Professional Documents
Culture Documents
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
It is difficult to apply traditional encryption methods to image encryption. Unlike text messages, image data have special features such as: Bulk capacity, High redundancy, and High correlation among pixels. Image encryption is divided into two sub stream: Secret Share-Based Encryption Schemes and Chaos Based Image Encryption. In Secret Share-Based image encryption, plane image is divided into n secret images share and is transferred to different person through network. On combination of any k secret share, out of all n secret shares, can regenerate original image. This is also called (k, n) secret sharebased image encryption. In chaos-based image encryption method, plane image is confused and diffused iteratively, by some mathematical function, in such a way that final image get encrypted. Both encryption ways has their own merits and limitations. Some existing methods of image encryptions are described below: Shamirs Secret Sharing Scheme In 1979, Adi Shamir founded a method called Secret Sharing Scheme (SSS) [19]. Secret sharing scheme, also known as (k, n)-threshold scheme for 2 <= k <= n, needs to satisfy the following conditions: -Any k or more users can reconstruct the secret by combining their shares. -It is not possible for k 1 or less users to reconstruct or obtain any information about the secret. To compute the shares, SSS uses a polynomial function where a0, the secret number, is taken as the first coefficient; and a1, a2, . . . , ak1 are random numbers used as other co-efficient. The polynomial is shown as f(x) = (a0 + a1x + a2x2 + ... + ak1 xk1 ) mod P, In the above equation, P is a prime number larger than the secret number, and the value of the function f(x) is computed module P. Bit level based secret sharing for image encryption In this scheme {k, n} technique operates directly on the bit planes of the digital input. If the input image with the B-bit code word representation of the samples is decomposed into B bit-levels (planes), each one can be viewed as a binary image. By stacking individually encrypted bit planes, the scheme produces the B-bit shares useful for secure distribution over the un-trusted public networks. Page 387
1. INTRODUCTION
The high growth in the networking technology leads a common culture for interchanging of the digital images very drastically. Hence it is more vulnerable of duplicating of digital image and re-distributed by hackers. Therefore the images has to be protected while transmitting it, Sensitive information like credit cards, banking transactions and social security numbers need to be protected. For this many encryption techniques are existing which are used to avoid the information theft. The main idea in the image encryption is to transmit the image securely over the network so that no unauthorized user can able to decrypt the image. In recent days of Internet, the encryption of data plays a major role in securing the data in online transmission focuses mainly on its security across the internet. Different encryption techniques are used to protect the confidential data from unauthorized use. Encryption is a very common technique for promoting the image security. Image encryption, video encryption have applications in many fields including the internet communication, multimedia systems, medical imaging, Tele-medicine and military Communication, etc. The evolution of encryption is moving towards a future of endless possibilities. Image encryption is so much demanding and hot topic that new methods of encryption techniques are discovered frequently. Traditional encryption methods are not suitable for image encryption. Volume 2, Issue 4 July August 2013
2. PROPOSED METHOD
Proposed method for image encryption is based on 2Dimensonal chaos. It can be implemented on all type of image, e.g. RGB images (colored images), Gray scale images, and Binary images. Chaos is generated separately for red, green, and blue components of RGB image and after chaos generation encrypted image of R, G, and B components are placed at their respective places. If image is gray scale or binary, then there is only one plane to encrypt (instead of 3 for RGB images) by chaos development. Chaos is developed in proposed method by putting confusion and diffusion on plane image. Confusion and diffusion process is guided by key value. At the time of encryption, user has to give a secret numerical key. Chaos is developed by algorithm, guided by that secret key. At the time of decryption, same key is required to perform reverse confusion and reverse diffusion processes.
Figure 2 Circular shifting directions in confusion process. (a) Row circular shifting direction. (b) Column circular shifting direction. In confusion process Pixel I(x,y) is interchanged with pixel I(x,y) for all 1 x m and 1 y n where m X n is size of plane image. i.e. number of rows and column in image is m and n respectively. In Row Circular Shifting x = x. And y = y + k mod n+1.In Column Circular Shifting x = x + k mod (m+1). And y = y. Here k is instantaneous system generated encryption key, guided by user given encryption key. In order to perform image encryption, proposed algorithm recommends eight rounds of circular row/column shifting. Figure 3 represents confused image. Figure 3(a) shows original image Lina. Figure 3(b) and 3(c) gives output on confusion process after one and two iterations of confusion respectively.
