HOME JOURNALS CONTACT

Research Journal of Information Technology

Year: 2014 | Volume: 6 | Issue: 4 | Page No.: 368-378
DOI: 10.17311/rjit.2014.368.378
Image Encryption
Padmapriya Praveenkumar, R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and Rengarajan Amirtharajan

Abstract: This study focuses on image shuffling where the image is segmentd into four and then to each segment, various shuffling algorithms are applied and iterated until the vertical, horizontal and diagonal correlation values are minimum. Then to the shuffled segment, Cipher Block Chaining (CBC) algorithm is applied. Then the same procedure is applied for all the four segments and then combined again to form the original shuffled image. To authenticate the proposed method, correlation values, Number of Pixels Changing Rate (NPCR) and the Unified Averaged Changing Intensity (UACI) histogram analysis are computed to validate the sterness of the proposed algorithm and compared with the available literature.

Fulltext PDF Fulltext HTML

How to cite this article
Padmapriya Praveenkumar, R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and Rengarajan Amirtharajan, 2014. Image Encryption. Research Journal of Information Technology, 6: 368-378.

Keywords: UACI, shuffling, image encryption, segmenting, Information security, correlation values and UACI

INTRODUCTION

The modern era digital communication bloomed with the evolution of internet. As it is nothing but the interconnection of computer networks globally, it employs state-of-the-art modern day optical and wireless technologies. This has paved the way for extensive researches in the field of information security to mainly detect and correct datum sabotage. The first and foremost functions of information security are information protection, control access and administer users. Some threats for the aforementioned include attacks erudition, rapid exposure to weaknesses, disseminated attacks and intricacies of patching. Information security makes certain the veracity, discretion, ease of use and off the record facts. Information security could be classified as Steganography (Amirtharajan and Rayappan, 2012a, b, 2013; Amirtharajan et al., 2013a-d; Ramalingam et al., 2014; Janakiraman et al., 2012; Rajagopalan et al., 2012; Thanikaiselvan et al., 2012, 2013), Watermarking (Amirtharajan and Rayappan, 2013), Spread Spectrum (Praveenkumar et al., 2012a-c, 2014a-j) and Encryption (Amin et al., 2010; Alvarez et al., 1999, 2000; Chen et al., 2004).

The main goal here is to cater to the quandaries in the administrative, technical and physical fields in secure applications. Sivaranjani and Bright Prabahar (2013) has proposed an Image encryption algorithm that implements a random permutation, rotation operation and cipher block chaining. The scrambling operation is performed in horizontal, vertical and diagonal directions based on the RGB planes. Naik and Pal (2013) has proposed a two stage image Encryption employing Arnold’s cat map shuffling in the first phase and diffusion on selected bit planes in the latter. Fu et al. (2013) have brought in the concept of a novel chaotic symmetric image encryption with permutation diffusion architecture. Pixel shuffling here is done based on chaotic henon map. Panduranga et al. (2013) proposed a partial image encryption based on block based image shuffling where pixel positions within the block are permuted with the help of chaotic maps.

Image encryption by image diffusion through pixel shuffling and bitplane separation operations performed prior to XOR operation was proposed by Maksuanpan et al. (2013) and Li-Hong et al. (2013), presented a hyper-chaos and the logistic chaotic encryption algorithm, where the chaotic sequences are used to modify the generated key. Sun et al. (2012) proposes a encryption methodology in which the original gray scale image is been separated into several bit planes, is shuffled using a random shuffling method and merged to obtain a single encrypted image.

Krishnamoorthy and Murali (2012) proposed an image encryption which employs the matrix inversion and Arnald cat shuffling. Matondo and Qi (2012) proposed a qi hyper chaotic system where two level image encryption scheme which involves Discrete Cosine Transform Coefficients. The selective coefficients are encrypted in frequency domain and for the second level shuffling is done in the spatial domain.

