Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Similar documents
An Implementation of LSB Steganography Using DWT Technique

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Image Encryption Based on New One-Dimensional Chaotic Map

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Double Phase Image Encryption and Decryption Using Logistic Tent Map and Chaotic Logistic Map

A Fast Image Encryption Scheme based on Chaotic Standard Map

International Journal of Advance Research in Computer Science and Management Studies

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Concealing Data for Secure Transmission and Storage

Study of Perfect Shuffle for Image Scrambling

Analysis of Secure Text Embedding using Steganography

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Keywords Secret data, Host data, DWT, LSB substitution.

FPGA implementation of DWT for Audio Watermarking Application

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

NEW METHOD FOR USING CHAOTIC MAPS TO IMAGE ENCRYPTION

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

New binary image encryption algorithm based on combination of confusion and diffusion

A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Dynamic Collage Steganography on Images

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Image Encryption Algorithm based on Chaos Mapping and the Sequence Transformation

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

A Review on Image Encryption Technique and to Extract Feature from Image

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

Tampering Detection Algorithms: A Comparative Study

Mandeep Singh Associate Professor, Chandigarh University,Gharuan, Punjab, India

Image Encryption using Pseudo Random Number Generators

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

A New Compression Method for Encrypted Images

A Survey of Substantial Digital Image Watermarking Techniques

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

M.E(I.T) Student, I.T Department, L.D College Of Engineering, Ahmedabad, Gujarat, India

A Hybrid Image Encryption and Decryption Using Logistic Map & Block Based Encryption

Enhance Image using Dynamic Histogram and Data Hiding Technique

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Compendium of Reversible Data Hiding

FACE RECOGNITION USING NEURAL NETWORKS

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

Local prediction based reversible watermarking framework for digital videos

GNE College, Ludhiana, Punjab, India

A Secure Image Encryption Algorithm Based on Hill Cipher System

Keywords Medical scans, PSNR, MSE, wavelet, image compression.

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Ch. Bhanuprakash 2 2 Asistant Professor, Mallareddy Engineering College, Hyderabad, A.P, INDIA. R.Jawaharlal 3, B.Sreenivas 4 3,4 Assocate Professor

Interpolation of CFA Color Images with Hybrid Image Denoising

Image permutation scheme based on modified Logistic mapping

Robust watermarking based on DWT SVD

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES AN EFFICIENT METHOD FOR SECURED TRANSFER OF MEDICAL IMAGES M. Sharmila Kumari *1 & Sudarshana 2

Chaos Based Image Encryption using Expand-Shrink Concept

Watermarking patient data in encrypted medical images

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

Wavelet-based Image Splicing Forgery Detection

Commutative reversible data hiding and encryption

Color Image Compression using SPIHT Algorithm

Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold

Steganography using LSB bit Substitution for data hiding

Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Image Encryption by Redirection & Cyclical Shift

Meta-data based secret image sharing application for different sized biomedical

Journal of mathematics and computer science 11 (2014),

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Reversible Data Hiding Scheme Based on Prediction Difference

Block Wise Data Hiding with Auxilliary Matrix

Transform Domain Technique in Image Steganography for Hiding Secret Information

Image Compression Supported By Encryption Using Unitary Transform

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

An Enhanced Least Significant Bit Steganography Technique

Image Quality Estimation of Tree Based DWT Digital Watermarks

Improvement of Satellite Images Resolution Based On DT-CWT

Comments on An Image Encryption Scheme Based on Rotation Matrix Bit-Level Permutation and Block Diffusion

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Printed Document Watermarking Using Phase Modulation

A Copyright Information Embedding System

FPGA implementation of LSB Steganography method

Comparision of different Image Resolution Enhancement techniques using wavelet transform

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Design and Implementation of Game Based Security Model to Secure the Information Contents

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Chapter 4 MASK Encryption: Results with Image Analysis

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Lossless Image Watermarking for HDR Images Using Tone Mapping

Digital Image Sharing using Encryption Processes

Transcription:

Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy Based Color Image Encryption Based on Arnold Transform and Pixel Chaotic Shuffling Method Vineeta Singh *, Vipin Dubey Saroj Institute of Technology & Management, Lucknow, Uttar Pradesh, India Abstract Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. In this paper, we have proposed a novel hybrid Arnold transform scheme based on DWT on color images. In this scheme, we have provided entropy based double layer of security by utilizing the multi-resolution property of wavelet using Arnold transform and chaotic logistic mapping. Our scheme provides high security where the texture information is high. The color components are extracted and secured using proposed algorithm. The proposed scheme is tested on various test images and the obtained results show the effectiveness of the proposed scheme. Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. I. INTRODUCTION Nowadays, applications of digital imaging are prevalent and are still continuously and rapidly increasing today. Unlike text messages, image data have special features such as bulk data capacity, high redundancy, and high correlation among pixels, and usually are huge in size, which together make traditional encryption methods difficult to apply and slow to process. Since digital media such as image, audio, and video are easy to copy, edit and transfer, the emergence of powerful tools raises a series of problems. For example, one can easily process the copyright images and redistribute them. Thus, the content protection becomes an important problem. In general, there are two ways. One is watermark; the other is encryption. The watermark-based techniques embed an invisible signal into the media to form a watermarked version [1]. At the receiver s end, the integrity of media contents can be verified by authenticating the embedded signal [2]. For encryption algorithms, they usually convert the meaningful media into the meaningless media. In this work, we focus on image encryption. The chaotic confusion and pixel diffusion methods was proposed using a chaotic 2-D combined with alterations of Grey-Level values of each pixel in a sequential manner [3]. Repetitive rounds of permutations and changes were used to achieve higher security. It was experimentally verified that the amount of time overhead in performing complex calculations and the complex diffusion process had led to large time complexity of the system [4]. This paper proposes an image based encryption technique by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The paper has the following structure: section II is about related works, section III gives information on the proposed algorithm employed for the encryption process, section IV represents the results & discussion and section V concluded the paper. II. RELATED WORK A new cryptographic scheme proposed for securing color image based on visual cryptography scheme where a binary image was used as the key input to encrypt and decrypt a color image [5]. The secret color image which needs to be communicated was decomposed into three monochromatic images based on YCbCr color space. Then these monochromatic images were then converted into binary image, and finally the obtained binary images were encrypted using binary key image, called share-1, to obtain the binary cipher images. During their encryption process, exclusive OR operation was used between binary key image and three half-tones of secret color image separately [6]. These binary images were combined to obtain share-2. In the decryption process, the shares were decrypted, and then the recovered binary images were inversed half toned and combined to get secret color image [7]. With the exceptionally good properties in chaotic systems such as sensitivity to initial conditions and control parameters, chaos-based image encryption algorithms have been widely studied and developed in recent years [8]. Standard map is chaotic and it can be employed to shuffle the positions of image pixels to get a totally visual difference from the original images [9] [10]. Different from the conventional schemes based on Standard map, they disordered the 2015, IJARCSSE All Rights Reserved Page 888

