SlideShare a Scribd company logo
1 of 4
Download to read offline
V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications
                     (IJERA)          ISSN: 2248-9622    www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1308-1311
               Simple Tool For Efficient Image Cryptography

                             V.DEEPTHI1 Dr.SANDEEP.V.M2
                          ECE Dept., JPNCE, Mahabubnagar, Andhra Pradesh1
                     HOD & Prof., ECE Dept., JPNCE, Mahabubnagar, Andhra Pradesh2

                                                      and only if the key is known. The resulting
Abstract-                                             encrypted
        Secure transmission and storage of
color images is gaining importance in recent
years due to the proliferation of multimedia          image is found to be fully distorted, resulting in
network     applications.    Image    encryption      increasing the robustness of the proposed work.
techniques scrambled the pixels of the image          The remainder of this paper organized as follows.
and decrease the correlation among the pixels,        In section 3, we describe our proposed
to get the encrypted image. In this paper we          cryptosystem. We validate the proposed method
propose a new effective and simple method for         through experiments and finally we conclude in
image encryption which employs magnitude and          section 4.
phase manipulation using cross-over and
mutation approaches for encrypting color              II. BACKGROUND
images. The proposed approach is very sensitive                In this section we give an overview of
to any slight changes in the secret key values,       different image encryption and decryption
making it very different to decrypt heuristically.    methods. Literature suggests many techniques for
                                                      encryption and decryption.
Keywords- cross-over, cipher,        cryptography,
decryption, encryption, mutation.                     2.1. DIGITAL SIGNATURE
I. INTRODUCTION                                                 A. Sinha and K.Singh [13] have proposed
         The rapid growth of computer networks,       a technique to encrypt an image for secure image
information security is an increasingly important     transmission. Before transmission digital signature
problem popular application of multimedia             of original image is embedded to the encoded
technology and increasingly transmission ability of   version. Encoding is done by using error control
network gradually lead us to acquired information     code. At the receiver end after decryption digital
directly and clearly through images [6]. Hence        signature is used to authenticity of the image
image security has become a critical and imperative   without the knowledge of the specific error control
issue [7]. Image encryption techniques try to         code it is very difficult to obtain the original image.
convert an image to another image that is hard to     The dimensions of the image also changes due to
understand; to keep the image confidential between    the added redundancy increment in the size of the
users, in other word, it is essential that nobody     image due to added redundancy in the disadvantage
could get to know the content without a key for       of this algorithm.
decryption [1][8].      Many image encryption
methods have been proposed but some of them           2.2 Linear independence scheme and logistic
have been known to be insecure [12], so we always     map method
in need to develop more and more secure image                  Hazem       Mohammad Al-Najjar          [3]
encryption techniques. Traditional data encryption    proposed encryption method based on logistic map
techniques can be divided into two categories         method. In this method by applying XOR operation
which are used individually or in combination in      between two neighbor pixels it will creates a linear
every cryptographic algorithm [2]. Image              independence relationship. Logistic map method is
encryption approaches fall into two broad             developed encryption keys for images by shuffling
categories: spatial domain methods [9] and            the pixel positions.
frequency domain methods [10] [14].
                                                      2.3 Chaotic sequence method:
In this paper we present a novel image encryption              Yi Kai-Xiang and Sun Xiang [5] give an
scheme for magnitude and phase manipulations          image encryption algorithm based on chaotic
using crossover and mutation techniques these         sequence the real number value chaotic sequences.
techniques are composed with a simple diffusion       First, the real number value chaotic sequences
mechanism [13]. The proposed method dealing           using the key value is generated. Then it is
with private key cryptosystem in frequency domain     dispersed in to symbol matrix and transformation
and it can be retrieved from the encrypted image if   matrix. Finally the image is encrypted using them
                                                      in DCT domain. DCT is a lossy data compression
                                                      technique, image may occur some distortions