Feng-Ying et al. (2012) proposed chaotic logistic map which is used for pixel shuffling and medical image encryption using the combination of Logistic and chebyshev maps was proposed by Dai and Wang (2012). Encryption based on piece wise linear chaotic map used in nested fashion was presented by Abdlrudha and Nasir (2011) that involves the shuffling of the grey and colour levels. Masmoudi et al. (2012) introduced an encryption that combines the usage of chaotic maps with larger key space and Engle Continuous Fractions map.

Shahram and Mohammad Eshghi have brought in with the combination of chaotic maps and Tompkins-Paige algorithm based on permutation-substitution to provide image encryption. Tompkins- Paige algorithm and logistic maps are used to generate a bit sequence and pseudorandom numbers under 2D permutation. Loukhaoukha et al. (2012) have proposed Rubiks cube encryption in which the encrypted rows and columns are Xored using secret keys. Adrian-Viorel Diaconu1 and Khaled Loukhaoukha analysed a cryptosystem making use of chaotic cipher with Rubik’s cube are used to shuffle and scramble to provide confusion and diffusion in image encryption.

Borujeni and Eshghi (2007) proposed a VHDL implementation of encrypted system using PRNG and tompkins paige algorithm and quantum logistic map by Akhshani et al. (2012). Rakesh et al. (2012) proposed a block based scrambling and logistic mapping to provide encrypted crypto system. Loukhaoukha et al. (2012) introduced rubick’s cube principle with chaotic cipher to provide image encryption. Zhang et al. (2012) introduced image encryption utilizing the properties of DNA operation. Bahrami and Naderi (2012) utilised encryption based on light weight crypto algorithm. Patidar et al. (2010) presented a chaotic standard map to provide permutation-substitution with initial conditions, iterations, number of rounds and the parameters to the map that acts as a key of the algorithm.

After reviewing the available literature this study focuses on image encryption that was based on segmenting, shuffling and CBC encryption algorithm.

METHODOLOGY

The proposed scrambling ensures segmentation, shuffling and Cipher Block Chaining (CBC) needs a specific key or algorithm to stipulate the scrambling of the secret as shown in Fig. 1.

Proposed encryption algorithm: The proposed model was shown in Fig. 1 by considering the Lena image of 256x256:

Fig. 1:Proposed model

Step 1: Consider a Lena image I of size 256x256 in 8 bit format whose intensity value varies from 0-255. Initially Partition the input image I (i, j) of size 256x256 into four equal segments of size 128x128 using:

Im1 = I (1: (c/2), 1: (r/2))

Im2 = I (1: (c/2), ((r/2)+1): r)

Im3 = I (((c/2)+1): c, 1: (r/2))

Im4 = I (((c/2)+1): c, ((r/2)+1): r)

where, r and c represents the row and column of the original image.

Step 2: Then the partioned segments are shuffled using shuffling algorithms

For shuffling segments 1 and 3 do the following operations for 26 and 91 times, respectively:

n1 = [ (x+5y3) mod r]+1

n2 = [ (y+2 ((x3+10y) mod c) ) mod c]+1

new_seg (x,y) = orig_seg (n1, n2)

Where:

x, y = Rows and columns of new shuffled segment
n1, n2 = Rows and columns of original segment
r, c = No. of rows and columns

For shuffling segment 2 do the following operations for 6 times:

n1 = [ (1+y+x2) mod r]+1

n2 = [ 3x mod c]+1

new_seg (x, y) = orig_seg (n1, n2)

For shuffling segment 4 do the following operations for 88 times:

n1 = [ (2x+y) mod r]+1

n2 = [ (x+y) mod c ]+1

new_seg (x,y) = orig_seg (n1, n2)

Step 3: After shuffling all the four new segmented images, group them to form a single encrypted image IMENC of size 256x256 and convert it into an unsigned 8 bit integer
Step 4: Then CBC is applied to the segmented shuffled image to get the final encrypted output

Decryption can be obtained by reversing the above mentioned steps.

RESULTS AND DISCUSSION

The proposed methodolgy was carried out using MATLAB 7.1 considering LENA image of size 256x256 in 8 bit format whose intensity value varies from 0-255 as in Fig. 2a. Initially the image is segmented into four parts as in Fig. 2b. Then to each segment of size 128x128, different shuffling algorithms like Arnold, Henon and Polynomial are applied. The shuffled segmented images are given in Fig. 2c-f, respectively.

