Int. J. Communications, Network and System Sciences, 2014, 7, 43-52
Published Online January 2014 (http://www.scirp.org/journal/ijcns )
http://dx.doi.org/10.4236/ijcns.2014.71006
OPEN ACCESS IJCNS
Image Encryption Scheme Based on Filter Bank
and Lifting
Saleh Saraireh
1
, Yazeed Al-Sbou
2
, Ja’afer Al-Saraireh
3
, Othman Alsmadi
4
1
Department of Communications and Electronic Engineering, Philadelphia University, Amman, Jordan
2
Department of Computer Engineering, Mu’tah University, Karak, Jordan
3
Department of Computer Science, Applied Science University, Amman, Jordan
4
Department of Electrical Engineering, The University of Jordan, Amman, Jordan
Email: Saleh_53@yahoo.com
Received November 27, 2013; revised December 27, 2013; accepted January 4, 2014
Copyright © 2014 Saleh Saraireh et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In accor-
dance of the Creative Commons Attribution License all Copyrights © 2014 are reserved for SCIRP and the owner of the intellectual
property Saleh Saraireh et al. All Copyright © 2014 are guarded by law and by SCIRP as a guardian.
ABSTRACT
In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and eva-
luated. Many extensive techniques have been applied to examine the security of the image encryption using the
filter bank cipher with one or two rounds. To analyze and evaluate the proposed scheme, many parameters have
been employed, such as, histogram analysis, correlation coefficient, global entropy, block entropy, avalanche
effect, number of pixel change rate (NPCR), unified average change intensity (UACI), compression friendliness,
exhaustive key analysis, and key sensitivity test. The simulation results showed that, the quality of the image en-
cryption passes all these tests. Moreover, it reaches or excels the current state-of-the-arts. So that, the proposed
image encryption process produces random-like output from the statistical point of views.
KEYWORDS
Randomness Test; Image Encryption; Encryption Quality; Filter Bank; Entropy
1. Introduction
Due to the rapid advances in computer and communica-
tion networks and the recent progress in multimedia
technologies (i.e. audio, video, image, etc.), multimedia
information can easily be exchanged over different types
of networks like the Internet. Usually, these networks are
not secure. Therefore, users must pay more attention to
the security of their networks and information transmis-
sion against unauthorized users. Due to this, the multi-
media information security has become a vital concern in
military applications, audio and videoconferencing, im-
aging, E-Commerce, and mobile phone applications [1,2].
Moreover, over these networks, people may be required
to send personal and sensitive information or exchange
important documents. In such situations; security, integr-
ity, authenticity and confidentiality of digital data should
be provided. Therefore, these applications must be se-
cured from various kinds of attacks like interruption,
interception, modification and fabrication [3,4]. As a
result, it is essential to protect this information using
some encryption and cryptography algorithms.
Encryption (enciphering) is a procedure utilized for
converting and scrambling of data to insure its security.
Consequently, several security approaches have been
proposed to insure the required protection [2]. The use of
these security techniques allows the information trans-
mission across insecure networks to prevent any danger
of attack. Cryptology and cryptanalysis are two major kinds
of cryptography, where the cryptology is to keep plaintext
secret from eavesdropper while cryptanalysis is to conquer
such techniques to reconstruct this information [3].
The process of encryption includes that the multimedia
data is protected and a key is provide for decryption pro-
cess (deciphering). The encrypted data are usually called the
ciphertext and unencrypted data are called the plain-text. To
decide whether one is allowed to view the encrypted data or
not, a key is used. Based on this point, there are two main
types of algorithms used for data encryption; symmetric-key
algorithms and public key algorithms. In the symmetric