Published

2020-09-17

Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)

Cifrado de imágenes basado en la entropía utilizando el Factor de Propagación Variable Ortogonal (OVSF)

DOI:

https://doi.org/10.15446/ing.investig.v40n3.81421

Keywords:

entropy, OVSF, image encryption, security, privacy, ciphered data (en)
entropía, OVSF, cifrado de imágenes, seguridad, privacidad, datos cifrados (es)

Downloads

Authors

The purpose of image encryption is to provide data privacy and security. The former ensures that only authorized personnel can access the original content, while the latter implies that there is no evident relationship between the encrypted and the original content, and that the key space is equally likely and large enough. In the current state of the field, there are several proposals of image encryption techniques with very high privacy (in terms of entropy) but weak in terms of security (i.e., small key space). Recently, a new encoding-based method that provides a long key space (namely 8,57 × 10506) with a middle value of entropy (87%) was proposed. Our proposal preserves the strength of the image encryption methods based on encoding, but with a higher value placed on security than the preliminary works. Every pixel of an image is mapped into an orthogonal code based on 256 bits. The 8-OVSF codes are selected to encode the image, given that the entropy of the inter-symbol is near the possible maximum. Numerous test results verify that our ciphered data have a very high value of entropy (98,5%) with an equally likely and long key space (8,57 × 10506), thus providing an adequate balance between privacy and security.

El objetivo del cifrado de imágenes es proporcionar privacidad y seguridad a los datos. La primera garantiza que solo el personal autorizado pueda acceder al contenido original, mientras que la otra implica que no exista relación evidente entre el contenido cifrado y el original, y que el conjunto de claves tenga igualdad de probabilidad y sea lo suficientemente grande. En el estado del arte existen numerosas propuestas de técnicas de cifrado de imágenes con alta privacidad (en términos de entropía), pero con deficiencia en términos de seguridad (es decir, un conjunto de claves pequeño). Recientemente, se propuso un método basado en codificación que proporciona un espacio de clave grande (específicamente, 8,57 × 10506) con un valor intermedio de entropía (87 %). Nuestra propuesta conserva la fortaleza de los métodos de cifrado de imágenes basados en codificación, pero con mayor valor de seguridad que los trabajos anteriores. Cada píxel de una imagen es mapeado a un código ortogonal de 256 bits. Los códigos 8-OVSF se seleccionan para codificar la imagen, debido a que la entropía del inter-símbolo es cercana al máximo posible. Los resultados de numerosas pruebas demuestran que nuestros datos cifrados tienen un valor de entropía muy alto (98,5 %) con un conjunto de claves grande (8,57 × 10506) e igualmente probable, lo que proporciona un equilibrio adecuado entre privacidad y seguridad.

References

Akhavan, A., Samsudin, A., and Akhshani, A. (2017). Cryptanalysis of an image encryption algorithm based on DNA encoding. Optics and Laser Technology, 95, 94-99. https://doi.org/10.1016/j.optlastec.2017.04.022

Asgari-Chenaghlu, M., Balafar, M. A., and Feizi-Derakhshi, M. R. (2019). A novel image encryption algorithm based on poly-nomial combination of chaotic maps and dynamic function generation. Signal Processing, 157, 1-13. https://doi.org/10.1016/j.sigpro.2018.11.010

Ballesteros, D. M., Peña, J., and Renza, D. (2018). A Novel Im-age Encryption Scheme Based on Collatz Conjecture. Entropy, 20(12), 901. https://doi.org/10.3390/e20120901

Belmeguenai, A., Ahmida, Z., Ouchtati, S., and Djemii, R. (2017). A novel approach based on stream cipher for selective speech encryption. International Journal of Speech Technology, 20(3), 685-698. https://doi.org/10.1007/s10772-017-9439-8

Broumandnia, A. (2019). Designing digital image encryption using 2D and 3D reversible modular chaotic maps. Journal of Information Security and Applications, 47, 188-198. https://doi.org/10.1016/j.jisa.2019.05.004

Chai, X., Gan, Z., Yuan, K., Chen, Y., and Liu, X. (2019). A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing and Applications, 31(1), 219-237. https://doi.org/10.1007/s00521-017-2993-9

Feng, W., He, Y., Li, H., and Li, C. (2019). Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access, 7, 12584-12597. https://doi.org/10.1109/ACCESS.2019.2893760

Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and cha-os, 8(06), 1259-1284. https://doi.org/10.1142/S021812749800098X

Hameed, Y. and Ali, N. (2018). An efficient audio encryption based on chaotic logistic map with 3D matrix. Journal of Theoretical and Applied Information Technology, 96, 5142-5152.

Hayat, U. and Azam, N. A. (2019). A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, 391-402. https://doi.org/10.1016/j.sigpro.2018.10.011

Hua, Z., Jin, F., Xu, B., and Huang, H. (2018). 2D Logistic-Sine-coupling map for image encryption. Signal Processing, 149, 148-161. https://doi.org/10.1016/j.sigpro.2018.03.010

Kalpana, M., Ratnavelu, K., and Balasubramaniam, P. (2019). An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimedia Tools and Applications, 78(5), 5969-5988. https://doi.org/10.1007/s11042-018-6373-y

Khoirom, M. S., Laiphrakpam, D. S., and Themrichon, T. (2018). Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik, 168, 370-375. https://doi.org/10.1016/j.ijleo.2018.04.068

Kumar, R. and Quan, C. (2019). Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform. Optics and Lasers in Engineering, 120, 118-126. https://doi.org/10.1016/j.optlaseng.2019.03.024