Figure 1 Flow chart of proposed chaos based image encryption scheme Secret key may be of any length between 5 digits to 128 digits. Based on these key numbers, sequence of diffusion locations and confused pixels values are decided. Plane image is confused 8 times and diffused 8 times to get cipher image. Figure 1 shows flow chart of proposed encryption scheme. Proposed algorithm is so efficient that even diffusing two times, histogram of plane image is neutralized to give all pixels value in equal number. 2.1 Confusion Process in Proposed Method Confusion is performed in the proposed method with the help of system encryption key, which is obtained by computation on user encryption key. Confusion in proposed method is of twofold: column circular shift and row circular shift. In first step (column circular shift), we interchange all pixel values with another pixel value (as guided by system encryption key) of same column of the Volume 2, Issue 4 July August 2013
. Figure 3 Confusion process result. (a): Original image. (b): Output after one iteration of confusion. (c): Output after two iteration of confusion Page 389
Figure 4 Diffusion process result. (a): Original image. (b): Output after one iteration of diffusion. (c): Output after two iteration of diffusion For system encryption key generation, we split each digits of user encryption key. Based on each digits and position of that digit in user encryption key, we compute system encryption key. Our system encryption key generation algorithm is designed in such a fashion that even if user key hss repeating occurrence of same digit, computed system encryption key will be different. The System Encryption Key Generation in the proposed encryption algorithm: Step 1: Split user encryption key into uk[i]. Where i = 1, 2, 3, 4. Step 2: Perform uk[i] = 2 * uk[i] + 1. Volume 2, Issue 4 July August 2013
Figure 5 (a): Original image of picture mandril_color (b) Encrypted image by proposed algorithm (C) After decrypting encrypted image, showing lossless encryption/decryption. 3.1 Confusion and Diffusion Process Analysis Proposed algorithm is recommending 8 iterations of cascaded confusion and diffusion, but at the time of implementation in MATLAB, only 2 iterations of confusion and diffusion is implemented. Figure 6(a) shows the original image Lina. Figure 6(b) represent encrypted image using user secret key {1 0 3 2 5 7 8 3 2 4 3 0 2 3 1 5 3}. Figure6(c), 6(d) and figure 6(e) shows histogram of Red, Green, and Blue components (from original image) respectively. Figure 6(f), 6(g) and figure 6(h) shows histogram of Red, Green, and Blue components (from encrypted image) respectively. Page 390
Figure 6 (a): Original image of picture Lina (b) Encrypted image by proposed algorithm. Histogram Result: Histogram result (c), (d), and (e): of red, green, and blue components of original image respectively. Histogram Result: Histogram result (f), (g), and (h): of red, green, and blue components of encrypted image respectively. From analysis of figure 6, it is clearly reflected that histogram of R, G, and B components of original image and encrypted image are entirely different. Statistical analysis of histogram cannot give any information about original image. Therefore we can say that proposed method is much more efficient as it is obtained by only two iteration of diffusion instead of eight proposed iteration.
4. CONCLUSIONS
A new image encryption scheme using a chaotic method was presented here. This method has drastically disrupted statistic property of image. It also neutralized histogram of R, G, and B components of image. Its cryptographic qualities have been evaluated through different statistical analyses. It can also resist brute-force attacks because of large key space. This supports portability architecture because only integers are used during the encryption/decryption processes. Therefore we can conclude that the proposed algorithm for image encryption is useful for application of image encryption, based on guiding user.
References
[1] Joshi Rohit A, Joshi Sumit S, G. P. Bhole, Improved Image Encryption Algorithm using Chaotic Map, in International Journal of Computer Applications (0975 8887), Volume 32 No.9, October 2011 [2] M. Franc-ois a, T.Grosges a,n, D.Barchiesi a, R.Erra b, A new image encryption scheme based on a chaotic function, in SignalProcessing: ImageCommunication 27(2012)249259 [3] Y. Mao, G. Chen and S. Lian, A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , International Journal of Bifurcation and Chaos, Vol. 14, No. 10, pp. 3613-3624, 2004. [4] F. Dachselt, K. Kelber and W. Schwarz, Chaotic Coding and Cryptoanalysis , Proceedings of IEEE International Symposium on Circuits and Systems, Hong Kong, pp. 1061-1064, 9-12 June, 1997. [5] S. Li and X. Zheng, Cryptanalysis of A Chaotic Image Encryption Method , In Proceedings of IEEE Page 391
Figure 6 (a): Original image of picture peppers_color (b) Encrypted image by proposed algorithm using user key: {1 0 3 2 5 7 8 3 2 4 3 0 2 3 1 5 3}. (c) Decrypted image by proposed algorithm using user key: {1 0 3 2 5 7 8 3 2 4 3 0 2 3 1 5}. (d) Decrypted image by proposed algorithm using user key: {1 0 3 2 5 7 8 3 2 4 3 0 2 3}. (c) Decrypted image by proposed algorithm using user key: {1 0 3 2 5 7 8 3 2 4 3 0 2 3 1 5 3}.
AUTHOR
Nikhil Debbarma is working as Assistant Professor in Department of Computer Science & Engineering, NIT Agartala, India. His area of interest is Image Processing, Database Management System.
Lalita Kumari is working as Assistant Professor in Department of Computer Science & Engineering, NIT Agartala, India. Her area of interest is Image Processing, Pattern recognition, etc
Dr. Ing. Jagdish Lal Raheja is Sr. Pr. Scientist in Central Electronics Engineering Research Institute (CEERI) Pilani, Rajasthan, India, under Council of Scientific and Industrial Research (CSIR), Govt. of India. He has published number of publication in International journal and Conferences along with patents. His area of research is Image Processing, Pattern recognition, Computer Vision.
Page 392