A Novel Image ENCRYTION Algorithm for Enhanced Security

Similar documents
IMAGE COMPRESSSION AND ENCRYPTION USING SCAN PATTERN

Image Encryption by Redirection & Cyclical Shift

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

H.A.F Technique for Documents and Archaeologist Images Encryption

Evaluation of Visual Cryptography Halftoning Algorithms

Watermarking patient data in encrypted medical images

Image Encryption Based on New One-Dimensional Chaotic Map

Image Encryption using Pseudo Random Number Generators

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Double Phase Image Encryption and Decryption Using Logistic Tent Map and Chaotic Logistic Map

Meta-data based secret image sharing application for different sized biomedical

EE 418 Network Security and Cryptography Lecture #3

ISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Number Theory and Public Key Cryptography Kathryn Sommers

Dynamic Collage Steganography on Images

HSI Color Space Conversion Steganography using Elliptic Curve

A New Image Steganography Depending On Reference & LSB

An Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression

An Enhanced Least Significant Bit Steganography Technique

Local prediction based reversible watermarking framework for digital videos

A Modified Image Template for FELICS Algorithm for Lossless Image Compression

EE 418: Network Security and Cryptography

International Journal of Advance Research in Computer Science and Management Studies

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES AN EFFICIENT METHOD FOR SECURED TRANSFER OF MEDICAL IMAGES M. Sharmila Kumari *1 & Sudarshana 2

A Fast Image Encryption Scheme based on Chaotic Standard Map

AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

FPGA implementation of DWT for Audio Watermarking Application

A Secure Image Encryption Algorithm Based on Hill Cipher System

Image Compression Using Hybrid SVD-WDR and SVD-ASWDR: A comparative analysis

Data security (Cryptography) exercise book

TMA4155 Cryptography, Intro

Simultaneous Encryption/Compression of Images Using Alpha Rooting

Block Wise Data Hiding with Auxilliary Matrix

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

A Novel (2,n) Secret Image Sharing Scheme

FPGA implementation of LSB Steganography method

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

A Novel Encryption System using Layered Cellular Automata

Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation

Comparative Analysis of WDR-ROI and ASWDR-ROI Image Compression Algorithm for a Grayscale Image

TRANSMITING JPEG IMAGE OVER USING UPA AND CHOTIC COMMUNICATION

2. REVIEW OF LITERATURE

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3

PERFORMANCE EVALUATION OFADVANCED LOSSLESS IMAGE COMPRESSION TECHNIQUES

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Differential Cryptanalysis of REDOC III

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Proceedings of Meetings on Acoustics

The number theory behind cryptography

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Two congruences involving 4-cores

COMBINATION MATHEMATICAL DISTANCE MEASURE APPROACH FOR SOME IMAGE PROCESSING APPLICATIONS

Concealing Data for Secure Transmission and Storage

Chapter 4 MASK Encryption: Results with Image Analysis

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

Design and Implementation of Game Based Security Model to Secure the Information Contents

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

HYBRID MEDICAL IMAGE COMPRESSION USING SPIHT AND DB WAVELET

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Lossy Image Compression Using Hybrid SVD-WDR

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Random Sequences for Choosing Base States and Rotations in Quantum Cryptography

DEVELOPMENT OF LOSSY COMMPRESSION TECHNIQUE FOR IMAGE

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES. Every image has a background and foreground detail.

Analysis of Secure Text Embedding using Steganography

Math 1111 Math Exam Study Guide

Enhance Image using Dynamic Histogram and Data Hiding Technique

Keywords: Image segmentation, pixels, threshold, histograms, MATLAB

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

NEW METHOD FOR USING CHAOTIC MAPS TO IMAGE ENCRYPTION

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

Chapter 4 SPEECH ENHANCEMENT

Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression

Speech Signal Encryption Using Chaotic Symmetric Cryptography

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

An Implementation of LSB Steganography Using DWT Technique

Improvement of Satellite Images Resolution Based On DT-CWT

Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

The Application of Selective Image Compression Techniques

i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly Generated Bitmap Image

Course Developer: Ranjan Bose, IIT Delhi

Security Enhancement and Speed Monitoring of RSA Algorithm

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Degree project NUMBER OF PERIODIC POINTS OF CONGRUENTIAL MONOMIAL DYNAMICAL SYSTEMS

Keywords: BPS, HOLs, MSE.

