Advanced Search
Volume 29 Issue 6
Jan.  2011
Turn off MathJax
Article Contents
Dang Jie, Lin Qiu-hua, Yin Fu-liang. Encryption of Multiple Sequential Images Using Blind Source Separation[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1471-1475. doi: 10.3724/SP.J.1146.2005.01355
Citation: Dang Jie, Lin Qiu-hua, Yin Fu-liang. Encryption of Multiple Sequential Images Using Blind Source Separation[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1471-1475. doi: 10.3724/SP.J.1146.2005.01355

Encryption of Multiple Sequential Images Using Blind Source Separation

doi: 10.3724/SP.J.1146.2005.01355
  • Received Date: 2005-10-26
  • Rev Recd Date: 2006-04-20
  • Publish Date: 2007-06-19
  • Since the security of many cryptosystems relies on the apparent intractability of the computational problems, the underdetermined problem of Blind Source Separation (BSS) is used to encrypt multiple images with high security. However, due to the BSS ambiguity, the order of BSS decrypted images may different from that of the original images and the value of pixel in some decrypted images may be reversed, which can result in decryption errors when encrypting multiple sequential images. To solve this problem, digital watermarking technique is utilized to embed some order information into each original image before encryption. After decryption, these order information is extracted from the decrypted images and then used to eliminate the decryption errors. Computer simulation results show that the proposed method not only can recover the original order of the decrypted images, but also can detect if the decrypted images are reversed.
  • loading
  • Hyvrinen A, Karhunen J, and Oja E. Independent Component Analysis. New York: John Wiley, 2001, chapter1, chapter8.[2]Cichocki A and Amari S. Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications. Chichester: John Wiley, 2003, chapter1, chapter6.[3]Cardoso J F. Blind signal separation: statistical principles[J].Proc. IEEE.1998, 86(10):2009-2025[4]Cao X R and Liu R W. General approach to blind source separation[J].IEEE Trans. on Signal Processing.1996, 44(3):562-571[5]Lin Q H, Yin F L, and Liang H L. Blind source separationbased encryption of images and speeches[J].Lecture Notes in Computer Science, Berlin: Springer.2005, 3497:544-549[6]杨波. 现代密码学. 北京: 清华大学出版社, 2003: 8-9.[7]Lin Q H, Yin F L, Mei T M, and Liang H L. A blind source separation based method for speech encryption. IEEE Trans. on Circuits and Systems I, 2006 (in press).[8]Comon P. Independent component analysis, a new concept? Signal Processing, 1994, 36(3): 287-314.[9]Tong L, Liu R W, Soon V C, and Huang Y F. Indeterminacy and identifiability of blind identification[J].IEEE Trans. on Circuits and Systems.1991, 38(5):499-509[10]Barni M. What is the future for watermarking?IEEE Signal Processing Magazine, 2003, 20(5): 55-60.[11]Cox I J, Kilian J, Leighton T, and Shamoon T. Secure spread spectrum watermarking for images, audio and video. Proc. of IEEE Int. Conf. on Image Processing, Lausanne, Switzerland, 1996: 243-246.[12]黄继武, Shi Y Q, 程卫东. DCT 域图像水印: 嵌入对策和算法. 电子学报,2000, 28(4): 57-60. Huang Ji-wu, Yun Q.Shi, and Cheng Wei-dong. Image watermarking in DCT: An embedding strategy and algorithm. Acta Electronica Sinica, 2000, 28(4): 57-60.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3259) PDF downloads(736) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return