Abstract: Brobdingnagian may be the precise word for the usage of internet and advanced expertise in the globe in our day. Indeed, all sorts of this online communication go hand in hand with the so called major apprehension, information security. Since all kinds of digital files play an imperative role in internet operation, it is indispensable to defend the key features of private communication namely, seclusion, uprightness and legitimacy. This threat, in a roundabout way, has led to the breakthrough of information security rationales. Striking among these are Cryptography and Steganography, primordial skills pursued for the sake of secret sharing. The startling thing is that with the fruition of technology, these are giving prolific outcomes even now. Cryptography possesses such a litheness that its blend, in the company of other fields of study, facilitates offer much more options to explore security issues. This study envisions an inimitable approach to security in the context of encryption and embedding incorporating shuffling, chaotic equations in conjunction with Blowfish encryption algorithm. Here, encryption is performed on images followed by embedding secret data. The latter is done not literally but indirectly. This pitch endows with randomness and security with all the persuasive traits of encryption. Validation is given in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Relative Entropy (RE), entropy and correlation values. Experimental results are illustrated to vindicate the performance of this objective.
INTRODUCTION
Riotous development in network communication and image processing lately has vastly increased handling of digital images online. Images, along with other digital files, have become an inherent part of computer communication which necessitate premier defense. It is said that they form the building block of various analyses in myriad domains, making most of them for secret sharing is definitely not unforeseen. They, at the present time, are of immense assistance in divvying off the record information.
To carry out the above and to make it a possibility, assortments of researches are being done with Cryptography as the lineage. Cryptography is an antique technique to share and communicate the hush-hush information without the knowledge and suspicion of others. It does not elision itself from updating itself with the help of up-to-the-minute know-how. Besides, it has extended horizons in some distinguished disciplines of study for instance mathematics, image processing, information and network security, computer science and so forth. Mentioned the key features of Cryptography, it is also noteworthy to mention the other approaches to defend the classified information (Praveenkumar et al., 2014a-n, 2013a-d, 2012a, b), such as image Steganography (Celik et al., 2005; Chang et al., 2008; Amirtharajan and Rayappan, 2012a-c, 2013; Amirtharajan et al., 2013a-j; Ni et al., 2006) and watermarking. While, the former focuses on masking the surreptitious message belonging to any digital medium within spatial or transform domain co-efficient (Ramalingam et al., 2014a, b; Rajagopalan et al., 2014a-d; Thanikaiselvan et al., 2012a-c, 2013a, b), the latter aims at copyright fortification and endorsement.
Encryption, by and large, is intended to indemnify stability as a result of enigmatically taking the full advantage of likelihood of conceding that furtive message is strictly enciphered (Encinas and Dominguez, 2006). As the so called encrypted messages or images do not give even a single inkling, this domain has caught the attention of many. Encrypted image differ from the plain image owing to elevated redundancy and bulk (data) capacity. Added gain in encryption is the fact that it supports allsorts of digital files not particularly images. As a consequence, image encryption has got what it takes to proffer premeditated threats at the same time as upholding slapdash pact on count (Cheddad et al., 2010).
On account of custom, call for real-time inviolable transmission has been tremendously amplified for which loads of encryption plots are advised. To cite some unsurpassed examples, there are cryptosystems offering enhanced security via chaotic algorithms, promising authenticity with the help of hash-based encryption schemes (Norouzi et al., 2014; Seyedzade et al., 2010) myriad pixel-based techniques, hit and miss grid-based procedures, fast image encryption practices to decrease the computational time etc.
Of these, chaos based principles are evidence for a few remarkably sought-after properties in different grounds like security, efficiency, intricacy, viability etc. (Alvarez et al., 1999, 2000; Wei et al., 2012; Tong et al., 2009; Wang et al., 2011; Yen and Guo, 2000; Zhu, 2012). There already have been projected, for instance, Line map, DES etc., but having a drawback of their incongruity to practical encryption because of images inherent features. One more concern in image encryption conniving is the algorithms processing speed since it is quite hard for customary ones to promptly baffle and strew large magnitude of (image) data.