The segments are shuffled until the least correlation value for the particular segment is obtained. The correlation may be horizontal (HC), vertical (VC), diagonal (DC) or minimum sum of horizontal+vertical+diagonal.

In this method images are shuffled using shuffling algorithms but no encryption is applied. The number of iterations and the correlation values for various images are tabulated in Table 1.

Original Baboon image was given in Fig. 3a and the segmented image was given in Fig. 3b. Original camera man image was given in Fig. 3c and the segmented image was given in Fig. 3d. Original Lena image was given in Fig. 3e and the segmented image was given in Fig. 3f. Original Peppers image was given in Fig. 3g and the segmented image was given in Fig. 3h.

Table 2 provides the metrices of the encrypted Lena image. Figure 4a provides the Lena image after performing segmenting and shuffling.

Fig. 2(a-f): LENA image (a) Orignal image, (b) Segmented image, (c) Segment 1 (d) Segment 2, (e) Segment 3 and (f) Segment 4 after shuffling

Fig. 3(a-h): (a, c, e, g) Orignal and (b, d, f, h) Segmented and shuffled Baboon, Cameramon, Lena and Pepper images

From the table, correlation values are nearing zero and is compared with the available literature (Borujeni and Eshghi, 2009; Diaconu and Loukhaoukha, 2013; Loukhaoukha et al., 2012; Zhang et al., 2012; Bahrami and Naderi, 2012).

Table 1: Shuffling algorithms with correlation values for each segment of the images

Table 2: Metrices of the proposed scheme with the available literature

NPCR and UACI values are 99.6 and 30 of the encrypted image are found to better than (Borujeni and Eshghi, 2009; Diaconu and Loukhaoukha, 2013; Loukhaoukha et al., 2012; Zhang et al., 2012; Bahrami and Naderi, 2012). Figure 4b provides the histogram of Fig. 4a, since no encryption was performed it resembles the original image histogram. Figure 4c provides the final encrypted Lena image after CBC and Fig. 4d provides the histogram of Fig. 4c. From the histogram after encryption, it is revealed that the encryption is uniform.

Correlation analysis: Correlation analysis has to be very minimum for a better cryptic image. The correlation co-efficient is computed as:

where, a and b represents the adjacent pixels of the shuffled image. The value of Φ can be calculated as:


Fig. 4(a-d): Segmented and shuffled Lena image, (b) Histogram of 4(a), (c) Encrypted after CBC and (d) Histogram of 4c


where, S denotes the pixel pairs, From Table 1, its infered that the correlation values are nearing zero indicates that there exists no correlation between the original and the shuffled image.

NPCR and UACI: NPCR and UACI are the metrices to assess the strength of the proposed encryption algorithms. They are intended to evaluate the number of pixel change rate and the number of average intensity between the original and the encrypted ciphered image. Higher the values of NPCR and UACI indicate high resistance to differential and stsatistical attacks. Original and the encrypted image are represented as Op and E, respectively.

NPCR can be calculated as:

UACI can be calculated as:

where, n represents the number that represents the image. The a, b represents the rows and columns of the image, B (a, b) represents the array having the same size as Op and E.

CONCLUSION

In this study, image shuffling adopting three shuffling algorithms followed by segmenting and CBC mode of operation to provide the final encrypted output. The computed horizontal, vertical and diagonal correlation values reveals that there exists no correlation between the original and the shuffled image. NPCR and UACI values of 99.6 and 30.54 reveals that the proposed encryption algorithm resists differential and statistical attacks.

REFERENCES

  • Abdlrudha, H.H. and Q. Nasir, 2011. Low complexity high security image encryption based on nested PWLCM chaotic map. Proceedings of the International Conference for Internet Technology and Secured Transactions, December 11-14, 2011, Abu Dhabi, pp: 220-225.