                                                                                           1308 | P a g e
V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications
                     (IJERA)          ISSN: 2248-9622    www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1308-1311
caused by lossy data compression and noise, but         scrambled image will be created which can be hard
this method can still correctly decrypt and restore     to understand. The process of shuffling is done by
original image, and can achieve a high security         considering different combinations of components
degree.                                                 in an image. By reordering the adjacent
2.4.Double random phase encoding:                       components the original image can be encrypted
         S. Zhang and M. A. Karim [15] have             but it is near to the original image. To increase the
proposed a new method to encrypt color images           security different combinations of re-order
using existing optical encryption systems for gray-     mechanisms are used. Just replacing the pixel
scale images. The color images are converted to         positions or reordering the neighboring rows and
their indexed image formats before they are             columns is not sufficient for the better image
encoded. In the encoding subsystem, image is            encryption so we have to implement a new
encoded to stationary white noise with two random       algorithm for image encryption and decryption.
phase masks, one in the input plane and the other in    After reordering process the mutation operation is
the Fourier plane. At the decryption end, the color     performed. In this mutation NOT operation is
images are recovered by converting the decrypted        applied      on     the    reordered    components.
indexed images back to their RGB (Red-Green-            Disadvantage of this method is the encrypted image
Blue) formats. The proposed single-channel color        is easily recognized because the scrambled image
image encryption method is more compact and             components are having the same components as the
robust than the multichannel methods. This              original image.
technique introduces color information to optical
encryption. An RGB color image is converted to an       3.2 Image Encryption and Decryption in FFT:
indexed image before it is encrypted using a typical             Further improvement of image encryption
optical security systems. At the decryption end, the    a new effective algorithm is introduced in
recovered indexed image is converted back to the        frequency domain.FFT is a fast algorithm for
RGB image. Since only one channel is needed to          discrete Fourier transform. Here in this case FFT is
encrypt color images, it reduces the complexity and     a secret key between the users for encryption and
increases the reliability of the corresponding          decryption of an image. When the fast Fourier
optical color image encryption systems [11].            transform is applied to the original image the
                                                        components are a combination of real and
 2.5 Spatial domain:                                    imaginary parts. The complexity of scrambled
         The approaches in this category are based      image will be increased by adding some more new
on direct manipulation of pixels in an image. In this   algorithms to encrypted images along with FFT.
algorithm the general encryption usually destroys
the correlation among pixels and thus makes the         3.3 Cross-Over Operation:
encrypted image incompressible. By using spatial                  In this section two frequency domain
domain the encryption efficiency is very less.          components are taken and combined about
From above discussions we can say that due to the       crossover point their by creating two new
redundancy, distortions and noise in images may         components. The cross-over method is used for
reduces the efficiency of encryption levels. To         swapping the real and complex parts of the one
overcome these problems the proposed method is          component with the real and complex parts of other
useful. In this method by using the crossover and       component, which will result in a change in the
mutation operations will results in better encryption   amplitude and the phase of the new components.
efficiency.                                             Reversibility of crossover operation the same
                                                        indices will be generated and consequently the
III. EFFICIENT AND ROBUST IMAGE                         crossover effect will be removed and the original
ENCRYPTION                                              components will be retrieved again [15]. Before
         In this paper, we propose a method that        applying the crossover operation the image is
improves the encryption efficiency and yet              containing the below real and complex values.
maintain its simplicity in implementation. The                             R1=real1,       C1=complex1
method uses cross-over and then mutation process                           R2=real2,       C2=complex2
in frequency domain to achieve a better encryption.     After performing the crossover operation on image
                                                        the resultant components will be formed as follows;
3.1Transposition method in frequency method:                               R1=complex2, C1=real2
          Frequency domain gives a better                                  R2=complex1, C2=real1
encryption of an image than spatial domain. The
Fourier transform of an image can be complex and         3.4 Mutation Operation:
hence both the magnitude and the phase functions                 Mutation technique is introduced to
are necessary for the complete reconstruction of an     further complicate the encryption. In this method
image from its Fourier transform. Displacing the        NOT operation is performed on the components.
component positions in original image the new           By applying mutation the resultant components are

