Skip to main content

A Novel Encryption Method with Associative Approach for Gray-Scale Images

  • Conference paper
Advances in Artificial Intelligence (MICAI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7629))

Included in the following conference series:

  • 2226 Accesses

Abstract

This paper introduces a novel method for encrypting images with an associative approach. We use a symmetric cryptosystem. The encryption method divides the gray-scale image in n squares with which a Morphological Associative Memory is built. Then, the information from the image is stored in the array which represents the memory. The meaning of the array is very difficult to decipher without the private key and the previous knowledge for operating the associative memory. The original and the recovered images were correlated, and the recovering is 100% in all cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tao, R., Xin, Y., Wang, Y.: Double image encryption based on random phase encoding in fractional Fourier domain. Opt. Express 15, 16067–16079 (2007)

    Article  Google Scholar 

  2. Ge, F., Chen, L., Zhao, D.: A half-blind image hiding and encryption method in fractional Fourier domains. Opt. Commun. 281, 4254–4260 (2008)

    Article  Google Scholar 

  3. Liu, Z., Li, Q., Dai, J., Sun, A., Liu, S., Ahmad, M.: A new kind of double encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains. Opt. Commun. 282, 1536–1540 (2009)

    Article  Google Scholar 

  4. Wang, B., Zhang, Y.: Double images hiding based on optical interference. Opt. Commun. 282, 3439–3443 (2009)

    Article  Google Scholar 

  5. Meng, X., Cai, L., Wang, Y., Yang, X., Xu, X., Dong, G., et al.: Digital image synthesis and multiple-image encryption based on parameter multiplexing and phase-shifting interferometry. Opt. Lasers Eng. 47, 96–102 (2009)

    Article  Google Scholar 

  6. Weng, D., Zhu, N., Wang, Y., Xie, J., Liu, J.: Experimental verification of optical image encryption based on interference. Optics Communications 284, 2485–2487 (2011)

    Article  Google Scholar 

  7. Chen, R.J., Lai, J.L.: Image security system using recursive cellular automata substitution. Pattern Recognition 40, 1621–1631 (2007)

    Article  MATH  Google Scholar 

  8. Guo, Q., Liu, Z., Liu, S.: Color image encryption by using Arnold and discrete fractional random transforms in HIS space. Optics and Lasers in Engineering 48(12), 1174–1181 (2010)

    Article  Google Scholar 

  9. Tao, R., Meng, X.Y., Wang, Y.: Image encryption with multiorders of fractional fourier transforms. IEEE Transactions on Information Forensics and Security 5(4), 734–738 (2010)

    Article  Google Scholar 

  10. Liu, Z., Xu, L., Lin, C., Dai, J., Liu, S.: Image encryption scheme by using iterative random phase encoding in gyrator transform domains. Optics and Lasers in Engineering 49(4), 542–546 (2011)

    Article  Google Scholar 

  11. Liu, Z., Gong, M., Dou, Y., et al.: Double image encryption by using Arnold transform and discrete fractional angular transform. Optics and Lasers in Engineering 50, 248–255 (2012)

    Article  Google Scholar 

  12. Nien, H.H., Huang, W.T., Hung, C.M., et al.: Hybrid image encryption using multi-chaos-system. In: 7th International Conference on Information, Communications and Signal Processing, ICICS 2009, December 8-10, pp. 1–5 (2009)

    Google Scholar 

  13. Prasad, M., Sudha, K.L.: Chaos Image Encryption using Pixel shuffling. In: Computer Science & Information Technology (CS & IT), CS & IT 02, pp. 169–179 (2011)

    Google Scholar 

  14. Zhou, X., Ma, J., Du, W., Zhao, Y.: Ergodic Matrix and Hybrid-key Based Image Cryptosystem. International Journal of Image, Graphics and Signal Processing 4, 1–9 (2011)

    Article  Google Scholar 

  15. Chen, L.: A Novel Image Encryption Scheme Based on Hyperchaotic Sequences. Journal of Computational Information Systems 8(10), 4159–4167 (2012)

    Google Scholar 

  16. Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62, 615–621 (2010)

    Article  MATH  Google Scholar 

  17. Sankaran, S.K., Santhosh Krishna, B.V.: A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images. International Journal of Information and Education Technology 1(2), 137–141 (2011)

    Google Scholar 

  18. Fu, C., Chen, J.J., Zou, H., Meng, W.H., et al.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3), 2363–2378 (2012)

    Article  Google Scholar 

  19. Seyedzadeh, S.M., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Processing 92(5), 1202–1215 (2012)

    Article  Google Scholar 

  20. Zhao, Y.X., Su, M.C., Chou, Z.L., Lee, J.: Puzzle Solver and Its Application in Speech Descrambling. In: Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, pp. 171–176 (2007)

    Google Scholar 

  21. Steinbuch, K.: Die Lernmatrix. Kybernetik 1(1), 36–45 (1961)

    Article  MATH  Google Scholar 

  22. Willshaw, D., Buneman, O., Longuet-Higgins, H.: Non-holographic associative memory. Nature 222, 960–962 (1969)

    Article  Google Scholar 

  23. Anderson, J.A.: A simple neural network generating an interactive memory. Mathematical Biosciences 14, 197–220 (1972)

    Article  MATH  Google Scholar 

  24. Hopfield, J.J.: Neural networks and physical systems with emergent collective computational abilities. Proceedings of the National Academy of Sciences 79, 2554–2558 (1982)

    Article  MathSciNet  Google Scholar 

  25. Ritter, G.X., Sussner, P., Diaz de León, J.L.: Morphological Associative Memories. IEEE Transactions on Neural Networks 9, 281–293 (1998)

    Article  Google Scholar 

  26. Stearns, S.D.: Digital Signal Processing with examples in Matlab, pp. 40–42. CRC Press (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Felipe, F., Martínez, Á., Acevedo, E., Acevedo, M.A. (2013). A Novel Encryption Method with Associative Approach for Gray-Scale Images. In: Batyrshin, I., González Mendoza, M. (eds) Advances in Artificial Intelligence. MICAI 2012. Lecture Notes in Computer Science(), vol 7629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37807-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37807-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37806-5

  • Online ISBN: 978-3-642-37807-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics