A Novel Approach of Image Scrambling Using M-Sequence Generator

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: [email protected] Volume 3, Issue 3, March 2014 ISSN 2319 - 4847

A NOVEL APPROACH OF IMAGE SCRAMBLING USING M-SEQUENCE GENERATOR


Anup1, Akash2 , Abhishek3, Padmakar4, Priyanka5, Suchita6
Guru Nanak Institute of Engineering and Technology, Nagpur

Abstract
Image scrambling is a method for securing the image by scrambling the image into an unintelligible format so that it cannot be recognized by any other person except the one who has the authority to use the image. This paper focuses on a new image scrambling algorithm which introduces a new parameter based on random M-sequence generator. Image scrambling using Msequence generator is a desktop application for providing security to the images from getting into the hands of unauthorized user. The user has the authority to change the security keys, which indicates the number of shift operations to be carried out to generate many different M-sequences. This makes the scrambled images difficult to be judged and thereby providing a high level of security for the image data. M-sequence algorithm can encrypt the 2-D images in one step. This paper analyzed that the scrambling performance of the new algorithm is statistic. The conclusion of this paper indicates that the new algorithm can provide a high level security owing to the strong irregularity of sorting transformation . The paper results in good performance of the various crypto graphical attacks such as filters (data loss) and noise attacks. The algorithm can also be applied in the realtime applications and digital communications as it is a straightforward mechanism and easy to implement.

Keywords: Image scrambling algorithm; maximum length sequence; M-sequence.

1. Introduction
Rapid growth in network community makes information security an important issue as a large amount of images and videos with business and private information are shared in the network. Information security becomes an important topic for all including individuals, business and government. Security of image or video becomes necessary in military applications and security communication. This paper deals only with image security which proposed an image scrambling method based on M-Sequence.. Necessity to secure an image is essential as a lot of private images need to be communicated between two authorized parties. In telecommunications, a device that transposes signals or otherwise encodes a message at the transmitter to make the message in an unintelligible form at the receivers end, not equipped with an appropriately set descrambling device is called as scrambler. Image Scrambling is basically a tool that converts an original image into a form that is not easily understood and identifiable by a third unauthorized party. This image can also be descrambled by a reverse process. The key algorithm used in this paper is Maximum length Sequence algorithm abbreviated as M-Sequence algorithm which is a type of pseudorandom binary recursive sequence. M-Sequence is widely used in digital communication. In a large amount of all kind of image scrambling algorithms, the image scrambling algorithms based on M-Sequence have attracted more and more attention since they have large secret key size- and can provide a high level of security. M-Sequence is a sequence of random numbers generated which acts as a key in providing security. M-Sequence generated is represented in a matrix form which is decided on the basis of image size. Depending upon the sequence, the pixels of image are shuffled to give a scrambled image.

2. LITERATURE REVIEW
Among some previous proposals available for the security of image data are mentioned in this paper. The mechanism of image scrambling scheme given by Shujun Li et al [1], without bandwidth expansion has given the idea of image encryption process as to consider the entire 2-D multimedia data as a 1-D textual bit-stream and any conventional cipher that has been established in modern cryptography, such as AES DES, IDEA,, etc can be applied. This solution is called naive encryption. However, this paper draws a conclusion that it is not more secure against various attacks, such as cipher text-only attack, known/chosen-plaintext attack and chosen cipher text attack. Also, a large number of cryptanalysis works have shown that these permutation-based image encryption schemes are not much secured from the crypto graphical attacks of images. On the other hand, LIU Xiangdong et al [2] approached an idea that many of the proposed chaotic image scrambling methods is based on the construction of a chaotic sequence of real numbers which is then somehow threshold quantized so that it can provide the permuting address codes. There are mainly three kinds of image scrambling types which are, scrambling in the space domain, scrambling in the frequency domain, and scrambling in the color or grey domain. This