Chaos, a cogitation of non-linear dynamic system, pertains to fickleness whose underlying principle is to hobble the pixel positions in an image (Zhu, 2012; Kumar and Ghose, 2011; Li and Zheng, 2002; Belkhouche and Qidwai, 2003; Borujeni and Eshghi, 2013; Chen et al., 2004). It is of great help to image encryption since it is highly arbitrary, non-periodic and turbulent. Chaotic image encryption generally exercises pixel confusion and diffusion. Its ultimate motto is to perform image encryption through pixel (value) shuffling followed by grey scale value altering (Huang et al., 2013; Huang and Nien, 2009; Zhang and Liu, 2011). At the moment, chaotic schemes are used far and wide, thanks to their acute compassion even to petite changes. They promise speed, safe and sound encryption modes. In this study, a detailed discussion is done on the amalgamation of shuffling, chaotic perception, encryption and embedding. Blowfish, in general, (symmetric) block cipher works on an erratic length key. It is very fast, compact and simple as it is very undemanding, it is defiant to implementation blunders. Above it is a most secure routine than the rest. It is more suitable and competent for hardware implementation. Less memory space is an added advantage of Blowfish. Image quality metrics are used to support encryption schemes (Mayache et al., 1998; Wang and Bovik, 2002).
To achieve the same, there are different maps namely Arnolds cat, Ginger breadman, Henon, Polynomia and Zaslavskii, etc. Arnolds cat map, a discrete system, widens and folds its trails in phase space and is a chaotic map from torus onto itself. Ginger Bread Man is a type of 2D piecewise linear algorithm. Being a discrete-time dynamical system, it was originally established as simplified model of the Poincaré section. Among the most recognized form of complex dynamic families, the quadratic polynomials are the most recognized ones. The Zaslavskii Map, introduced in 1978, is unpredictable by its spread spectrum characteristic.
A detailed study is done on existing methods and this plot differs significantly from the rest as it aims at an image encryption model by means of seven methods. Validation is given by the widely accepted image metrics and comparison of this study with the previous ones implies that the former is found better.
MATERIALS AND METHODS
Algorithms used in the proposed methodology
Blowfish encryption: Blowfish, a symmetric block cipher, works on
varying key length usually from 32-448 bits to encrypt data of a 64 bit block.
Bruce Schneier designed this Blowfish algorithm in 1993 which is permit-free
and non-proprietary. It entails Feistel network consisting 16 rounds to encrypt
data. The XOR gates and modular addition are employed to carry out operation
lookup table as they minimizes the computing time. Moreover, this is applicable
to an involuntary file encrypted and communication links. Blowfish is a faster
mean for encryption than the rest but is very hard to apply to a cryptanalytic
method.
Blowfish algorithm for image encryption:
• | Partition Y in to two 32 bit halves as YL and YR |
• | For j = 1-16, carryout the following sequences: |
• | Switch YL and YR and carry out the following sequences: |
• | Combine YL and YR |
• | Partition YL into four eight-bit quarters namely 1, 2, 3, and 4 and carryout the following sequences: |
|
Decryption algorithm: Decryption algorithm is almost same as that of encryption with the exception of P-array values get reversed. Here, cipher texts first leftmost 32 bits are XORed with P18. Contrarily, this is performed in the encryption process with P1. Decryption method takes place for 16 rounds.
Chaotic process: Chaos, a dynamic system, depends greatly on initial stipulations which are impulsive and arbitrary. It encrypts images through pixel values shuffling and grey values altering to form ciphered images. It is done so using the following equation:
|
where, x, y is pixel location, X and Y represent row and column, respectively. The transformation function maps (X, y) is fresh location.
Chaotic algorithm:
• | Generate random values ranging from 0-255 |
• | XOR these values with that of the image pixels by the forthcoming equation: |
• | This changes the grey scale entities. These equations generate recursive random numbers and user is free to give the key that sets the initial values |
Hennon shuffling: Henon shuffling, a discrete-time dynamic system, is Poincare sections abridged model which is expressed by:
It, in turn, is given by:
where, (x, y) is pixel location, X is row, y is column of the pixel. The transformation function maps (X, y) to a different location.