                                                                                            1309 | P a g e
V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications
                           (IJERA)          ISSN: 2248-9622    www.ijera.com
                         Vol. 2, Issue 5, September- October 2012, pp.1308-1311
      compliment of an original image which will gives         TABLE1
      the beneficial encryption results. This mutation         Encryption / Decryption efficiency of the
      function is self invertible                          proposed method.
                                                             S.NO      Object type    Encryption
      3.5 Mixture of cross-over and Mutation:                                         efficiency in %
               Combination of crossover and mutation           1.      Animals                96
      methods will give better privacy when compared to        2.      Human beings           90
      the individual methods and also gives the                3.      Flowers                75
      confidential results. In this section the Mutation       4.      Historical             98
      method is added along with the crossover technique               places
      for better image encryption in frequency domain.         5.      Natural images         84
      This simulation will results very nice encryption
      effects and good robustness.                         The table shows the number of encrypted images
                                                           that the viewers were able to visualize and
      3.6.RGB model                                        recognize the objects that were in the original
                In order to improve the privacy of         image. The fewer the objects were recognized, the
      scrambled color images the combination of            better will be the encryption process. It can be seen
      crossover and mutation methods are performed on      from the table that the images containing object
      tri-colors (Red, Green and Blue) of an image.        like flowers are very easily recognized. Encryption
      Ciphering of image by slicing the image into sub     complexity in such cases should be increase.
      images whose dimensions are kept confidential and
      applied proposed methods to each of these sub          V. CONCLUSION & FUTURE WORK:
      images this will increases the efficiency of an               In this paper, a successfully efficient
      encryption.                                          implementation of encryption scheme is introduced
                                                           for digital image encryption. This encryption
                                                           scheme proposed crossover and mutation operation
                                                           on the frequency domain components of the plain
                                                           image, therefore changing this components
                                                           amplitude and phase in order to achieve more
                                                           confusion and diffusion in the cipher image. When
a) Original image b) Encrypted image c) Decrypted image    compared to many commonly used algorithms the
                                                           proposed algorithm resulted in the best
      Fig1: The response of Proposed Cryptosystem on a     performance. According to the results of our
                        Color Image                        proposed method, we conclude that the future
                                                           research will be expanded to increase the efficiency
                                                           of fewer objects which are recognized by the
                                                           viewers, by adding some new algorithms along
                                                           with the proposed method to increase the
                                                           complexity.

                                                           References:
                                                             [1]    H. El-din H. Ahmed, M. K Hamdy, and O.
      a)Original image b)Encrypted original                         S. Farag Allah, "Encryption quality
      c)Decrypted image                                             analysis of theRC5 block cipher algorithm
                                                                    for digital images," Optical Engineering,
      Fig2: Response of proposed method                             Vol. 45, Issue 10107003, 2006.
                                                             [2]    B. A. Forouzan, “Traditional Symmetric-
      IV. Performance evolution:                                    Key Ciphers,” in Introduction to
                The proposed method is applicable for               Cryptography and Network Security, 1st
      gray-scale images and also for color images. From             ed., New Yourk, the McGraw-Hill
      the above shown encrypted image we can say that               Companies, Inc., 2008, ch. 3, sec. 1,pp.
      the regions of the scrambled image are totally                60-61.
      invisible.                                             [3]    Hazem Mohammad Al-Najjar,”Digital
      Experiments conducted wherein the various                     Image Encryption Algorithm Based on a
      encrypted images are shown to a group of 50                   Linear Independence Scheme and the
      people to identify them. The fewer the number of              Logistic Map”.
      people who could identify the object in the image,     [4]    Ibrahim S I Abuhaiba and Maaly A S
      the better efficient will be encryption algorithm.            Hassan „‟image encryption and decryption
                                                                    using differential evaluation approach in
                                                                    frequency domain”. signal and image