Volume 3, Issue 3, March 2014

Page 261

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: [email protected] Volume 3, Issue 3, March 2014 ISSN 2319 - 4847

image scrambling scheme generates the permuting address codes by sorting directly the chaotic sequence and not by threshold quantizing the chaotic sequence. This scheme does not require having any knowledge about the distribution of chaotic orbits in advance, so one can select and use an arbitrary chaotic model to generate chaotic sequences, thus expanding the secret key space of the algorithm tremendously. Though the algorithm can provide a high level security owing to the strong irregularity of sorting transformation, it decreases iterations greatly. Also an existing paper of image scrambling algorithm proposed by Vicong Zhou et al [3], gave an approach of using parameter based M-sequence, introducing a new parameter based M-sequence which can be produced by a series shift registers. The user can change the security keys, r, which indicates the number of shift operations to be implemented, to generate many different M-sequences. This makes the scrambled images difficult to decode thus providing a high level of security protection for the images. It also shows good performance in the image attacks such as data loss and noise attacks. The algorithm can be applied in the real-time applications since it is a straightforward process and easily implemented.

3. PROBLEM DEFINITION
With the development of new technologies multimedia applications have grown rapidly in past few years. This has led to the increased importance of security. Importance of security is important in the field of both communication and storage of data (documents, videos, images, etc). There is much software available for image scrambling today .After studying them we found that they encountered certain problems which did not provide complete security to the images. Some of the major common problems are as follows: 1. They suffer from noise attack. 2. The scrambling speed is too slow. 3. After de-scrambling there is certain loss of data. As per paper [1], this image scrambling algorithm is not secured against various crypto graphical attacks, chosen plain text attack, cipher text only attack and chosen cipher text attack. The major problem was the speed of scrambling. According to paper [2], this algorithm has higher complexities scrambling an image. Another problem in this method was that if the image to be scrambled is relatively simple and has large amount of gray scale area then the scrambled image makes it easier for the hacker to judge the scrambling method and thereby reducing the security of the scheme. As per paper [4], this method of scrambling the image affects the quality of image and hence suffers from data loss.

4. METHODOLOGY
The implementation of this scrambling method is as follows: 1. Read the input image, and the size of the image will be, Size M = Rows*Column. 2. Generate a random M-Sequence matrix using random numbers depending upon the specific range and size of the image. 3. Using the M-Sequence matrix, replace the element positions of the matrix and apply it into the image. This gives the scrambled image. 4. For de-scrambling we follow the reverse procedure and we can get the original image back as it was.

Fig.1 Flow chart for overall process of scrambling an image Figure 1 illustrates the architectural view of image scrambling process where a digital image is taken as an input. The MSequence generated using M-Sequence generator is applied over the original image. This shuffles the pixel position of the original image resulting into a scrambled image as the output.

Volume 3, Issue 3, March 2014

Page 262

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: [email protected] Volume 3, Issue 3, March 2014 ISSN 2319 - 4847

Fig.2 Flow chart for image scrambling process Figure 2 shows flowchart for image scrambling process. It illustrates that the image is initially read and then the MSequence is applied on it and the image is scrambled. Inverse is the process for descrambling.

5. PROPOSED ALGORITHM
This algorithm generates a sequence of unique random numbers that act as key element for security. This generated sequence is organized in a format of matrix consisting of rows and columns which is then inserted into the matrix form of original image. This shuffles the pixel position of the image to produce the required scrambled image. Algorithm for M-Sequence generation is as follows: M-Sequence is a Maximum-Length Sequence that will generate a random array of numbers arranged in rows and columns. 1. It will generate key size which is equal to the size of image and key size contains the random integer values. 2. These random values will be then replaced into the original image pixel elements and by using position shuffler/scramble it will shuffle the elements in it. 3. This results the output image in the scrambled form which cannot be predicted by any normal person. The method chosen for image scrambling is M-Sequence Generator because of its following advantages: 1. After de-scrambling there no data loss. 2. Shows good performance in the noise attacks. 3. Can be applied in the real-time applications since it is a straightforward process. 4. Easily implemented.

