. 17
2.6.6.3 RC5 Key Expansionp. 17
2.6.7 RC6 Algorithmp. 19
2.6.7.1 RC6 Encryption Algorithmp. 19
2.6.7.2 RC6 Decryption Algorithmp. 20
2.6.8 The Advanced Encryption Standardp. 21
2.7 Modes of Operationp. 24
2.7.1 The ECB Modep. 25
2.7.2 The CBC Modep. 26
2.7.3 The CFB Modep. 27
2.7.4 The OFB Modep. 27
2.8 Chaos and Cryptographyp. 28
2.9 The 2D Chaotic Baker Mapp. 31
Chapter 3 Encryption Evaluation Metricsp. 33
3.1 Introductionp. 33
3.2 Encryption Evaluation Metricsp. 34
3.2.1 Histogram Deviationp. 34
3.2.2 Correlation Coefficientp. 35
3.2.3 Irregular Deviationp. 35
3.2.4 Histogram Uniformityp. 36
3.2.5 Deviation from Idealityp. 36
3.2.6 Avalanche Effectp. 37
3.2.7 NPCR and UACIp. 37
3.3 Other Testsp. 38
3.3.1 Noise Immunityp. 38
3.3.2 The Processing Timep. 38
3.4 Testing the Evaluation Metricsp. 38
3.5 Summaryp. 42
Chapter 4 Homomorphic Image Encryptionp. 43
4.1 Overviewp. 43
4.2 Homomorphic Cryptosystemp. 43
4.3 Security Analysis and Test Resultsp. 45
4.3.1 Statistical Analysisp. 45
4.3.1.1 Histograms of Encrypted Imagesp. 46
4.3.1.2 Encryption Quality Measurementsp. 47
4.3.2 Key Space Analysisp. 48
4.3.2.1 Exhaustive Key Searchp. 48
4.3.2.2 Key Sensitivity Testp. 49
4.3.3 Differential Analysisp. 53
4.4 Effect of Noisep. 54
4.5 Summaryp. 54
Chapter 5 Chaotic Image Encryption with Different Modes of Operationp. 57
5.1 Overviewp. 57
5.2 Chaotic Encryption with Modes of Operationp. 57
5.3 Implementation Issuesp. 58
5.4 Simulation Examples and Discussionp. 60
5.5 Summaryp. 68
Chapter 6 Diffusion Mechanism for Data Encryption in the ECB Modep. 71
6.1 Introductionp. 71
6.2 The Preprocessing Networkp. 72
6.2.1 The Addition Partp. 72
6.2.2 The SPNp. 73
6.3 Implementation Issuesp. 73
6.3.1 Effect of the Normalized Block Size on Diffusionp. 74
6.3.2 Effect of the Normalized Block Size on Block Dependencyp. 77
6.4 Simulation Examplesp. 78
6.4.1 Encryption Qualityp. 79
6.4.2 Diffusionp. 79
6.4.3 Encryption of Images with Few Detailsp. 82
6.5 Summaryp. 88
Chapter 7 Orthogonal Frequency Division Multiplexingp. 89
7.1 Introductionp. 89
7.2 Basic Principles of OFDMp. 90
7.2.1 Orthogonalityp. 92
7.2.2 Frequency Domain Orthogonalityp. 93
7.3 OFDM System Modelp. 94
7.3.1 FFT-OFDMp. 94
7.3.2 DCT-OFDMp. 95
7.3.3 DWT-OFDMp. 95
7.3.4 Discrete Wavelet Transformp. 96
7.3.4.1 Implementation of the DWTp. 96
7.3.4.2 Haar Wavelet Transformp. 98
7.4 Guard Interval Insertionp. 99
7.5 Communication Channelsp. 100
7.5.1 Additive White Gaussian Noise Channelp. 100
7.5.2 Fading Channelp. 100
7.6 Channel Estimation and Equalizationp. 101
Chapter 8 OFDM Limitationsp. 103
8.1 Introductionp. 103
5.1 Analysis of Intercarrier Interferencep. 104
8.1 CFO in FFT-OFDM System Modelp. 105
8.2 CFO in DCT-OFDM System Modelp. 107
8.3 CFO in DWT-OFDM System Modelp. 108
8.4 CFO Compensationp. 108
8.5 Simulation Parametersp. 109
8.6 Effect of PAPRp. 114
8.7 PAPR Reduction Methodsp. 119
8.9.1 The Clipping Methodp. 120
8.9.2 The Companding Methodp. 121
8.9.3 Tie Hybrid Clipping-and-Companding Methodp. 124
8.10 Simulation Experiments of PAPR Reduction Methodsp. 124
8.11 Sampling Clock Offsetp. 128
8.11.1 System Modelp. 129
Chapter 9 Simulation Examplesp. 133
9.1 Simulation Parametersp. 133
9.2 Simulation Experiments in the Presence of CFOp. 169
9.3 Simulation Experiments for Enhanced Algorithmsp. 171
9.4 Simulation Experiments of PAPR Reduction Methodsp. 187
9.5 Summaryp. 223
Referencesp. 225
Appendix A

p. 237

Appendix B

p. 293

Indexp. 391