                                                                                               1310 | P a g e
V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications
                    (IJERA)          ISSN: 2248-9622    www.ijera.com
                  Vol. 2, Issue 5, September- October 2012, pp.1308-1311
        processing: An International Journal         Authors Information:
        (SIPIJ) vol.2, No.1, March 2011.
 [5]    Yi Kai-Xiang and Sun Xing et al., “An
        image encryption algorithm based on
        chaotic sequences,” Journal of Computer
        Aided Design and Computer Graphics,
        Vol. 12, No. 9, 2000, pp. 672-676
[6]     W. Lee, T. Chen and C. Chieh Lee,
        "Improvement of an encryption scheme
                                                     1.V.Deepthi Pursuing        M.Tech(DSCE) from
        for binary images," Pakistan Journal of
                                                     JayaPrakash Narayana College of Engineering
        Information and Technology. Vol. 2, no.
                                                     B.Tech(ECE) from JayaPrakash Narayana College
        2, 2003, pp. 191-200..
                                                     of Engineering Currently she is working as
 [7].   A. Mitra, Y V. Subba Rao, and S. R. M.
                                                     Assistant Professor at Jayaprakash narayan college
        Prasnna, "A new image encryption
                                                     of engineering And has 2 years of Experience in
        approach using combinational permutation
                                                     teaching . Her areas of interest include,Image
        techniques," Journal of computer Science,
                                                     Processing ,wireless networks, signal processing
        Vol. 1, no. 1, 2006, p.127.
[8]     B. Mohammad Ali and J. Aman," Image
        Encryption        Using       Block-Based
        Transformation Algorithm," IAENG Int.
        Journal of Computer Science, Vol. 35,
        Issue 1, 2008, pp. 15-23.
[9]     S. K. Panigrahy, B. Acharya, and D. Jena,
        “Image Encryption Using Self-Invertible
        Key Matrix of Hill Cipher Algorithm,” 1st    2. Dr. Sandeep V.M. completed Ph.D in Faculty of
        International Conference on Advances in      Electrical and Electronics Engineering, Sciences,
        Computing,       Chikhli,   India,   21-22   from Visveswaraiah Technological University,
        February 2008.                               Belgaum, and M.Tech from Gulbarga University
[10]    S. R. M. Prasanna, Y. V. Subba Rao and       and B.Tech from Gulbarga University. His research
        A. Mitra, “An Image Encryption Method        interests are in the areas of Signal and Image
        with Magnitude and Phase Manipulation        Processing, Pattern Recognition, Communication,
        using Carrier Images,” International         Electromagnetics. He is Reviewer for Pattern
        Journal of Computer Science, Volume 1,       Recognition Letters (PRL). He acted as Reviewer
        Number 2, February 20, 2006                  for many International Conferences.He has 24
 [11]   W. Zeng and S. Lei, “Efficient Frequency     years of teaching experience. He is member of
        Domain Selective Scrambling of Digital       LMIST – Life Member Instrument Society of India
        Video,” IEEE Trans. Multimedia, 2002.        (IISc, Bangalore). And he guided more than 100
[12]    Li. Shujun, and X. Zheng "Cryptanalysis      projects at UG level and 35 at PG level.And
        of a chaotic image encryption method,"       published more than 10 papers in international
        Inst. of Image Process, Xi'an Jiaotong       journals and 9 Conference Proceedings.
        Univ., Shaanxi, This paper appears in:
        Circuits and Systems, ISCAS 2002. IEEE
        International Symposium on Publication
        Date: 2002, Vol. 2, 2002, pp. 708-711.
 [13]   A. Sinha, K. Singh, “A technique for
        image encryption using digital signature,”
        Optics Communications, 2003, pp. 1-6
 [14]   W. Zeng and S. Lei, “Efficient Frequency
        Domain Selective Scrambling of Digital
        Video,” IEEE Trans. Multimedia, 2002.
 [15]   S. Zhang and M. A. Karim, “Color image
        encryption using double random phase
        encoding,” Microwave and optical
        technology letters, Vol. 21, No. 5, June 5
        1999, pp. 318-322.