Fig.3 Implementation of scrambler

Volume 3, Issue 3, March 2014

Page 263

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: [email protected] Volume 3, Issue 3, March 2014 ISSN 2319 - 4847

Figure 3 illustrates the following steps in the image scrambling process: 1. An image is read that is generating the matrix form of image. 2. M-sequence is generated to obtain the keys for security. 3. Then, scrambling is performed over the image to convert it into an un-intelligible format which is difficult to decode. 4. For the end user to get the original image de-scrambling is performed. 5. Descrambling is a reverse procedure of scrambling process. The M-sequence is inversely applied over the scrambled image resulting into an original image which is called as de-scrambled image or un-scrambled image.

6. RESULTS

Fig.4 Snapshot of M-Sequence algorithm. 1. First read the value for maximum sequence length. 2. Next, print it. 3. Now enter the maximum value that user wants for maximum sequence length. (Max length is specified in advance so that the user knows beforehand what the limit for sequence is.) 4. Random class automatically generates the random integers. 5. Now we need to check whether the sequence generated is unique or not. For that we check whether the sequence number already exists in the array list .If it is already present the discard the number else add it to the array list.

Fig.5 Original image

Fig.6 Scrambled image

As shown in figure 5, in order to secure this image, we apply an image scrambling mechanism, and the image will be scrambled as shown in figure 6, which cannot be predicted by any person.

7. CONCLUSION
This desktop application provides security to the images from unauthorized access by converting it into a format which is not easily understood by other user except the one who has the authority to use the image. With this software user now has the authority to keep his images protected which are meant for private purpose. The scrambled images are difficult to

Volume 3, Issue 3, March 2014

Page 264

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: [email protected] Volume 3, Issue 3, March 2014 ISSN 2319 - 4847

decode unless the user has the authority and authentication for its usage. Since the size of the M-Sequence matrix is larger and random, so the probability of estimating such sequence will be 10^6 years for decoding a single image. Hence we can conclude that due to high security and low complexity of this application for estimating such a sequence to unscramble the image will be practically impossible. Our future work will involve development and experimentation of a system using videos. This software can also be applied on social networking sites.

References
[1] Shujun Li, Chengqing Li, Kowk-Tung Lo, Member, IEEE and Guanrong Chen, Fellow, IEEE. Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. [2] LIU Xiangdong, Zhang Junxing, Zhang Jinhai, He Xiqin Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation. World Journal of Science and Technology 2.3 (2004). [3] Zhou Yicong K. A. R. E. N. Panetta, and Sos Agaian. "An image scrambling algorithm using parameter bases Msequences." Machine Learning and Cybernetics, 2008 InternationalConference on. Vol. 7. IEEE, 2008. [4] Deng, Fengsen and Bingxi Wang. A novel technique for robust image watermarking in the DCT domain. Neural Networks and Signal Processing, 2003. Proceeding of the 2003 International Conference on. Vol. 2. IEEE, 2003. [5] Nemade, Varsha S., and R. B. Wagh. "Review of different image encryption techniques." World Journal of Science and Technology 2.3 (2012). [6] Premaratne, Prashan, and Malin Premaratne. "Key-based scrambling for secure image communication." Emerging Intelligent Computing Technology and Applications. Springer Berlin Heidelberg, 2012. 259-263

AUTHOR
Akash, Abhishek, Padmakar, Priyanka, Suchita, All are the students of final year (CSE), GNIET, Nagpur. Mr. Anup P. Dhamgaye received B.E. degree from Kavikulguru Institute of Technology and Science, Ramtek, Dist. Nagpur, State Maharashtra. He has received Master of Engineering (M.E) in Wireless Communication and Computing from G.H. Raisoni College of Engineering, Nagpur, Maharashtra, India. His research areas include Wireless Network Security, Vehicular Adhoc Network and Image security.

Volume 3, Issue 3, March 2014

Page 265

You might also like