Advertisement

A New Image Encryption Instant Communication Method Based On Matrix Transformation

  • Jiancheng Zou
  • Tengfan WengEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

With the rapid development of the technology of big data mining and cloud computing. People can easily get images and videos from Internet by mobiles or iPads. How to protect the copyrights of the ownership of these media is a very important problem in information security, especially in the instant communication. In order to improve the security of the transfer processing of images and videos, an improved method of image and video encryption based on Arnold transformation is proposed in this paper. An image is split randomly into several regions to increase the security, each region is then encrypted by Arnold transformation. A security instant communication software is also suggested in this paper. The advantages of our methods include that the periodic recovery of encrypted image is removed and the calculation speed is faster than the traditional Arnold transformation. The methods and the software proposed in this paper are hopefully applied in mobiles or ipads to protect the instant communication of images and videos.

Keywords

Image encryption Matrix translation Arnold algorithm Encrypted communication 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ding Wei, Yan Weiqi, Qi Dongxu, J.:Digital Image Scrambling Technology based on Arnold Transformation. Journalof Computer-aided Design& Computer Graphics Vol.13,No.4, pp.338-341(2001)Google Scholar
  2. 2.
    Ding,M., Jing,F., C.: Digital Image Encryption Algorithm Based on Improved Arnold Transform. International Forum on Information Technology and Applications, pp.174-176(2010)Google Scholar
  3. 3.
    Yang Yali, Cai Na, Ni Guoqiang, J.: Digital Image Scrambling Technology Based on the Symmetry of Arnold Transform. Journal of Beijing Institute of Technology,15(2):pp.216-220(2006)Google Scholar
  4. 4.
    Zhou,Y. Panetta, K. and Agaian, S. C.: Image encryption using discrete parametric cosine transform. Rec.43rd Asilomar Conf.Signals,Syst.,Comput.,vol.28,pp.395-399(2009)Google Scholar
  5. 5.
    Yang Yali, Cai Na, Ni Guoqiang, J.:Digital Image Scrambling Technology Based on theSymmetry of Arnold Transform. Journal of Beijing Institute of Technology, 15(2):pp.216-220(2006)Google Scholar
  6. 6.
    Chen,W., Quan,C., Tay,C.J., J.: Optical color image encryption based on Arnold transform and interference method. Elsevier Opt. Commun. vol.18, pp. 282-286(2009)Google Scholar
  7. 7.
    Saha,B.J., Pradhan,C.,Kabi,K.K., C.: Robust Watermarking Technique using Arnold’s Transformation and RSA in Discrete Wavelets. International Conference on Information Systems and Computer Networks (ISCON), pp.83-87(2014)Google Scholar
  8. 8.
    Wang Xiaofan, C.:Information hiding techniques and applications. Beijing: Mechanical Industry Press, pp.85-109(2001)Google Scholar
  9. 9.
    Li Bing, Xu Jiawei, D.:Arnold transform and its application cycle. Acta Scientiarum Naturalium Universitatis Sunyatseni, 11Supplement (2) (2004)Google Scholar
  10. 10.
    Z hao Hui, J.: N-dimensional Arnold transformation and cyclical. Journal of North China University, (2002,)Google Scholar
  11. 11.
    Qi Dongxu, J.:Matrix Transformation and its Applications to ImageHiding. Journal of North China University of Technology, 11(1), pp. 24-28(1999)Google Scholar
  12. 12.
    David,M., Marie, N.,Bruno M., C.: A study Case on User Experience with IMS using Instant Communication Services. International Conference on IP Multimedia Subsystem Architecture and Applications.pp.1-5(2007)Google Scholar
  13. 13.
    Umamageswari, A., Suresh,G.R., C.: Security in Medical Image Communication with Arnold’s Cat map method and Reversible Watermarking. International Conference on Circuits, Power and Computing T echnologies (ICCPCT), pp.1116-1121(2013)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Institute of Image Processing and Pattern RecognitionNorth China University of TechnologyBeijingChina

Personalised recommendations