pixel positions according to the orbits of the Standard map [11]. The proposed shuffling schemes didn t need to discretise the Standard map and own more cipher leys compared with the conventional shuffling scheme based on the discretised Standard map. The shuffling schemes were applied to encrypt image and disarray the host image in watermarking scheme to enhance the robustness against attacks [12]. Image Encryption Based on Explosive Inter Pixel Displacement of the RGB Attribute of a Pixel: In this method focus was more on the inter pixel displacement rather than just manipulation of pixel bits value and shifting of pixel completely from its position to new position. RGB value of pixel was untouched in this method, but R value of pixel jumps to another location horizontally and vertically same as in chaotic method [13]. In the similar manner, G and B values of pixel. With the proposed method in this paper, the shuffling of the image will be done by displacing the RGB pixels with their respective components. III. PROPOSED ARCHITECTURE OF IMAGE ENCRYPTION The following flow chart as shown in fig.1 is showing the overview for an image encryption where Arnold map and chaotic method are jointly used. 2-D Discrete Wavelet Transform is widely used transform in image processing. DWT is based on the concept of wavelets. It is localized both in frequency and time domain. This reveals spatial and frequency aspects simultaneously. It is used for analyzing an image at different resolutions into different frequency components. Wavelet transform is also used as edge preserving so that the original information of edges may not loose. For obtaining 2-D wavelet decomposition, 1-D DWT can be applied on image first in horizontal and then in vertical direction using different filters. 2-D DWT decomposes the image into two parts: Approximation and Detailed part. Approximation part contains one low frequency subband LL and detailed part contains three high frequency subbands LH, HL and HH. Algorithm: Step 1: Input color image and extract the color components, r as red, g as green and b as blue. Step 2: Apply discrete wavelet transform on each component obtain from step 1. Step 3: Store the detail part of each component for preserving structure. Step 4: Apply Arnold transform of each component based on entropy. a) Each component s Approximation part of Image is divided into n*n blocks. b) Each block of each component is shuffled row wise as well as column wise. c) Calculate Entropy (log energy) of each block of each component d) Calculate average Entropy from blocks of their respective components. log( X ) 2 LE = i i e) Compare Entropy of each block from average Entropy. If Entropy is less than average Entropy, Move to next step. Else do transpose of block and perform shuffling row wise and column wise. f) Arnold transform is applied to each shuffled block of each component. The Arnold transformation that change the coordinate (x, y) to the (x, y ) by using formula: Step 5: Perform concatenation of stored detail coefficients. Also, for encrypted red r, green g and blue b components. Step 6: Inverse wavelet transform is performed to reconstruct the image using encrypted approximation part and stored detail coefficients. Step 7: Over the reconstructed encrypted image, another layer of encryption is applied using entropy based pixel chaotic shuffle method so that the detail parts can also be encrypted. a) Outcome of step 6, Divided into number of large blocks. b) Select proper initial values and system parameters to create chaotic variable sets of each block. c) Prepare the chaotic sequences (according to sorting algorithm) of each block. d) Transfer MxN matrix as MNx1 of each block. e) Perform the shuffle function on each pixels of matrix of each block. f) Calculate Entropy (log energy) of each block and also calculate average entropy. g) Compare Entropy of each block from average Entropy. If Entropy is less than average Entropy, Move to next step. Else do transpose of block and perform shuffling again. From all above process, an encrypted image is received. For decryption, put the same sequences of shuffling and sorting. In the above proposed algorithm, the two layer encryption is used. First layer is structure preserving encryption and second layer is provided secured structure using pixel chaotic shuffle method. Entropy gives the average amount of information. Where entropy is high, that block is more secured in both layers. 2015, IJARCSSE All Rights Reserved Page 889

Input color Image Red component r Green component g Blue component LL1 DWT HL1; LH1; HH1 Approximation part Detail Part Block wise entropy based encryption using Arnold transform Store for Encryption IDWT Apply Entropy based Pixel- Chaotic-Shuffle Method Encrypted Image Figure 1: Proposed Architecture of image encryption IV. RESULTS OF EXPERIMENT AND ANALYSIS The experimental evaluation is performed on images with size 256x256 using proposed method. Apart from the security consideration, running speed of the algorithm is also an important aspect for a good encryption algorithm. Results are shown in fig 2, fig 3, fig 4 and fig 5. Original images are fig 2(a), fig 3(a), fig 4(a) and fig 5(a). Encrypted images are fig 2(b), fig 3(b), fig 4(b) and fig 5(b) and Decrypted images are 2(c), fig 3(c), fig 4(c) and fig 5(c). Figure 2: (a) Original image: Lena (b) Encrypted image and (c) Decrypted image Figure 3: (a) Original image: Chrysanthemum (b) Encrypted image and (c) Decrypted image 2015, IJARCSSE All Rights Reserved Page 890