                                                                                       1311 | P a g e

More Related Content

What's hot

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 
Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compressionAlexander Decker
 
11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compressionAlexander Decker
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 

What's hot (18)

J017426467
J017426467J017426467
J017426467
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
O017429398
O017429398O017429398
O017429398
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
M017427985
M017427985M017427985
M017427985
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
G0210032039
G0210032039G0210032039
G0210032039
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compression
 
11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compression
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 

Viewers also liked (20)

Kn2518431847
Kn2518431847Kn2518431847
Kn2518431847
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hu2514081412
Hu2514081412Hu2514081412
Hu2514081412
 
Hc2512901294
Hc2512901294Hc2512901294
Hc2512901294
 
Id2514581462
Id2514581462Id2514581462
Id2514581462
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
Hx2514211427
Hx2514211427Hx2514211427
Hx2514211427
 
Hs2513891402
Hs2513891402Hs2513891402
Hs2513891402
 
Kj2518171824
Kj2518171824Kj2518171824
Kj2518171824
 
Kf2517971799
Kf2517971799Kf2517971799
Kf2517971799
 
I26043047
I26043047I26043047
I26043047
 
Iv2616901694
Iv2616901694Iv2616901694
Iv2616901694
 
Ig2616051609
Ig2616051609Ig2616051609
Ig2616051609
 
Ht2515231526
Ht2515231526Ht2515231526
Ht2515231526
 
W26142147
W26142147W26142147
W26142147
 
Ic2615781586
Ic2615781586Ic2615781586
Ic2615781586
 
Bp31457463
Bp31457463Bp31457463
Bp31457463
 
Aula02 geo pg
Aula02 geo pgAula02 geo pg
Aula02 geo pg
 
Recurso Ana Arraes - aborto
Recurso Ana Arraes - abortoRecurso Ana Arraes - aborto
Recurso Ana Arraes - aborto
 
presentacion_diana
presentacion_dianapresentacion_diana
presentacion_diana
 

Similar to Hf2513081311

Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...IJECEIAES
 

Similar to Hf2513081311 (20)

Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
K041068072
K041068072K041068072
K041068072
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
 

