Regular Articles

Homomorphic image encryption

[+] Author Affiliations
Ibrahim F. Elashry

Kafrelshiekh University, Faculty of Engineering, Department of Electrical Communications, Kafrelshiekh, Egypt

Osama S. Farag Allah

Menoufia University, Faculty of Electronic Engineering, Department of Computers Engineering, Menouf, Egypt

Alaa M. Abbas

Menoufia University, Faculty of Electronic Engineering, Department of Electronics and Electrical Communications, Menouf, Egypt

S. El-Rabaie

Menoufia University, Faculty of Electronic Engineering, Department of Electronics and Electrical Communications, Menouf, Egypt

Fathi E. Abd El-Samie

Menoufia University, Faculty of Electronic Engineering, Department of Electronics and Electrical Communications, Menouf, Egypt

J. Electron. Imaging. 18(3), 033002 (July 14, 2009). doi:10.1117/1.3167847
History: Received September 01, 2008; Revised May 08, 2009; Accepted May 26, 2009; Published July 14, 2009
Text Size: A A A

This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component. A comparison study is held between the RC6 block cipher algorithm and the chaotic Baker map algorithm for the encryption of the reflectance component. We present a security analysis for the proposed cryptosystem against the entropy, brute-force, statistical, and differential attacks from a strict cryptographic viewpoint. Experimental results verify and prove that the proposed homomorphic image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that this cryptosystem has a very powerful diffusion mechanism (a small change in the plain text makes a great change in the cipher image). The homomorphic encryption using RC6 algorithm is more secure than that using the chaotic Baker map algorithm but not robust to noise. Thus, the proposed homomorphic cryptosystem can be used in different applications, depending on the core algorithm used.

Figures in this Article
© 2009 Society of Photo-Optical Instrumentation Engineers

Citation

Ibrahim F. Elashry ; Osama S. Farag Allah ; Alaa M. Abbas ; S. El-Rabaie and Fathi E. Abd El-Samie
"Homomorphic image encryption", J. Electron. Imaging. 18(3), 033002 (July 14, 2009). ; http://dx.doi.org/10.1117/1.3167847


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

PubMed Articles
Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.