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Transcription:

A Novel Image ENCRYTION Algorithm for Enhanced Security Miss.Amrita Singh, Miss.Laxmi Goswami Aijaz Ur Rahman Khan Asst. Professor Asst. Professor Asst.Professor Dr.C.V.Raman University Dr.C.V.Raman University M.M.College of Technology Bilaspur (C.G.) Bilaspur (C.G.) Raipur(C.G.) Abstract-The main aim of this paper is to develop a novel encryption algorithm for increasing the security of encryption so that only the intended person is able to decrypt the image. In this algorithm, original image is first encrypted using SCAN based encryption operation followed by ElGamel based encryption method. Various analysis has been done to test the performance of proposed algorithm. Keywords : Image encryption, SCAN, Spiral, Orthogonal, Diagonal, Raster, MSE. I. INTRODUCTION The advancement in communication and internet technology has given a quick and fast mode of communication using world wide web. Though this mode of information interchange is very fast but at the same it also creates security problem. Encryption is one way of ensuring the security in text, image, audio and video data. Image encryption play very important role in telemedicine, medical imaging, military communication,multimedia system. Various image encryption method has been proposed by different researcher in the past which include chaos-based image encryption method[1],scan-language based encryption method[2-5],tree structure-based encryption method[6] and some other method[7-9].some methods provides better security while other method are very efficient in term of speed. In any kind of public key crypto system, security depends on the difficulty of factoring. In 1985 [10],[11] ElGamel proposed an encryption method whose security depends on the difficulty of computing the discrete algorithms. His method of encryption require a large prime number p and its primitive root r.high level of security is ensured by using big key size[12] because big size key require a very extensive computation and hence more difficult to decrypt[13].in this paper an effort has been made to design a novel and more secure method of encryption by combining two different methods. The proposed encryption method starts by rearranging the image pixel. In this method pixel rearrangement is carried out by different scan pattern using SCAN methodology. Scanning pattern of an image is simply a arrangement order of a pixel. Since different scan pattern has different arrangement order therefore it can be used for encryption by 2942

generating a large number of scan pattern.once the image is encrypted using SCAN based methodology then it is again encrypted using elgamel encryption method to enhance the security of encryption. Since ElGamel encryption method provides good security and least complexity therefore it is chosen along with the SCAN based methodology. II. SCANNING METHOD SCAN [2-5] is a formal language based method of accessing or arranging the position of pixels in an image.using SCAN language,large number of scanning path can be generated. SCAN is actually a group of formal language and can be termed as Simple SCAN, Generalized SCAN, Extended SCAN. Each SCAN language follows some basic rules and grammer. There are some basic pattern of scanning and rule in each SCAN language which are used to generate some simple scanning pattern which later on can be used to generate complex scan pattern. In this proposed method four basic scan pattern has been used which are known as continuous diagonal(d),continuous raster(c),con tinuous orthogonal(o), spiral(s).each of these basic pattern can have eight different transformations which can be numbered from 0 to 7.Transformation 0,2,4,6 are the reverse transformation of 1,3,5,7.Different types of basic scanning pattern[16] is shown in figure We can apply individually (c) (d) Figure 2 Spiral Raster (c) Diagonal (d) Orthogonal each of these basic pattern in single image or alternatively divide the image into different parts and apply these basic pattern in different parts. A. Partition Pattern Partition pattern define the order by which each sub-regions of the image are scanned and these partition order are denoted by letter A,B, C and E. Each partition order can also have six different transformations or pattern. Figure 3 Partition order for different letter 2943

Here letter A represent the partition order which starts from left upper (denoted by 1). And goes to the rest of the three part in 6 different ways or in other words has 6 different transformation. In a similar way in this method,4- different partition order (A,B,E,X) and its six transformation are being used therefore it can be encoded as A1-A6,B1-B6,E1-E6,X1-X6. For example the key for following figure is shown below Figure 4 Partition pattern for A B. Key Generation In order to generate a key for this encryption and decryption we encode all the scanning pattern and its eight-transformation as C1-C8(for continuous raster), D1-D8(for Diagonal),O1-O8( for orthogonal),s1-s8(for Spiral). Figure 5 SCAN Pattern Diagram Figure 6 Encryption Key Generation III. ELGAMEL ENCRYPTION This method is based on the facts that if p is a large prime number then the primitive root of this number p is a number r which satisfy the following property R (mod p) r 2 (mod p) r 2 (mod p). r p-1 (mod p) 0 (1) i.e. mod of p taken over the power of number r yield distinct and non-zero number and all are also relative prime to p. For example consider a prime number 7.The primitive root can be any integer number from 1 to 6 which satisfy the equation (1).From the table it is clear that only number 3 and 5 satisfy the equation (1) and hence these number are primitive root of prime number 7. 2944