Hf2513081311

  • 1. V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1308-1311 Simple Tool For Efficient Image Cryptography V.DEEPTHI1 Dr.SANDEEP.V.M2 ECE Dept., JPNCE, Mahabubnagar, Andhra Pradesh1 HOD & Prof., ECE Dept., JPNCE, Mahabubnagar, Andhra Pradesh2 and only if the key is known. The resulting Abstract- encrypted Secure transmission and storage of color images is gaining importance in recent years due to the proliferation of multimedia image is found to be fully distorted, resulting in network applications. Image encryption increasing the robustness of the proposed work. techniques scrambled the pixels of the image The remainder of this paper organized as follows. and decrease the correlation among the pixels, In section 3, we describe our proposed to get the encrypted image. In this paper we cryptosystem. We validate the proposed method propose a new effective and simple method for through experiments and finally we conclude in image encryption which employs magnitude and section 4. phase manipulation using cross-over and mutation approaches for encrypting color II. BACKGROUND images. The proposed approach is very sensitive In this section we give an overview of to any slight changes in the secret key values, different image encryption and decryption making it very different to decrypt heuristically. methods. Literature suggests many techniques for encryption and decryption. Keywords- cross-over, cipher, cryptography, decryption, encryption, mutation. 2.1. DIGITAL SIGNATURE I. INTRODUCTION A. Sinha and K.Singh [13] have proposed The rapid growth of computer networks, a technique to encrypt an image for secure image information security is an increasingly important transmission. Before transmission digital signature problem popular application of multimedia of original image is embedded to the encoded technology and increasingly transmission ability of version. Encoding is done by using error control network gradually lead us to acquired information code. At the receiver end after decryption digital directly and clearly through images [6]. Hence signature is used to authenticity of the image image security has become a critical and imperative without the knowledge of the specific error control issue [7]. Image encryption techniques try to code it is very difficult to obtain the original image. convert an image to another image that is hard to The dimensions of the image also changes due to understand; to keep the image confidential between the added redundancy increment in the size of the users, in other word, it is essential that nobody image due to added redundancy in the disadvantage could get to know the content without a key for of this algorithm. decryption [1][8]. Many image encryption methods have been proposed but some of them 2.2 Linear independence scheme and logistic have been known to be insecure [12], so we always map method in need to develop more and more secure image Hazem Mohammad Al-Najjar [3] encryption techniques. Traditional data encryption proposed encryption method based on logistic map techniques can be divided into two categories method. In this method by applying XOR operation which are used individually or in combination in between two neighbor pixels it will creates a linear every cryptographic algorithm [2]. Image independence relationship. Logistic map method is encryption approaches fall into two broad developed encryption keys for images by shuffling categories: spatial domain methods [9] and the pixel positions. frequency domain methods [10] [14]. 2.3 Chaotic sequence method: In this paper we present a novel image encryption Yi Kai-Xiang and Sun Xiang [5] give an scheme for magnitude and phase manipulations image encryption algorithm based on chaotic using crossover and mutation techniques these sequence the real number value chaotic sequences. techniques are composed with a simple diffusion First, the real number value chaotic sequences mechanism [13]. The proposed method dealing using the key value is generated. Then it is with private key cryptosystem in frequency domain dispersed in to symbol matrix and transformation and it can be retrieved from the encrypted image if matrix. Finally the image is encrypted using them in DCT domain. DCT is a lossy data compression technique, image may occur some distortions 1308 | P a g e
  • 2. V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1308-1311 caused by lossy data compression and noise, but scrambled image will be created which can be hard this method can still correctly decrypt and restore to understand. The process of shuffling is done by original image, and can achieve a high security considering different combinations of components degree. in an image. By reordering the adjacent 2.4.Double random phase encoding: components the original image can be encrypted S. Zhang and M. A. Karim [15] have but it is near to the original image. To increase the proposed a new method to encrypt color images security different combinations of re-order using existing optical encryption systems for gray- mechanisms are used. Just replacing the pixel scale images. The color images are converted to positions or reordering the neighboring rows and their indexed image formats before they are columns is not sufficient for the better image encoded. In the encoding subsystem, image is encryption so we have to implement a new encoded to stationary white noise with two random algorithm for image