418 Pages 232 B/W Illustrations
    by CRC Press

    418 Pages 232 B/W Illustrations
    by CRC Press

    Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches.

    Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems.

    Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations.

    Complete with simulation experiments and MATLAB® codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.

    Introduction

    Fundamentals of Image Encryption
    Introduction
    Basic Concepts of Cryptography
         Goals of Cryptography 
         Principles of Encryption
    Classification of Encryption Algorithms 
         Classification According to Encryption Structure 
         Classification According to Keys 
         Classification According to Percentage of Encrypted Data
    Cryptanalysis
    Features of Image Encryption Schemes
    Conventional Symmetric Block Ciphers 
         Data Encryption Standard
         Double DES 
         Triple DES 
         International Data Encryption Algorithm 
         Blowfish 
         RC5 Algorithm 
              RC5 Encryption Algorithm 
              RC5 Decryption Algorithm 
              RC5 Key Expansion 
         RC6 Algorithm
              RC6 Encryption Algorithm 
              RC6 Decryption Algorithm 
         The Advanced Encryption Standard
    Modes of Operation 
         The ECB Mode 
         The CBC Mode
         The CFB Mode 
         The OFB Mode
    Chaos and Cryptography
    The 2D Chaotic Baker Map

    Encryption Evaluation Metrics
    Introduction
    Encryption Evaluation Metrics 
         Histogram Deviation 
         Correlation Coefficient 
         Irregular Deviation 
         Histogram Uniformity 
         Deviation from Ideality 
         Avalanche Effect 
         NPCR and UACI
    Other Tests
         Noise Immunity 
         The Processing Time
    Testing the Evaluation Metrics
    Summary

    Homomorphic Image Encryption
    Overview
    Homomorphic Cryptosystem
    Security Analysis and Test Results 
         Statistical Analysis 
              Histograms of Encrypted Images 
              Encryption Quality Measurements 
         Key Space Analysis 
              Exhaustive Key Search
              Key Sensitivity Test 
         Differential Analysis
    Effect of Noise
    Summary

    Chaotic Image Encryption with Different Modes of Operation
    Overview
    Chaotic Encryption with Modes of Operation
    Implementation Issues
    Simulation Examples and Discussion
    Summary

    Diffusion Mechanism for Data Encryption in the ECB Mode
    Introduction
    The Preprocessing Network
         The Addition Part
         The SPN
    Implementation Issues 
         Effect of the Normalized Block Size on Diffusion 
         Effect of the Normalized Block Size on Block Dependency
    Simulation Examples
         Encryption Quality
         Diffusion 
         Encryption of Images with Few Details
    Summary

    Orthogonal Frequency Division Multiplexing
    Introduction
    Basic Principles of OFDM
         Orthogonality 
         Frequency Domain Orthogonality
    OFDM System Model 
         FFT-OFDM 
         DCT-OFDM 
         DWT–OFDM 
         Discrete Wavelet Transform 
              Implementation of the DWT 
              Haar Wavelet Transform
    Guard Interval Insertion
    Communication Channels 
         Additive White Gaussian Noise Channel 
         Fading Channel
    Channel Estimation and Equalization

    OFDM Limitations
    Introduction
    Analysis of Intercarrier Interference
    CFO in FFT-OFDM System Model
    CFO in DCT-OFDM System Model
    CFO in DWT-OFDM System Model
    CFO Compensation
    Simulation Parameters
    Effect of PAPR
    PAPR Reduction Methods 
         The Clipping Method 
         The Companding Method 
         The Hybrid Clipping-and-Companding Method
    Simulation Experiments of PAPR Reduction Methods
    Sampling Clock Offset 
         System Model

    Simulation Examples
    Simulation Parameters
    Simulation Experiments in the Presence of CFO
    Simulation Experiments for Enhanced Algorithms
    Simulation Experiments of PAPR Reduction Methods
    Summary

    References
    Appendix A
    Appendix B
    Index

    Biography

    Fathi E. Abd El-Samie received the BSc(Honors), MSc, and PhD degrees from Menoufia University, Menouf, Egypt, in 1998, 2001, and 2005, respectively. Since 2005, he has been a teaching staff member with the Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University. He is currently a researcher at KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICs). He is a co-author of about 200 papers in international conference proceedings and journals and four textbooks. His current research interests include image enhancement, image restoration, image interpolation, superresolution reconstruction of images, data hiding, multimedia communications, medical image processing, optical signal processing, and digital communications.

    Dr. Abd El-Samie was a recipient of the Most Cited Paper Award from the Digital Signal Processing journal in 2008.

    Hossam Eldin H. Ahmed received a BSC(Honors) in nuclear engineering in June 1969 (Faculty of Engineering, Alexandria University, Egypt); an MSc in microelectronic electron diffraction in April 1977 (Nuclear Department, Faculty of Engineering, Alexandria University); and a PhD in June 1983 (High Institute of Electronic and Optics, Paul Sabatier University, Toulouse, France). From 1970 to 1977, he was in the Egyptian marine forces. He was a demonstrator in 1977, teaching lectures and staff members with the Department of Electronic and Electrical Communications, Faculty of Engineering and Technology, Menoufia University. In 1993, he became a professor of microelectronics, VLSI design technology, communication systems, and computer networks. From 1993 until 1999, he was vice dean for education and student affairs at the Faculty of Electronic Engineering. In 2001, he became a chairman of the Electronics and Electrical Communications Department. He is a member of the Menoufia periodic electronic faculty jou