Digital Image Security using Auto Key Generation with Segmentation

 

Narendra Kumar Dewangan*, Prof. Nilmani Verma, Prof. Sandeep Gonnade

MATS University Arang, Raipur (Chhattisgarh, INDIA) 492001

*Corresponding Author E-mail: narendra.nic@gmail.com

 

ABSTRACT:

The model for encryption & decryption of an image is designed with the same purposes no needed to send public or private key, first input image then generate auto generated key for image encryption using stream cipher , encrypted image will be divide into four parts then algorithms provided auto sequence number to image, transmit four segmented image, In other end first takes segmented image then all segments merge together then generate auto generated key and using this key decrypt image and analysis quality of image.   

 

KEYWORDS: Image encryption, Stream cipher, auto generated key

 


1. INTRODUCTION:

Internet based communications are evolving at a tremendous rate. Encryption of data has become an important way to protect data resources especially on the Internet, intranets and extranets. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. The goal of security management is to provide authentication of users, and integrity, accuracy and safety of data resources.

 

The model for encryption and decryption of an image is designed with the objectives to have confidentiality and security in transmission of the image based data as well as storage in the data warehouse, with the help of auto generated key which is extracted by original/encrypted image.

 

This technique can considerably improve the efficiency of data transmission, and it is particularly suitable for the image transmission via the Internet.[01]

 

After encryption of image it will segment into four parts will be transmitted another end, an image-based data requires more effort during encryption and decryption. The model for encryption and decryption of an image using auto generated key which is generated by image.

 

Through electronic mail / voice mail / video mail it is possible to solicit the Telemedicine is becoming popular in the specialties of radiology, pathology, critical care and psychiatry, where data is in the form of image. It is required to ensure confidentiality and security for transmitting certain image-based data over the Internet. The aim of security management is to provide authentication of users and integrity, accuracy & safety of data resources. The model for encryption & decryption of an image is designed with the same purposes.

 

Basic operations that can be carried out in encryption/decryption are: substitution and transposition. Due to advent of computers, these operations are carried out on binary bits.[01]

 

Considerations of privacy and confidentially in a computer environment have given recognition to the need for protecting certain communications and stored data from theft and misuse. A suitable methodology for protecting communicated or stored data involves the use of cryptographic techniques. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. A message is plaintext An encryption method which depends on the secrecy of the encryption algorithm is not considered to be a true    encryption method. An encryption method which depends on the secrecy of the encryption algorithm is not considered to be a true encryption method [02].

 

The amount of digital medical images has increased rapidly in the Internet. The necessity of fast and secure diagnosis isvital in the medical world. Nowadays, the transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over the net. In this paper we propose a new technique to cipher an image for safe transmission. There are several methods to encrypt binary or grey level images [10]

 

The encryption can be done by block or by stream. But the encryption block methods applied to image, have presented two inconvenient. The first one was when you have homogeneous zones, all blocks of this kind are encrypted on the same manner. The second problem was that block encryption methods are not robust to noise. The stream cipher method is robust to moderate noise like JPEG compression with high quality factor. To embed the encrypted secret key in the image we have used a new DCT-based watermarking method [9].

 

Along with the fast progression of data exchange in electronic way, it is important to protect the confidentiality of data from unauthorized access. Security breaches may affect user's privacy and reputation. So, data encryption is widely used to confirm security in open networks such as the internet. Due to the substantial increase in digital data transmission via internet, the security of digital images has become more prominent and attracted much attention in the digital world today. Also, the extension of multimedia technology in our society has promoted digital images to play a more significant role than the traditional texts, which demand serious protection of users' privacy for all applications. Each type of data has its own features; therefore, different techniques should be used to protect confidential image data from unauthorized access.        

 

Most of the available encryption algorithms are used for text data. However, due to large data size and real time requirement, the algorithms that are appropriate for textual data may not be suitable for multimedia data.[03]

 

To ensure the security of a cryptosystem the cipher must have some properties such as good distribution, long period, high complexity and efficiency. In particular, the outputs of a cryptosystem must be unpredictable in the absence of knowledge of the inputs. Recently, the NIST designed a set of different statistical tests to justify randomness of binary sequences produced by either hardware or software based cryptographic random or pseudorandom number generators. These tests focus on a variety of different types of nonrandomness that could exist in a sequence. The mathematical description of each test can be found at[05]

Many researchers proposed different image encryption schemes to overcome image encryption problems. In this research we have tried to find a simple, fast and secure algorithm for image encryption using the characteristics of chaotic functions and the LFSRbased stream ciphers. According to key's large space in the chaotic functions, this method is very robust. Finally, this algorithm is very sensitive to small changes in key so even with the knowledge of the key approximate values; there is no possibility for the attacker to break the cipher.[07,08]

 

Also many algorithms and architectures based on various transforms and digital holography were reported for optical image encryption[20]

 

2. ARCHITECTURE:

For encryption and decryption a symmetric key model has been used. The architecture of image encryption and decryption model is described in Figure –1:

 

 


Figure 1: Pixel encryption by stream cipher.

 

3. STREAM CIPHER:

3.1 The general method

Algorithms of flux ciphering (stream ciphers) can be  defined as being algorithms of ciphering by blocks, where the block has an unitary dimension (1 bit, 1 byte, etc.) or relatively small. Their main advantages are their extreme speeds and their capacity to change every symbol of the plaintext. Besides, they are less numerous than those of ciphering by blocks, they are useful in an environment where mistakes are frequents, because they have the advantage of not propagate them (diffusion) [04]. The most widespread and used coding stream ciphers are the synchronous, and the most widely used is the RC4 [05].