Shuffling algorithm: Change the pixel location through the transformation function:
This is repeated till all pixels get mapped to their corresponding new location. Poincare Recurrence Theorem defines that after a long period of time, some systems will come back to state close to that of the original. To a maximum, image can be shuffled 3r times since at this stage, original image is obtained.
In the methodology, image gets shuffled for 3r times and the moment, at which maximum horizontal and vertical correlation values arrive, offers the original image. In method 2, pixel intensity is swapped by the total shuffling iterations which is helpful in de-shuffling the image.
Data embedding: The histogram of the encrypted image is uniform and the ASCII values of the message, to be embedded, uses 8 bits. These two facts are keys to this method. The ASCII value of the each character of the message is searched for the matching gray scale value in the encrypted image, which is the cover image. Suppose, if the ASCII value is 98, all the rows and columns with gray scale value 98 are stored in two different arrays. Using randperm function or any user defined function, one can select a pair of row and column values corresponding to grayscale value 98. The process is repeated for the next three characters. All the 4 rows and 4 columns which constitute 64 bits are formed into a block and encrypted using blowfish algorithm and a secret key.
If the message has more than four characters, key expansion is done and the cipher of the first four characters serves as input to the encryption of the next four characters. The procedure is repeated till all characters are completed. In case the number of characters is not a multiple of four, some dummy values are used to make it a multiple of 4. The resulting cipher is sent to the mail of the person intended to receive message. Since, no bit is changed in the encrypted cover image, its decryption would give the exact original image. To extract the message, the receiver must decipher the cipher sent to his mail using the shared secret key. To further improve security, the message to be embedded can be encrypted. For the same message if one repeats the entire procedure, he or she wont get the same cipher to be sent to the mail as the previously sent one i.e., same message gives different ciphers each time as the row and column number are randomly selected.
Fig. 1: | Proposed methodology |
Encryption and shuffling: In this methodology, image gets primarily shuffled by means of Hennon subsequently to chaos after which gets shuffled using Hennon once again. It is then lastly encrypted through Blowfish algorithm with the key value (cxdsew4rtrtjh, 0.675, 0.9324).
The data is embedded into the encrypted image; here encryption and data hiding are separable. Separate keys are used for data hiding and encryption as shown in Fig. 1. Thus, data hiding key only retrieves the embedded data whereas the encryption only recovers the secret.
RESULTS AND DISCUSSION
An ideal encryption routine should put up with its antagonism to Cryptanalysis attack. Different from the rest of conventional encryption methods, the essentials of digital encryption are unalike. For experimental analysis, Lena image of dimension 256x256 are taken. The shuffling and encryption algorithms are simulated in MATLAB 7.1.
Histogram tests: Original test images, their encrypted images along with their corresponding histograms are depicted in Fig. 2a-h, respectively. As it is clear from the figures, histograms of the original images exhibit some pattern. But, encrypted images histograms show no sign of such pattern but homogenous variation. It is undoubtedly dreadful to crack this routine. This study produces absolutely distinct histograms of plain and encrypted images which is very essential for any image encryption routine. By observing the same, one cannot come to a conclusion about what is being hidden in images.
Correlation of pixels: In plain images, there exists a strong relationship between pixels as there is high correlation. Correlation is a principal measure of performance of image encryption methods. All three horizontal, vertical and diagonal correlation values are computed for pixel pairs in all plain and encrypted images and the values are tabulated. In general, if it is 1, then there is high correlation among pixels, on the other hand if it is 0, then it signifies the fact that there is only obscurity and randomness among the pixels. Therefore, this study produces more than convincing results for correlation study as plain images have high correlation and encrypted upshots offer negligible correlation. The correlation coefficient is given by following:
where, σi, σj are i and js standard deviations accordingly and cov (i, j) is Covariance of i and j.
Covariance is expressed as following equation:
where, μi and μj are i and js mean, respectively.
Fig. 2(a-h): | (a-f) Original Lena image and its various
encrypted and decrypted images, (g) Histogram of original Lena image and
(h) Histogram after final encryption |
Table 1: | Comparison of metrics of the proposed scheme with the available literature |
Comparison of the proposed study and the existing method in references is given in Table 1. From the Table 1, it is clear that the method depict outstanding analytical results. If we take the horizontal correlation entries, the proposed methodology gives a very minimal value than the rest of the methods and is a remarkable measure of excellence. Not only horizontal but the corresponding vertical and diagonal correlation values also are very much minimized. When compared with referred existing methods, the proposed study offers greater than ever MSE of 9096.70 and lower than ever PSNR of 8.5420 promising a highly efficient technique for image encryption.
