A New Image Encryption Method using Quad-tree based Fresnelet Transform

쿼드트리 방식의 프레넬릿 변환을 이용한 영상의 암호화 기법

Seo, Young-ho;Lee, Yoon-hyuk;Kim, Dong-wook

  • Received : 2015.08.19
  • Accepted : 2015.09.25
  • Published : 2015.12.31


This paper proposes a new method which traces significant element of 2-dimensional natural images and encrypts them by using Fresnelet transform (FRNLT). After analyzing property of the subbands obtained by the FRNLT, we estimated the information for ciphering 2D images. Considering FRNLT levels, energy of subbands, and visual effect, we estimated the optimized point for encryption. By selecting various levels and encrypting region, we can encrypt 2D image with various robustness. Encryption effectiveness was showed by analyzing numerical result, executing time for encryption, area of encrypted region, and visual observation. Therefore encryption for various application can be applied by using the suggested parameters without additional analysis. Identifying the experimental result, in the case of $L_{TH}=4$ and $L_{TH}=4$, an image was not recognized through encrypting only 0.42% among the entire data.


Encryption;Discrete Fresnelet Transform;Quad Tree;Subband Energy


  1. Ho-Joon Lee, Hyung-Jun Lee, "Digital data Encryption on Digital Video Recorder System," Journal of the korean institute of communications and information sciences, vol.32, no.12, pp. 457-462, December. 2007.
  2. H. Chaeng and X. Li, "Partial Encryption of Compressed Images and Videos," IEEE Trans, on Signal Processing, Vol. 48, No. 8, pp. 2439-2451, Aug. 2000.
  3. A. Pommer and A. uhl, "Wavelet Packet Methods for Multimedia Compression and Encryption," IEEE Pacific Rim Conf. On Communications, Computers, and Signal Processing, pp. 1-4, 2001.
  4. A. Pommer and A. Uhl, "Selective Encryption of Wavelet Packet Subband Structures for Obscured Transmission of Visual Data," IEEE Benerux Signal Processing Symposium, pp. 25-28, 2002.
  5. X. Wu and P. W. Moo, "Joint Image/Video Compression and Encryption via High-Order Conditional Entropy Coding of Wavelet Coefficients," Int'l Conference on Multimedia Computing and Systems, pp. 908-912, 1999.
  6. T. Uehara and R. Safavi-Naini, "Attacking and Mending Arithmetic Coding Entropy Schemes," Proc. Of Australian Science Conference, pp. 408-419, Jan. 1999.
  7. P. P. Dang and P. M. Chau, "Image Encryption for Secure Internet Multimedia Applications," IEEE Trans. on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, Aug. 2000.
  8. M. Podesser, H. P. Schmidt, and A. Uhl, "Selective Bitplane Encryption for Secure Transmission of Image data in Mobile Environments," Proc. 5th Nordic Signal Processing Symposium, 2002.
  9. Ran Tao, Xiang-Yi Meng, Wang Yue, "Image Encryption with Multiorders of Fractional Fourier Transforms," IEEE Transactions on Information Forensics and Security, vol.5, no.4, pp.734-738, Dec, 2010.
  10. A.S. Rajput, N. Mishra, S. Sharma, "Towards the Growth of Image Encryption and Authentication Schemes," 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.454-459, 22-25 Aug, 2013.
  11. A.M. Elshamy, A.N.Z. Rashed, A.E.A. Mohamed, O.S. Faragalla, Yi Mu, S.A. Alshebeili, F.E.A. El-Samie, "Optical Image Encryption Based on Chaotic Baker map and Double Random Phase Encoding," Journal of Lightwave Technology, vol.31, no.15, pp.2533-2539, 2013.
  12. G. J. Sullivan and R. L. Baker, "Efficient Quadtree Coding of Images and Videos," IEEE Trans. on Signal Processing, Vol. 3, pp. 327-331, May 1994.
  13. Young-Ho Seo, Moon Seok Kim, Dong-Wook Kim, "Quad-tree Subband Quantizer Design for Digital Hologram Encoding Based on Fresenelet," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 5, pp. 1180-1188 May. 2015.
  14. C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. Of ACM Multimedia 1998, pp. 81-88, 1998.
  15. Sung-Ho Park, Hyun-Jun Choi, Young-Ho Seo, and Dong-Wook Kim, "Ciphering Scheme and Hardware Implementation for MPEG-Based Image/Video Security," Journal of The Institute of Electronics and Information Engineers, vol.42, no.2, pp. 27-36, March. 2005.
  16. L. Qiao and K. Nahrstedt, "Comparison of MPEG Encryption Algorithms," International Journal on Computer and Graphics(Special Issue on Data Security in Image Communication and Networks), Vol. 22, No. 3, pp. 437-444, 1998.
  17. A. M. Alattar, et al., "Improved Selective Encryption Techniques for Secure Transmission of MPEG Video bit-Streams," International Conference on Image Processing (ICIP)'99, 1999.
  18. Youngho Seo, Eui-Sun Choi, Dong-Wook Kim, "Efficient Encryption Technique of Image Using Packetized Discrete Wavelet Transform," Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 3, pp. 603-611 March. 2013.


Supported by : National Research Foundation of Korea (NRF)