×

Secure fractal image coding based on fractal parameter encryption. (English) Zbl 1177.68244

Summary: In recent work, various fractal image coding methods are reported which adopt the self-similarity of images to compress the size of images. However, up to now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated which encrypts some of the fractal parameters during fractal encoding, and thus produces the encrypted and encoded image. The encrypted image can only be recovered by the correct key. To maintain security and efficiency, only the suitable parameters are selected and encrypted through investigating the properties of various fractal parameters, including parameter space, parameter distribution and parameter sensitivity. The encryption process does not change the file format, keeps secure in perception, and costs little time or computational resources. These properties make it suitable for secure image encoding or transmission.

MSC:

68U10 Computing methodologies for image processing
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
94A60 Cryptography
68P30 Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science)
Full Text: DOI

References:

[1] DOI: 10.1201/9781420013450 · doi:10.1201/9781420013450
[2] DOI: 10.1016/j.chaos.2005.11.090 · Zbl 1127.94004 · doi:10.1016/j.chaos.2005.11.090
[3] DOI: 10.1016/j.chaos.2007.01.034 · doi:10.1016/j.chaos.2007.01.034
[4] DOI: 10.1016/j.chaos.2006.11.009 · Zbl 1142.94310 · doi:10.1016/j.chaos.2006.11.009
[5] DOI: 10.1016/j.chaos.2005.08.110 · Zbl 1096.94006 · doi:10.1016/j.chaos.2005.08.110
[6] DOI: 10.1016/j.chaos.2004.09.035 · Zbl 1083.94011 · doi:10.1016/j.chaos.2004.09.035
[7] DOI: 10.1142/S021812749800098X · Zbl 0935.94019 · doi:10.1142/S021812749800098X
[8] DOI: 10.1016/j.chaos.2004.11.096 · Zbl 1093.37504 · doi:10.1016/j.chaos.2004.11.096
[9] DOI: 10.1007/BFb0034782 · doi:10.1007/BFb0034782
[10] DOI: 10.1016/j.physa.2005.01.001 · doi:10.1016/j.physa.2005.01.001
[11] Chen G., Chaos Solitons Fractals 12 pp 749–
[12] DOI: 10.1142/S021812740401151X · Zbl 1064.94509 · doi:10.1142/S021812740401151X
[13] DOI: 10.1109/78.852023 · doi:10.1109/78.852023
[14] DOI: 10.1109/TMM.2003.808817 · doi:10.1109/TMM.2003.808817
[15] Zhou Y., Chaos Solitons Fractals
[16] DOI: 10.1016/j.chaos.2004.03.015 · Zbl 1062.68594 · doi:10.1016/j.chaos.2004.03.015
[17] DOI: 10.1016/j.chaos.2005.04.006 · Zbl 1086.94005 · doi:10.1016/j.chaos.2005.04.006
[18] DOI: 10.1142/S0218348X05002854 · Zbl 1100.41011 · doi:10.1142/S0218348X05002854
[19] DOI: 10.1142/S0218348X06003271 · Zbl 1158.68051 · doi:10.1142/S0218348X06003271
[20] DOI: 10.1007/978-1-4612-2472-3 · doi:10.1007/978-1-4612-2472-3
[21] DOI: 10.1142/S0218348X07003538 · Zbl 1176.28010 · doi:10.1142/S0218348X07003538
[22] DOI: 10.1142/S0218348X05002854 · Zbl 1100.41011 · doi:10.1142/S0218348X05002854
[23] DOI: 10.1109/83.388086 · doi:10.1109/83.388086
[24] Frigaard C., Image Compression Based on a Fractal Theory (1994)
[25] Mollin R. A., An Introduction to Cryptography (2006) · Zbl 1104.94032
[26] DOI: 10.1016/j.chaos.2006.03.120 · Zbl 1140.94357 · doi:10.1016/j.chaos.2006.03.120
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.