encryption and decryption. phase masks, one in the input plane and the other in After reordering process the mutation operation is the Fourier plane. At the decryption end, the color performed. In this mutation NOT operation is images are recovered by converting the decrypted applied on the reordered components. indexed images back to their RGB (Red-Green- Disadvantage of this method is the encrypted image Blue) formats. The proposed single-channel color is easily recognized because the scrambled image image encryption method is more compact and components are having the same components as the robust than the multichannel methods. This original image. technique introduces color information to optical encryption. An RGB color image is converted to an 3.2 Image Encryption and Decryption in FFT: indexed image before it is encrypted using a typical Further improvement of image encryption optical security systems. At the decryption end, the a new effective algorithm is introduced in recovered indexed image is converted back to the frequency domain.FFT is a fast algorithm for RGB image. Since only one channel is needed to discrete Fourier transform. Here in this case FFT is encrypt color images, it reduces the complexity and a secret key between the users for encryption and increases the reliability of the corresponding decryption of an image. When the fast Fourier optical color image encryption systems [11]. transform is applied to the original image the components are a combination of real and 2.5 Spatial domain: imaginary parts. The complexity of scrambled The approaches in this category are based image will be increased by adding some more new on direct manipulation of pixels in an image. In this algorithms to encrypted images along with FFT. algorithm the general encryption usually destroys the correlation among pixels and thus makes the 3.3 Cross-Over Operation: encrypted image incompressible. By using spatial In this section two frequency domain domain the encryption efficiency is very less. components are taken and combined about From above discussions we can say that due to the crossover point their by creating two new redundancy, distortions and noise in images may components. The cross-over method is used for reduces the efficiency of encryption levels. To swapping the real and complex parts of the one overcome these problems the proposed method is component with the real and complex parts of other useful. In this method by using the crossover and component, which will result in a change in the mutation operations will results in better encryption amplitude and the phase of the new components. efficiency. Reversibility of crossover operation the same indices will be generated and consequently the III. EFFICIENT AND ROBUST IMAGE crossover effect will be removed and the original ENCRYPTION components will be retrieved again [15]. Before In this paper, we propose a method that applying the crossover operation the image is improves the encryption efficiency and yet containing the below real and complex values. maintain its simplicity in implementation. The R1=real1, C1=complex1 method uses cross-over and then mutation process R2=real2, C2=complex2 in frequency domain to achieve a better encryption. After performing the crossover operation on image the resultant components will be formed as follows; 3.1Transposition method in frequency method: R1=complex2, C1=real2 Frequency domain gives a better R2=complex1, C2=real1 encryption of an image than spatial domain. The Fourier transform of an image can be complex and 3.4 Mutation Operation: hence both the magnitude and the phase functions Mutation technique is introduced to are necessary for the complete reconstruction of an further complicate the encryption. In this method image from its Fourier transform. Displacing the NOT operation is performed on the components. component positions in original image the new By applying mutation the resultant components are 1309 | P a g e
  • 3. V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1308-1311 compliment of an original image which will gives TABLE1 the beneficial encryption results. This mutation Encryption / Decryption efficiency of the function is self invertible proposed method. S.NO Object type Encryption 3.5 Mixture of cross-over and Mutation: efficiency in % Combination of crossover and mutation 1. Animals 96 methods will give better privacy when compared to 2. Human beings 90 the individual methods and also gives the 3. Flowers 75 confidential results. In this section the Mutation 4. Historical 98 method is added along with the crossover technique places for better image encryption in frequency domain. 