Comparative Evaluations of Image Encryption Algorithms
Total Page:16
File Type:pdf, Size:1020Kb
Comparative Evaluations of Image Encryption Algorithms Zhe Liu A thesis submitted to the Auckland University of Technology in partial fulfillment of the requirements for the degree of Master of Computer and Information Sciences (MCIS) 2018 School of Engineering, Computer and Mathematical Sciences Abstract Information security has become a significant issue for protecting the secret information during transmission in practical applications in the era of information. A raft of information security schemes have been used in image encryption. These schemes can be divided into two domains; the first one encrypts the images based on spatial domain, the typical method of spatial image encryption technology is in use of chaotic system, most of the earlier encryption methods are belong to this domain; the other encrypts images on frequency domain, most of the optical image encryption methods are processed in this domain. In this thesis, a slew of approaches for image encryption have been proposed. The contributions of this thesis are listed as follows. (1) We design the improved encryption method based on traditional Double Random Phase Encoding (DRPE) method and use Discrete Cosine Transform (DCT) to replace Discrete Fourier Transform (DFT) so as to avoid operations on complex numbers; we use a logistic map to generate random matrices instead of random phase masks in the traditional DRPE so as to decrease the size of secret keys. (2) We design the encryption method based on traditional watermarking scheme by using Discrete Wavelet Transform (DWT), DCT and Singular Value Decomposition (SVD) together, the proposed DWT-DCT-SVD method has higher robustness than traditional chaotic scrambling method and DRPE method. (3) We improve the DWT- DCT-SVD method by using denoising techniques and design the denoising method based on Convolutional Neural Networks (CNN); the improved method has higher robustness against noise attacks. Keywords: image encryption; double random phase encoding; chaotic scrambling; logistic map; image denoising; linear CNN model I Table of Contents Abstract............................................................................................................................ I Table of Contents............................................................................................................ II List of Figures................................................................................................................ III List of Tables .................................................................................................................. IV List of Algorithms.......................................................................................................... V Attestation of Authorship.............................................................................................. VI Acknowledgment .......................................................................................................... VII Chapter 1 Introduction ...................................................................................................... 1 1.1 Background and Motivation ................................................................................................ 2 1.2 Research Question ............................................................................................................... 3 1.3 Contribution ........................................................................................................................ 4 1.4 Objective of This Thesis ..................................................................................................... 5 1.5 Structure of This Thesis ...................................................................................................... 5 Chapter 2 Literature Review ............................................................................................. 7 2.1 Introduction ......................................................................................................................... 8 2.2 Image Encryption ................................................................................................................ 9 2.3 Image Encryption Based on Spatial Domain .................................................................... 10 2.3.1 Image Encryption using Scrambling .......................................................................... 10 2.3.2 Image Encryption Based on Information Theory ........................................................ 11 2.4 Image Encryption Based on Chaotic System .................................................................... 12 2.5 Image Encryption Based on Frequency Domain ............................................................... 14 2.5.1 Image Encryption Based on DRPE ............................................................................ 15 2.5.2 Transform Algorithms Based on DWT....................................................................... 17 2.5.3 Transform Algorithms Based on DCT ........................................................................ 18 2.5.4 Transform Algorithms using SVD .............................................................................. 19 2.6 Digital Watermarking Algorithms ..................................................................................... 20 2.7 Image Denoising Strategies ............................................................................................... 21 2.7.1 Traditional Image Denoising Methods ....................................................................... 22 2.7.2 Image Denoising Based on Neural Networks ............................................................ 22 Chapter 3 Methodology .................................................................................................. 25 3.1 Research Designing ........................................................................................................... 26 3.1.1 Method I: Chaotic Scrambling Based on Logistic Map ............................................. 27 3.1.2 Method II: Chaotic Map based on DRPE by using DCT ........................................... 27 3.1.3 Method III: Encryption Method Based on DWT-DCT-SVD ...................................... 29 3.1.4 Method IV: Encryption Method Based on DWT-DCT-SVD by Using Denoising Methods ............................................................................................................................... 32 II 3.2 Evaluations ........................................................................................................................ 38 3.3 Summary ........................................................................................................................... 39 Chapter 4 Experimental Results ...................................................................................... 41 4.1 Data Collection and Experimental Environment ...................................................... 42 4.2 Experimental Results for Each Method .................................................................... 43 4.2.1 Method I: Chaotic Scrambling Based on Logistic Map ................................................. 43 4.2.2 Method II: Chaotic Map Based on DRPE by using DCT .............................................. 46 4.2.3 Method III: Encryption Method Based on DWT-DCT-SVD ......................................... 50 4.2.4 Encryption Method Based on DWT-DCT-SVD by Using Denoising Methods ............. 60 4.3 Limitations of the Research ...................................................................................... 66 4.4 Summary ............................................................................................................................... 66 Chapter 5 Analysis and Discussions ............................................................................... 68 5.1 Analysis for Method I, Method II and Method III .................................................... 69 5.1.1 Analysis for Method I .................................................................................................... 69 5.1.2 Analysis for Method II ................................................................................................... 70 5.1.3 Analysis for Method III .................................................................................................. 71 5.2 Comparison and Discussion for the First Three Methods ......................................... 73 5.3 Analysis for Method IV ............................................................................................. 74 5.4 Comparison and Discussion for the Method IV ........................................................ 76 5.5 Summary ................................................................................................................... 77 Chapter 6 Conclusion and Future Work .......................................................................... 78 6.1 Conclusion ........................................................................................................................ 79 6.2 Future Work ....................................................................................................................... 81 References ....................................................................................................................... 82 III List of Figures Figure 3.1 The work flow of DRPE by using DFT..................................................................27 Figure 3.2 The workflow of our method........................................................................................29