  • Diaconu, A.V. and K. Loukhaoukha, 2013. An improved secure image encryption algorithm based on Rubik's cube principle and digital chaotic cipher. Math. Prob. Eng.
    CrossRef    


  • Akhshani, A., A. Akhavan, S.C. Lim and Z. Hassan, 2012. An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul., 17: 4653-4661.
    CrossRef    Direct Link    


  • Amin, M., O.S. Faragallah and A.A. Abd El-Latif, 2010. A chaotic block cipher algorithm for image cryptosystems. Commun. Nonlinear Sci. Numer. Simul., 15: 3484-3497.
    CrossRef    Direct Link    


  • Alvarez, E., A. Fernandez, P. Garcia, J. Jimenez and A. Marcano, 1999. New approach to chaotic encryption. Phys. Lett. A, 263: 373-375.
    CrossRef    Direct Link    


  • Alvarez, G., F. Montoya, M. Romera and G. Pastor, 2000. Cryptanalysis of a chaotic encryption system. Phys. Lett. A, 276: 191-196.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
    CrossRef    Direct Link    


  • Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316.
    CrossRef    Direct Link    


  • Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
    CrossRef    Direct Link    


  • Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351.
    CrossRef    Direct Link    


  • Amirtharajan, R., S. Sulthana and J.B.B. Rayappan, 2013. Seeing and believing is a threat: A visual cryptography schemes. Res. J. Inform. Technol., 5: 435-441.
    CrossRef    Direct Link    


  • Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. Stego on FPGA: An IWT approach. Sci. World J.
    CrossRef    


  • Borujeni, S.E. and M. Eshghi, 2007. Design and simulation of encryption system based on PRNG and Tompkins-Paige permutation algorithm using VHDL. Proceedings of the International Conference on Robotics, Vision, Information and Signal Processing, November 28-30, 2007, Penang, Malaysia, pp: 63-67.


  • Chen, G., Y. Mao and C.K. Chui, 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals, 21: 749-761.
    CrossRef    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRef    Direct Link    


  • Fu, C., G.Y. Zhao, M. Gao and H.F. Ma, 2013. A chaotic symmetric image cipher using a pixel-swapping based permutation. Proceedings of the IEEE Region 10 Conference, October 22-25, 2013, Xi'an, China, pp: 1-6.


  • Loukhaoukha, K., J.Y. Chouinard and A. Berdai, 2012. A secure image encryption algorithm based on Rubik's cube principle. J. Electr. Comput. Eng.
    CrossRef    


  • Krishnamoorthy, R. and P. Murali, 2012. Symmetric image encryption scheme based on multiple chaotic maps. Proceedings of the International Conference on Emerging Trends in Science, Engineering and Technology, December 13-14, 2012, Tiruchirappalli, Tamilnadu, India, pp: 280-286.


  • Li-Hong, L., B. Feng-Ming and H. Xue-Hui, 2013. New image encryption algorithm based on logistic map and hyper-chaos. Proceedings of the 5th International Conference on Computational and Information Sciences, June 21-23, 2013, Shiyang, pp: 713-716.


  • Maksuanpan, S., T. Veerawadtanapong and W. San-Um, 2013. Robust digital image cryptosystem based on nonlinear dynamics of compound sine and cosine chaotic maps for private data protection. Proceedings of the 15th International Conference Advanced Communication Technology, January 27-30, 2013, Pyeongchang, South Korea, pp: 1083-1088.


  • Masmoudi, A., M.S. Bouhlel and W. Puech, 2012. Image encryption using chaotic standard map and engle continued fractions map. Proceedings of the 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications, March 21-24, 2012, Sousse, pp: 474-480.


  • Naik, K. and A.K. Pal, 2013. An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices. Proceedings of the International Conference on Computational Intelligence and Computing Research, December 26-28, 2013, Enathi, pp: 1-4.


  • Panduranga, H.T., S.K. Naveenkumar and Kiran, 2013. Partial image encryption using block wise shuffling and chaotic map. Proceedings of the International Conference on Optical Imaging Sensor and Security, July 2-3, 2013, Coimbatore, pp: 1-5.


