Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform

Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform

Sara Tedmori1 and Nijad Al-Najdawi2
  1Department of Computer Science, Princess Sumaya University for Technology, Jordan
2Department of Information Technology, Al-Balqa Applied University, Jordan

 
Abstract: The science of cryptography has recently attracted significant attention, as progressively more information is stored and transmitted in electronic form. Cryptography is the discipline of using codes to encrypt data into an unreadable format that only the targeted recipients can decrypt and read.  Encryption methods can be divided into two categories: lossy and lossless. In lossy encryption methods, the decrypted image details are vulnerable to distortion. Lossless encryption methods are more relevant when marginal distortion is not tolerable. In this research, the authors propose a novel lossless encryption/decryption technique. In the proposed algorithm, the image is transformed into the frequency domain, where low and high frequencies are processed in a way that guarantees a secure, reliable, and an unbreakable form.  The encryption algorithm uses the discrete cosine transform to convert the target image into the frequency domain, after which the encryption involves scattering the distinguishable DC value using a reversible weighting factor amongst the rest of the frequencies. The algorithm is designed to shuffle and reverse the sign of each frequency in the transformed block before the image blocks are transformed back to the pixel domain. The results show a total change in the encrypted image pixel values, concealing the image details. The decryption algorithm reverses the encryption steps and returns the image to its original form without any loss in the pixel values. Based on the application’s requirements, .the decryption algorithm can perform with or without a decryption key, The encryption algorithm is suitable for applications that require secure transport of high quality data.


Keywords: Image cryptography, image encryption and decryption, and frequency domain coefficients.

Received June 14, 2010; accepted January 3, 2011

Read 5668 times Last modified on Tuesday, 15 November 2011 08:44
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…