Algorithm steps for ELGamel method are as follows- A. Encrytion Process IV. PROCEDURE FOR ELGAMEL METHOD In this method a user has to choose the private key on the basis of which, a public key is calculated. Let p be a prime number of large value and α be the primitive root of p.suppose the selected private key is represented by r then Step 7 Repeat step 3 to 6 till all the pixel gets the public key β is computed by β =α r (mod p) Step 1 First of all choose any large prime number p Step 2 Compute the primitive root of p and choose any one primitive root α. Step 3 Select a private key a and compute the corresponding public key using equation 2. Step 4 Take the first pixel of the Red channel Figure 7 and encrypt it using equation 4 for a selected.(2) Choose any random integer and compute b by b=α k (mod p)..(3) If the plain text is T then compute cipher text by C=β k T (mod p)..(4) Now, for decryption at the receiver side can be computed by T = Cb -r (mod p)..(5) This is due to the fact that C b -r = β k T (α k ) -r = (α r ) k T (α k ) -r = α rk T α -rk = T (6) random number k Step 5 Repeat step 4 for the pixel of Green channel. Step 6 Repeat step 4 for the pixel of blue channel. encrypted. Step 8 Merge all encrypted Red, Green and Blue pixel to get the encrypted image. A. Decrytion Process Step 1 Get the encrypted image and separate the Red, Green and Blue channel. Step 2 Compute the value of b using equation 3. Step 3Take the first encrypted pixel of Red channel and decrypt it using equation 5. Step 4 Repeat step 4 for Green and Blue channel. 2945

Step 5 Merge all the decrypted Red, Green and Blue pixel to get back the decrypted image. V. PROPOSED METHOD Proposed encryption process consists of two part.the first part encrypt the original image using scanning technique as describe in the part II.Scanning technique works by changing the pixel position only. The value of each pixel remain intact. In the second part the encrypted image obtained by the first part is again encrypted using Elgamel method as described in part IV. A. Encrytion Process Encryption process is summarized as- 1. Get the Original Image. 2. Encrypt the Image by applying SCAN method as describe in part II and generate the key1. 3. The encrypted image obtained after step 2 is again encrypted by applying ELgamel method as described in part IV and using key2. The whole process of encryption is shown in Figure 8 Figure 8 Encryption Process B. Decrytion Process Since in this method two key are used one for scanning based method of image encryption and 2946

another is for ELGamel method,therefore the security of this method gets enhanced manifold.in order to decrypt the image, person must know both the keys which is difficult in this algorithm. The decrytion process is summarized as - 1. Get the Encrypted image 2. Perform the Elgamel decryption operation using key2. 3. Perform the SCAN based decryption operation using key1 to get back the original image. The decryption process is shown in figure 9 VI. EXPERIMENTAL RESULT Proposed method is implemented in the computer having dual core processor and 2GB RAM.In order to evaluate the performance of proposed method, Mean square error has been computed for testing the distortion between original image and decrypted image. Execution time for this algorithm is also computed and tabulated in Table 1From the Table 1 and figure 10 it is clear that the proposed method is fast and produce no distortion in decrypted image and at the same it also give enhanced security because of using two different keys for decryption. Figure 9 Decryption Process 2947

TABLE 1:Execution time,mse Between Original and Decrypted Image Image Image size MSE between Original and Decrypted Image (For Lenna Image) Peppers.png 256x256 0.00 0.30 Peppers.png 512x512 0.00 0.35 Football.jpg 256x256 0.00 0.29 Football.jpg 512x512 0.00 0.33 Kids.jpg 256x256 0.00 0.30 Kids.jpg 512x512 0.00 0.34 Execution Time (in second) (c) (d) (c) (d) Figure 10 original image Image encrypted using SCAN method (c)image Encrypted using ELGmel method (d) Dcrypted Image 2948

References [1] J. Scharinger, Fast encryption of image data using chaotic Kolmogorov flows, Electronic Imaging, vol. 17, no.2, pp. 318-325, 1998. [2] N. Bourbakis, C. Alexopoulos, Picture data encryption using SCAN patterns, Pattern Recognition, vol. 25, no. 6, pp. 567-581, 1992. [3] C. Alexopoulos, N. Bourbakis, and N. Ioannou, Image encryption method using a class of fractals, Electronic Imaging, no. 4, pp. 251-259, 1995. [4] N. Bourbakis, Image data compression encryption using G-SCAN pattern, in proceedings of IEEE Conference on SMC, pp. 1117-1120, Orlando, Florida, USA, October 1997. [5] S. S. Maniccam, N. G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition, no. 37, pp. 725-737, 2004. [6] X. Li, Image compression and encryption using tree structure, Pattern Recognition, no. 18 no. 11, pp. 1253-1259, 1997. [7] T. Chuang, J. Lin, New approach to image encryption, Electronic Imaging, no. 4, pp. 350-356, 1998. [8] T. Chuang, J. Lin, A new multiresolutional approach to still image encryption, Pattern Recognition Image Anal, vol. 9, no. 3, pp. 431-436, 1999. [9] X. Wu, P. moo, Joint image/video compression and encryption via high order conditional entropy coding of wavelet coefficients, in Proceedings of IEEE InternationalConference. [10] William Stallings, Cryptography and Network Security, Pearson Education, 5th edition, 2011. [11] Trappe, Washington, Introduction to Cryptography with coding Theory, Pearson Education, 2nd edition, 2011. 2949