5. Natural images 84 This simulation will results very nice encryption effects and good robustness. The table shows the number of encrypted images that the viewers were able to visualize and 3.6.RGB model recognize the objects that were in the original In order to improve the privacy of image. The fewer the objects were recognized, the scrambled color images the combination of better will be the encryption process. It can be seen crossover and mutation methods are performed on from the table that the images containing object tri-colors (Red, Green and Blue) of an image. like flowers are very easily recognized. Encryption Ciphering of image by slicing the image into sub complexity in such cases should be increase. images whose dimensions are kept confidential and applied proposed methods to each of these sub V. CONCLUSION & FUTURE WORK: images this will increases the efficiency of an In this paper, a successfully efficient encryption. implementation of encryption scheme is introduced for digital image encryption. This encryption scheme proposed crossover and mutation operation on the frequency domain components of the plain image, therefore changing this components amplitude and phase in order to achieve more confusion and diffusion in the cipher image. When a) Original image b) Encrypted image c) Decrypted image compared to many commonly used algorithms the proposed algorithm resulted in the best Fig1: The response of Proposed Cryptosystem on a performance. According to the results of our Color Image proposed method, we conclude that the future research will be expanded to increase the efficiency of fewer objects which are recognized by the viewers, by adding some new algorithms along with the proposed method to increase the complexity. References: [1] H. El-din H. Ahmed, M. K Hamdy, and O. a)Original image b)Encrypted original S. Farag Allah, "Encryption quality c)Decrypted image analysis of theRC5 block cipher algorithm for digital images," Optical Engineering, Fig2: Response of proposed method Vol. 45, Issue 10107003, 2006. [2] B. A. Forouzan, “Traditional Symmetric- IV. Performance evolution: Key Ciphers,” in Introduction to The proposed method is applicable for Cryptography and Network Security, 1st gray-scale images and also for color images. From ed., New Yourk, the McGraw-Hill the above shown encrypted image we can say that Companies, Inc., 2008, ch. 3, sec. 1,pp. the regions of the scrambled image are totally 60-61. invisible. [3] Hazem Mohammad Al-Najjar,”Digital Experiments conducted wherein the various Image Encryption Algorithm Based on a encrypted images are shown to a group of 50 Linear Independence Scheme and the people to identify them. The fewer the number of Logistic Map”. people who could identify the object in the image, [4] Ibrahim S I Abuhaiba and Maaly A S the better efficient will be encryption algorithm. Hassan „‟image encryption and decryption using differential evaluation approach in frequency domain”. signal and image 1310 | P a g e
  • 4. V.Deepthi, Dr.Sandeep.V.M / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1308-1311 processing: An International Journal Authors Information: (SIPIJ) vol.2, No.1, March 2011. [5] Yi Kai-Xiang and Sun Xing et al., “An image encryption algorithm based on chaotic sequences,” Journal of Computer Aided Design and Computer Graphics, Vol. 12, No. 9, 2000, pp. 672-676 [6] W. Lee, T. Chen and C. Chieh Lee, "Improvement of an encryption scheme 1.V.Deepthi Pursuing M.Tech(DSCE) from for binary images," Pakistan Journal of JayaPrakash Narayana College of Engineering Information and Technology. Vol. 2, no. B.Tech(ECE) from JayaPrakash Narayana College 2, 2003, pp. 191-200.. of Engineering Currently she is working as [7]. A. Mitra, Y V. Subba Rao, and S. R. M. Assistant Professor at Jayaprakash narayan college Prasnna, "A new image encryption of engineering And has 2 years of Experience in approach using combinational permutation teaching . Her areas of interest include,Image techniques," Journal of computer Science, Processing ,wireless networks, signal processing Vol. 1, no. 1, 2006, p.127. [8] B. Mohammad Ali and J. Aman," Image Encryption Using Block-Based Transformation Algorithm," IAENG Int. Journal of Computer Science, Vol. 35, Issue 1, 2008, pp. 15-23. [9] S. K. Panigrahy, B. Acharya, and D. Jena, “Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm,” 1st 2. Dr. Sandeep V.M. completed Ph.D in Faculty of International Conference on Advances in Electrical and Electronics Engineering, Sciences, Computing, Chikhli, India, 21-22 from Visveswaraiah Technological University, February 2008. Belgaum, and M.Tech from Gulbarga University [10] S. R. M. Prasanna, Y. V. Subba Rao and and B.Tech from Gulbarga University. His research A. Mitra, “An Image Encryption Method interests are in the areas of Signal and Image with Magnitude and Phase Manipulation Processing, Pattern Recognition, Communication, using Carrier Images,” International Electromagnetics. He is Reviewer for Pattern Journal of Computer Science, Volume 1, Recognition Letters (PRL). He acted as Reviewer Number 2, February 20, 2006 for many International Conferences.He has 24 [11] W. Zeng and S. Lei, “Efficient Frequency years of teaching experience. He is member of Domain Selective Scrambling of Digital LMIST – Life Member Instrument Society of India Video,” IEEE Trans. Multimedia, 2002. (IISc, Bangalore). And he guided more than 100 [12] Li. Shujun, and X. Zheng "Cryptanalysis projects at UG level and 35 at PG level.And of a chaotic image encryption method," published more than 10 papers in international Inst. of Image Process, Xi'an Jiaotong journals and 9 Conference Proceedings. Univ., Shaanxi, This paper appears in: Circuits and Systems, ISCAS 2002. IEEE International Symposium on Publication Date: 2002, Vol. 2, 2002, pp. 708-711. [13] A. Sinha, K. Singh, “A technique for image encryption using digital signature,” Optics Communications, 2003, pp. 1-6 [14] W. Zeng and S. Lei, “Efficient Frequency Domain Selective Scrambling of Digital Video,” IEEE Trans. Multimedia, 2002. [15] S. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave and optical technology letters, Vol. 21, No. 5, June 5 1999, pp. 318-322. 1311 | P a g e