Li, C., Xie, T., Liu, Q., and Cheng, G. (2014). Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dynamics, 78(2), 1545-1551. https://doi.org/10.1007/s11071-014-1533-8

Liu, J. M. and Qu, Q. (2010, October). Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map. In Qingling, l., Fei, Y., and Yun L. (Eds.) 2010 IEEE Third International Symposium on Information Pro-cessing (pp. 67-69), Qingdao, China: IEEE. https://doi.org/10.1109/ISIP.2010.33

Patidar, V., Pareek, N. K., and Sud, K. K. (2009). A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3056-3075. https://doi.org/10.1016/j.cnsns.2008.11.005

Renza, D. and Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62-69. https://doi.org/10.1016/j.jisa.2019.02.010

Robinson, D. W. (2008). Entropy and uncertainty. Entropy, 10(4), 493-506. https://doi.org/10.3390/e10040493

Saini, D. S. and Bhooshan, S. V. (2006, July). Adaptive assignment scheme for OVSF codes in WCDMA. In Dini, P., Christer, Å., Dini, C., and Borcoci, E. (Eds.) 2006 IEEE International Conference on Wireless and Mobile Communications (IC-WMC'06) (pp. 65-65), Bucharest, Romania: IEEE. https://doi.org/10.1109/ICWMC.2006.15

Saljoughi, A. S. and Mirvaziri, H. (2019). A new method for im-age encryption by 3D chaotic map. Pattern Analysis and Applications, 22(1), 243-257. https://doi.org/10.1007/s10044-018-0765-5

Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell system technical journal, 28(4), 656-715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

Telem, A. N. K., Segning, C. M., Kenne, G., and Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014. https://doi.org/10.1155/2014/602921

Wang, B., Wei, X., and Zhang, Q. (2013). Cryptanalysis of an image cryptosystem based on logistic map. Optik, 124(14), 1773-1776. https://doi.org/10.1016/j.ijleo.2012.06.020

Wen, H., Yu, S., and Lü, J. (2019). Breaking an image encryption algorithm based on DNA encoding and spatiotemporal cha-os. Entropy, 21(3), 246. https://doi.org/10.3390/e21030246

Ye, G. and Huang, X. (2017). An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing, 251, 45-53. https://doi.org/10.1016/j.neucom.2017.04.016

Zhang, J., Fang, D., and Ren, H. (2014). Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering, 2014. https://doi.org/10.1155/2014/917147

Zhu, H., Zhao, Y., and Song, Y. (2019). 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access, 7, 14081-14098. https://doi.org/10.1109/ACCESS.2019.2893538

How to Cite

APA

Ballesteros, D. M., Renza, D. & Peña, J. (2020). Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF). Ingeniería e Investigación, 40(3), 70–80. https://doi.org/10.15446/ing.investig.v40n3.81421

ACM

[1]
Ballesteros, D.M., Renza, D. and Peña, J. 2020. Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF). Ingeniería e Investigación. 40, 3 (Sep. 2020), 70–80. DOI:https://doi.org/10.15446/ing.investig.v40n3.81421.

ACS

(1)
Ballesteros, D. M.; Renza, D.; Peña, J. Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF). Ing. Inv. 2020, 40, 70-80.

ABNT

BALLESTEROS, D. M.; RENZA, D.; PEÑA, J. Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF). Ingeniería e Investigación, [S. l.], v. 40, n. 3, p. 70–80, 2020. DOI: 10.15446/ing.investig.v40n3.81421. Disponível em: https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421. Acesso em: 22 mar. 2026.

Chicago

Ballesteros, Dora M., Diego Renza, and Jimmy Peña. 2020. “Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)”. Ingeniería E Investigación 40 (3):70-80. https://doi.org/10.15446/ing.investig.v40n3.81421.

Harvard

Ballesteros, D. M., Renza, D. and Peña, J. (2020) “Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)”, Ingeniería e Investigación, 40(3), pp. 70–80. doi: 10.15446/ing.investig.v40n3.81421.

IEEE

[1]
D. M. Ballesteros, D. Renza, and J. Peña, “Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)”, Ing. Inv., vol. 40, no. 3, pp. 70–80, Sep. 2020.

MLA

Ballesteros, D. M., D. Renza, and J. Peña. “Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)”. Ingeniería e Investigación, vol. 40, no. 3, Sept. 2020, pp. 70-80, doi:10.15446/ing.investig.v40n3.81421.

Turabian

Ballesteros, Dora M., Diego Renza, and Jimmy Peña. “Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)”. Ingeniería e Investigación 40, no. 3 (September 17, 2020): 70–80. Accessed March 22, 2026. https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421.

Vancouver

1.
Ballesteros DM, Renza D, Peña J. Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF). Ing. Inv. [Internet]. 2020 Sep. 17 [cited 2026 Mar. 22];40(3):70-8. Available from: https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421

Download Citation

CrossRef Cited-by

CrossRef citations2

1. Bahram Rashidi. (2025). A High Secure Image Encryption Method Based on an Efficient and Low‐Cost Cryptographic System. SECURITY AND PRIVACY, 8(6) https://doi.org/10.1002/spy2.70130.

2. Bahram Rashidi. (2024). An Image Encryption Method Based on a High-performance and Efficient Block Cipher. Journal of Signal Processing Systems, 96(10), p.601. https://doi.org/10.1007/s11265-024-01937-4.

Dimensions

PlumX

Article abstract page views

788

Downloads

Download data is not yet available.