Differential attack: This measure is to reckon the algorithms security. This is carried out by studying one-pixel-change in plain image and observing the successive resultant image. If this study shows any changes, then the attack is rendered useless. Two major constraints of differential attack are Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) which are given by following equation:
Image metrics: To justify this study, BER and PSNR values for the images are calculated and tabulated. Larger than ever MSE implies that the error in images is high and it declines the content in them. This, indeed, lowers the PSNR which is a quality measure for an image. This method offers most ergodic results to be analyzed which makes deliberate third party attacks frightful. The PSNR is computed by following equation:
Generally, MSSIM ranges in the interval [0, 1]. If it is close to 0, then there is no resemblance between images else if it is 1, the images have a striking resemblance. This study produces MSSIM of 0.0054 for method 1 which is almost equal to 0 signifying nil relationship between the pixel pairs thereby in images. This means, only slight error is witnessed by this routine which is for sure permissible and tolerable:
where, C1 = (K1L)2 L = 255
where, μO is the estimate of cover images mean intensity (N = 255), σ0 is the standard deviation:
where, σOS is correlation coefficient.
BER is a validation criterion which speaks about the error produced in this procedure. For this proposal, BER is approximately 0.5. It assures that almost 50% error rate, thereby declaring the encrypted output, is highly stochastic.
Other metrics for the proposed methodology are given as follows:
No. of errors | = | 262216 |
Relative entropy | = | 0.4271 |
SNR | = | 2.8339 |
Bit_error_rate | = | 0.5001 |
NPCR | = | 99.6292 |
Quality | = | 0.7654 |
MSSIM | = | 0.0054 |
UACI | = | 30.6905 |
The original Lena image and its various encrypted and decrypted images are given in Fig. 2a-f, respectively. The histogram of the original image and the histogram of the final encrypted image are given in Fig. 2g and h, respectively.
Figure 3a, 4a and 5a, respectively represents the horizontal, vertical and the diagonal pixel distribution of the original Lena image. From the figures, the pixel distribution are concentrated on a single area and was not uniformly distributed. Figure 3b, 4b and 5b represents the horizontal, vertical and the diagonal pixel distribution of the encrypted Lena image. From the figures, it is clear that, pixels are uniformly distributed after encryption.
Figure 6a represents the original Lena image and Fig. 6b represents the encrypted Lena image using the correct key and Fig. 6c represents the decrypted Lena using the correct key and Fig. 6d represents the decrypted image using the wrong key. From the results, it is clear the proposed algorithm was very sensitive to the key used even if a single bit change in the key value results in a totally unidentified image.
Fig. 3(a-b) | : Horizontal distribution of the pixels of (a) Original Lena image and (b) Encrypted image |
Fig. 4(a-b): | Vertical distribution of the pixels of the (a) Original Lena image and (b) Encrypted image |
Fig. 5(a-b): | Diagonal distribution of the pixels of the (a) Original Lena image and (b) Encrypted image |
Fig. 6(a-d): | (a) Original Lena image (b) Encrypted image of (a), (c) Decrypted image using the correct key and (d) Decrypted image using the wrong key |
CONCLUSION
This study pioneers a peerless image encryption sculpt taking nonlinear dynamic system and Blowfish as elementary elements. The proposed schemes make use of the chaos maps for image encryption results in randomness. Blowfish cannot be broken until an attacker tries 28r+1 combinations where r indicates the number of rounds utilized. Hence, if the number of rounds are been increased then the Blowfish algorithm becomes stronger. Also combined with Chaotic, it provides a better and more secure encryption pattern. Correlation values are almost close to zero and entropy achieves value 8, both resemble the ideal values which forms the prime aspects of this study. On the whole, this encryption model promises security, effectiveness and robustness. Thereby it appreciably augments the confrontation to statistical and differential attacks. Analytical results justify that the algorithm is highly secure and practical.