Histogram Uniformization for Digital Image Encryption

作者: Juliano B. Lima , Ricardo M. Campello de Souza

DOI: 10.1109/SIBGRAPI.2012.17

关键词:

摘要: In this paper, histogram uniformization of digital images by means the finite field cosine transform (FFCT) is examined. The approach consists in dividing image into blocks and applying FFCT, a recursive manner, to each block. Simulations procedure show that transformed exhibits uniform shape its pixels have low correlation with their neighbors. This result achieved due modular arithmetic used application FFCT blocks. suitability proposed technique context encryption discussed.

参考文章(20)
Chung-Ping Wu, C-CJ Kuo, None, Design of integrated multimedia compression and encryption systems IEEE Transactions on Multimedia. ,vol. 7, pp. 828- 839 ,(2005) , 10.1109/TMM.2005.854469
Songjiang Luo, Xu Chen, Image encryption with control parameter chaotic map international conference on computer engineering and technology. ,vol. 6, ,(2010) , 10.1109/ICCET.2010.5485940
E.A. Galperin, I. Galperin, Small sample uniformity in random number generation Computers & Mathematics With Applications. ,vol. 52, pp. 95- 108 ,(2006) , 10.1016/J.CAMWA.2006.08.007
Guodong Ye, Image scrambling encryption algorithm of pixel bit based on chaos map Pattern Recognition Letters. ,vol. 31, pp. 347- 354 ,(2010) , 10.1016/J.PATREC.2009.11.008
C. E. Shannon, Communication theory of secrecy systems Bell System Technical Journal. ,vol. 28, pp. 656- 715 ,(1949) , 10.1002/J.1538-7305.1949.TB00928.X
M.A. Suhail, M.S. Obaidat, Digital watermarking-based DCT and JPEG model IEEE Transactions on Instrumentation and Measurement. ,vol. 52, pp. 1640- 1647 ,(2003) , 10.1109/TIM.2003.817155
T. Toivonen, J. Heikkila, Video filtering with Fermat number theoretic transforms using residue number system IEEE Transactions on Circuits and Systems for Video Technology. ,vol. 16, pp. 92- 101 ,(2006) , 10.1109/TCSVT.2005.858612
R.M. Campello De Souza, H.M. de Oliveira, A.N. Kauffman, A.J.A. Paschoal, Trigonometry in finite fields and a new Hartley transform international symposium on information theory. pp. 293- ,(1998) , 10.1109/ISIT.1998.708898
Guodong Ye, Xiaoling Huang, Changqing Zhu, Design of an Instruction for Fast and Efficient S-Box Implementation computational intelligence and security. pp. 623- 626 ,(2007) , 10.1109/CIS.2007.120
Guorui Jiang, Guojun Zang, Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix Element computational intelligence and security. pp. 843- 847 ,(2007) , 10.1109/CIS.2007.151