  • Praveenkumar, P., R. Amirtharajan, Y. Ravishankar, K. Thenmozhi, J. Bosco and B. Rayappan, 2012. Random and AWGN road for MC-CDMA and CDMA bus to phase hide: A MUX in MUX stego. Proceedings of the International Conference on Computer Communication and Informatics, January 10-12, 2012, Coimbatore, India, pp: 1-6.


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Regulated OFDM-role of ECC and ANN: A review. J. Applied Sci., 12: 301-314.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Phase for face saving-a multicarrier stego. Procedia Eng., 30: 790-797.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Purposeful error on OFDM: A secret channel. Inform. Technol. J., 13: 1985-1991.
    CrossRef    Direct Link    


  • Praveenkumar, P., G.S. Hemalatha, B. Reddy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Secret link through simulink: A stego on OFDM channel. Inform. Technol. J., 13: 1999-2004.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego in multicarrier: A phase hidden communication. Inform. Technol. J., 13: 2011-2016.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041.
    CrossRef    Direct Link    


  • Praveenkumar, P., R. Deepak, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel: A role of cyclic codes. Inform. Technol. J., 13: 2047-2051.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel-a role of RS coding. Inform. Technol. J., 13: 2052-2056.
    CrossRef    Direct Link    


  • Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Spread and hide-a stego transceiver. Inform. Technol. J., 13: 2061-2064.
    CrossRef    Direct Link    


  • Sun, Q., W. Yan, J. Huang and W. Ma, 2012. Image encryption based on bit-plane decomposition and random scrambling. Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks, April 21-23, 2012, Yichang, pp: 2630-2633.


  • Zhang, Q., X. Xue and X. Wei, 2012. A novel image encryption algorithm based on DNA subsequence operation. Scient. World J.
    CrossRef    


  • Rakesh, S., A.K. Ajitkumar, B.C. Shadakshari and B. Annappa, 2012. Image encryption using block based uniform scrambling and chaotic logistic mapping. Int. J. Cryptogr. Inform. Secur., 2: 49-57.
    Direct Link    


  • Bahrami, S. and M. Naderi, 2012. Image encryption using a lightweight stream encryption algorithm. Adv. Multimedia,.
    CrossRef    


  • Matondo, S.B. and G. Qi, 2012. Two-level image encryption algorithm based on Qi hyper-chaos. Procedings of the 5th International Workshop on Chaos-Fractals Theories and Applications, October 18-21, 2012, Dalian, pp: 181-185.


  • Borujeni, S.E. and M. Eshghi, 2009. Chaotic image encryption design using Tompkins-Paige algorithm. Math. Prob. Eng.
    CrossRef    


  • Sivaranjani, K. and P. Bright Prabahar, 2013. Mended algorithm for image encryption based on random shuffling technique. Proceedings of the International Conference on Computational Intelligence and Computing Research, December 26-28, 2013, Madurai, India, pp: 1-4.


  • Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRef    Direct Link    


  • Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
    CrossRef    Direct Link    


  • Thanikaiselvan, V., P. Arulmozhivarman, S. Subashanthini and R. Amirtharajan, 2013. A graph theory practice on transformed image: A random image steganography. Scient. World J.
    CrossRef    


  • Patidar, V., G. Purohit, K.K. Sud and N.K. Pareek, 2010. Image encryption through a novel permutation-substitution scheme based on chaotic standard map. Proceedings of the International Workshop on Chaos-Fractal Theory and its Applications, October 29-31, 2010, Kunming, Yunnan, pp: 164-169.


  • Feng-Ying, W., H. Xiao-Li and C. Guo-Wei, 2012. An improved image encryption algorithm based on chaotic logistic map. Proceedings of the 5th International Symposium on Computational Intelligence and Design, October 28-29, 2012, Hangzhou, China, pp: 105-107.


  • Dai, Y. and X. Wang, 2012. Medical image encryption based on a composition of logistic maps and chebyshev maps. Proceeding of the IEEE International Conference on Information and Automation, June 6-8, 2012, Shenyang, China, pp: 210-214.

  • © Science Alert. All Rights Reserved