 

The algorithm RC4 has been thought in 1987 by Ron Rivest and has been developed for the RSA Security. It is based on the random permutations into the byte. The algorithm has avariable key length (of 1 to 256 bytes). The key is used to initialize a table of 256-byte states. This table is used for the pseudo-random byte generation to produce a random pseudo flux with which the plaintext will be transformed. Current interest in stream ciphers is most commonly attributed to properties of the one-time pad, called the Vernam cipher [05]. It uses a string of bits that is completely random generated. The key stream has the same length as the plaintext message. The random string is combined using exclusive OR operations with the plaintext to produce the cipher text. The Linear Feedback Shift Register (LFSR) is a mechanism very often applied in applications that require very fast generation of a pseudo-random sequence. The symmetrical ciphering uses LFSR to generate some pseudo-random bit sequences called register’s vector. This vector is generally the key of the ciphering process and I t is defined in relation to a meter. For every iteration, the content of the register is baffled toward the right of a position, and the XOR operation is applied on one under whole of bits whose result is placed to the left extreme of the register.

 

3.2 Image encryption by stream cipher

Generally, the private key length of the stream ciphering can be eventually as long as the length of the message. The method detail resides in the fact that for every pixel the encryption depends previously of the original pixel value of the key. For every pixel p(n) of the original image pixel value p’(n) of the ciphered image using the equation:

      

The chosen value of k must be larger enough to turn the system safe. Suppose key size depends upon size of image,

 

4. CONCLUSION

 This paper presented for image security and encrypt image for image safe transmission Purpose, auto key generation is safe instead of sending public key or private key, The image encryption and decryption model is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage in the data warehouse, with the help of auto generated key.

 

5. REFENRENCES:

1.       Cross-talk-free double-image encryption and  watermarking with amplitude–phase separate modulations X F Meng, L Z Cai, M Z He, G Y Dong and X X Shen Volume 7 Number 11 Create an alert RSS this journal X F Meng et al 2005 J. Opt. A: Pure Appl. Opt. 7 624 doi:10.1088/1464-4258/7/11/002

2.       R. Lukac and K. Plataniotis. Bit-Level Based Secret Sharing for Image Encryption. Pattern Recognition, 38(5):767–772, May 2005.

3.       An Image Encryption Approach Using Chaos and Stream Cipher Journal of Theoretical and Applied Information Technology, 2005 - 2010 Jatit & lls1alireza Jolfaei, Abdolrasoul Mirghadri

4.       S.L. Li, K.C. Leung, L.M. Cheng, C.K. Chan, A novel image hiding scheme based on block difference, Pattern Recognition 39 (6) (2006) 1168–1176.

5.       A. Rukhin et al., “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” NIST Special Publication 800-22, Revision 1a,2010. Processing Conference, Turkey, September 2005.

6.       Hell. M, Johansson. T, Maximov. A. Meier. W.” A Stream Cipher Proposal: Grain”. IEEE International  Symposium on Information Theory, 9-14 July 2006, pp 1614 – 1618.

7.       M. Sharma and M.K. Kowar, “Image Encryption Techniques Using Chaotic Schemes: a Review,” International Journal of Engineering Science and Technology, vol. 2, No. 6, 2010, pp. 2359–2363.

8.       A. Jolfaei and A. Mirghadri, “An Applied Imagery Encryption Algorithm Based on Shuffling and Baker's Map,” Proceedings ofThe 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10), Florida, USA, 2010, pp. 279–285.

9.       W. Puech and J. Rodrigues, "Crypto-compression of medical Images by selective encryption of DCT", 13th European Signal

10.     W. Stallings., "Cryptography and Network Security: Principles And Practice," Prentice- Hall, New Jersey, 1999.

11.     C. Wu and C. Kuo. Design of Integrated Multimedia Compression and Encryption Systems. IEEE Trans. On Multimedia, 7(5):828–839, Oct. 2005.

12.     D. Taubman, M.W. Marcellin, JPEG2000—Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers, Dordrecht, 2002.

13.     A Digital Watermark  R.G. Van Schyndel, A.Z. Tirkel, C.F. Osborne. Department of Physics, Monash University, Clayton, 3168, Australia. 2009

14.     [Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution Nagaraj V. Dharwadkar and B. B. Amberker. Journal of Computing, Volume 1, Issue 1, December 2009, ISSN: 2151-9617

15.     Ingemar, J. Cox and Matt. L. Miller, “The First 50 Years of Electronic Watermarking”, EURASIP Journal on Applied Signal Processing, Vol.2, pp.126-132,2002.

16.     Ingemar, J. Cox, Matthew, L. M., Jeffrey, A. Bloom, Jassica Fridrich, Tan Kalker, “Digital Watermarking and Steganography”, Second edition, M.K. Publishers, 2008.

17.     B.M. Macq and J.J. Quisquater, “Cryptology for digital tvbroadcasting”, Proceeding of the IEEE, vol. 83,pp. 944-957,June 1995.

18.     W. Bender .D. Gruhl. N. Mormoto, and A.Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no 3, pp 313-336, 1996.

19.     Nino, D. Abdallah, M. Haramo, B. “Dual Domain Watermarking in the Biological Color Model”, IEEE International Conference on Information and Automation (ICIA), pp. 407-411, 15-17 Dec 2006.

20.     X. Wang and D. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240-244 (2006).

21.     Image Encryption Using DCT and Stream Cipher European Journal of Scientific Research ISSN 1450-216X Vol.32 No.1 (2009)

22.     Digital Image Watermarking ECE 533 Image Processing, University of Wisconsin-Madison Matthew Elliott and Brian Schuette December 21, 2006

 

 

Received on 29.04.2013               Accepted on 15.05.2013            

© EnggResearch.net All Right Reserved

Int. J. Tech. 3(1): Jan.-June. 2013; Page 15-18