Figure 4: (a) Original image: Desert (b) Encrypted image and (c) Decrypted image Figure 5: (a) Original image: Penguins (b) Encrypted image and (c) Decrypted image The images used will have their RGB colors extracted and their RGB values transposed and shuffled to obtain ciphered images. The ciphering of the images for this research will be done by using the RBG pixel values of the images only. In this method, there were no changes of the bit values of the images used and there was no pixel expansion at the end of the encryption and the decryption process. The numerical values of the pixels were displaced from their respective positions and the RGB values were interchanged with respective components to obtain the ciphered images. This implies that, the total change in the sum of all values in the image is zero. The images were looked at as a decomposed version in which the three principle component which forms the image was chosen to act upon by the algorithm. The RGB components were considered as the triplet that forms the characteristics of a pixel. The pixel is the smallest element of an image that can be isolated and still contains the characteristic found in the image. The RGB values were shifted out of their native pixel positions and interchanged within the image boundaries. The Shift displacement of the R G and B Values known as the component displacement factor array was different for the R, G and B. Mean error for original and decrypted images are calculated and given in Table 1. Table 1: Mean error Input Images Mean error Phantom 0.0312 Lena 0.0981 cameraman 0.0109 Penguins 0.0320 From table 1, we can analyse that the value of mean error is very less, near to zero. It means our decrypted image is almost same as original image. V. CONCLUSIONS This paper gives a new image scrambling algorithm, by using image scrambling to encrypt the image to improve the security of image. The transposition and reshuffling of the RGB values of the image in steps has proven to be really effective in terms of the security analysis. The encryption of R G B components has increased the security of the image against all possible attacks available currently. Entropy based encryption using Arnold and pixel chaotic shuffling increases the level of security. Computed Mean error indicates that decrypted image is almost same as original image. By using multi-region scrambling, it can more effectively improve the security of image, lead decipher even more difficult. It simulates scrambling under Matlab 7.1 to confirm it. Apart from the security consideration, running speed of the algorithm is also an important aspect for a good encryption algorithm. REFERENCES [1] X. He, Q. Zhu, and P. Gu, A new chaos-based encryption using chaotic logistic map, Image and Vision Computing, vol. 24, no. 9, pp. 926-934, 2006. [2] C. Li and G. Chen, On the security of a class of image encryption schemes, Proceedings of the IEEE International Symposium on Circuits and Systems, 2008. 2015, IJARCSSE All Rights Reserved Page 891

[3] S. Li, C. Li, G. Chen, and X. Mou, Cryptanalysis of the RCES/RSES image encryption scheme, available online at http://eprint.iacr.org/2004/376 on 15 Oct. 2008. [4] Jui-Cheng Yen, Jiun-In Guo, A new chaotic image encryption algorithm Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China. [5] M. A. Bani Younes and Aman Jantan, Image Encryption Using Block-Based Transformation Algorithm IAENG, 35:1, IJCS_35_1_03, February 2008. [6] Ismet Ozturk and Abrahim Sogukpinar, Analysis and Comparison of Image Encryption Algorithms, World Academy of Science, Engineering and Technology 3 2005. [7] K.C. Ravishankar, M.G. Venkateshmurthy Region Based Selective Image Encryption 1-424-0220-4/06 2006 IEEE. [8] W.Stallings,Cryptography and network security:principles and Practice.Prentice hall,2010,vol.998. [9] R. Venkatesan, S.-M. Koon, M. H. Jakubowski, and P. Moulin, Robust image hashing, In: Proc. of ICIP '00, pp.664 666, 2000. [10] Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust image hashing for tamper detection using nonnegative matrix factorization, Journal of Ubiquitous Convergence and Technology, vol.2, no.1, pp.18 26, 2008. [11] J. Fridrich, Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1998. [12] Z. Tang, X. Lu, W. Wei, and S. Wang, Image scrambling based on bit shuffling of pixels, Journal of Optoelectronics Laser, vol.18, no.12, pp.1486 1488, 1495, 2007. [13] D. V. D. Ville, W. Philips, R. V. de Walle, and I. Lemanhieu, Image scrambling without bandwidth expansion, IEEE Trans. Circuits Syst. Video Technol., vol.14, no.6, pp.892 897, 2004. 2015, IJARCSSE All Rights Reserved Page 892