Proposed Method of Cryptographic Key Generation For Securing Digital Image

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

2012, I J ARCSSE All Rights Reserved Page | 285

Volume 2, Issue 10, October 2012 ISSN: 2277 128X


International Journal of Advanced Research in
Computer Science and Software Engineering
Research Paper
Available online at: www.ijarcsse.com
Proposed Method of Cryptographic Key Generation for
Securing Digital Image
Amrita Sahu
*
, Yogesh Bahendwar, Swati Verma, Prateek Verma
Departmentof Electronics & Telecommunication
CSVTU,
Chhattisgarh, India

Praveen Verma
Asst. Manager, NTPC
Chhattisgarh, India

Abstract I n the digital world, security is an important issue, and encryption is one of the ways to ensure security.
This paper presents image encryption/decryption scheme using biometric template (Palm Print). The proposed scheme
is especially useful for encryption of large amounts of data, such as digital images using proposed key generation
algorithm. This scheme satisfies the characters of convenient realization, less computation complexity and good
security. The salient features of the proposed image encryption method are loss-less, asymmetric public key
encryption, a very large number of secret keys, and key-dependent pixel value replacement.[2]
Keywords I mage processing, Biometric, Image encryption and decryption, Palm Print.
I. INTRODUCTION
Security is an important issue in communication and storage of images, and encryption is one the ways to ensure
security. Image encryption has applications in internet communication, multimedia systems, medical imaging,
telemedicine, and military communication. However, Images are different from text. Although we may use the traditional
cryptosystems (such as RSA and DES) to encrypt images directly, it is not a good idea for two reasons. One is that the
image size is almost always greater than that of text [8]. Therefore, traditional cryptosystems need much time to encrypt
the image data. The other problem is that the decrypted text must be equal to the original text. Due to the characteristic of
human perception, a decrypted image containing small distortion is usually acceptable. The main idea behind the present
work is that an image can be viewed as an arrangement of bits, pixels and blocks. The intelligible information that is
present in an image is because of the correlations among the bits, pixels and blocks given in the arrangement [8, 9]. In
order to transmit secret images to other people, a variety of encryption schemes have been proposed. Schemes that we
analyze here can be classified into three major types: position permutation [4, 5], value transformation [1, 2, 3, 6] and
visual transformation [4].
Because of the scheme based on bit wise XOR, it is easily implemented and highly efficient to quickly encrypt
and decrypt image messages. The asymmetric encryption mechanism makes the encrypted data more secure.
The rest of the paper is as follows. Section 2 gives survey of some related image cryptosystems. Section 3 gives
characteristics of an image cryptosystem. Section 4 describes a proposed key generation algorithm and process of
encrypting and then decrypting an input image. Experimental results and conclusions are given in section 5 and section 6,
respectively. The encryption keys in are generated using low-level combination of biometric features and cryptology.
Reliability in computer aided personal authentication is becoming increasingly important in the information-based world,
for effective security system. Biometrics is physiological characteristics of human beings, unique for every individual
that are usually time invariant and easy to acquire. Palm print stable and unique characteristics amongst other biometric
features. It is the rich information of palm print which offers one of the powerful means in personal recognition.
II. RELATED IMAGE CRYPTOSYSTEMS
According to the differences between image and text, recently there have been several innovative encryption techniques:
A Technique for Image Encryption using Digital Signatures
Alok Sinha and Kehar Singh [1] proposed a new technique for encryption an image for secure image transmission. The
digital signature of the original image is then added to the encoded version of the original image. Image encoding is then
done by using an appropriate error control code, such as a Bose- Chaudhuri Hochquenghem (BCH) code. After the
decryption of the image, the digital signature can be used to verify the authenticity of the image at the receiver end.

A. A new Image encryption algorithm based on vector quantization
C-C Chang (2001) [3] proposed a fast image encryption algorithm based on vector quantization (VQ), cryptography and
number theorems. In VQ, the image was first decomposed into vectors and the sequentially encoded vector by vector.
Amrita et al., I nternational J ournal of Advanced Research in Computer Science and Software Engineering 2 (10),
October- 2012, pp. 285-291
2012, I J ARCSSE All Rights Reserved Page | 286
Then traditional cryptosystem from commercial applications was used, for enhancing security and reducing the
computational complexity of encryption/decryption, some number theorems were applied. VQ is an efficient approach to
low bit-rate image compression, therefore speeds up the encryption process and achieve high security [12]


B. A New Chaotic Image Encryption Algorithm
Jui-Cheng Yen and Jiun-In Guo [5] proposed a new image encryption scheme based on a chaotic system. In that method,
an unpredictable chaotic sequence is generated. It is used to create a binary sequence again. According to the binary
sequence, an images pixels are rearranged. This algorithm has four steps. Step-1 determines a chaotic system and its
initial point x(0), row size M and column size N of the image f, iteration number no, and constants , ?, and used to
determine the rotation number. Step-2 generates the chaotic sequence from the chaotic system. Step-3 generates the
binary sequence. Step-4 includes special functions to rearrange image pixels.

C. Colour Image Encryption Using Double Random Phase Encoding
Shuqun Zhang and Mohammad A. Karim [6] have proposed a new method to encrypt color images using existing optical
encryption systems for grayscale images. The color images are converted to their indexed image formats before they are
encoded. In the encoding subsystem, image is encoded to stationary white noise with two random phase masks, one in
the input plane and the other in the Fourier plane[13]. At the decryption end, the color images are recovered by
converting the decrypted indexed images back to their RGB (Red-Green- Blue) formats.

D. Visual Cryptography for Colour Images
Visual cryptography uses the characteristics of human vision to decrypt encrypted images. It needs neither cryptography
knowledge nor complex computation. For security concerns, it also ensures that hackers cannot perceive any clues about
a secret image from individual cover images. Young-Chang Hou [7] have proposed three methods for visual
cryptography. All these proposed methods belong to symmetric key cryptosystem, they are vulnerable in case they
employ the unique key in their proposed system (Jinn- Ke Jan, 1996). Here, we propose a novel asymmetric image
encryption scheme. Using certain matrix transformation to create a novel asymmetric block encryption scheme, all the
pixels and frequencies in each block of the original image are scrambled. Our method can achieve the following two
goals. One is that it is easily implemented and highly efficient to quickly encrypt and decrypt image messages based on
matrix transformation. The other is that asymmetric encryption mechanism makes the encrypted data more secure.

III. CHARACTERISTICS OF AN IMAGE CRYPTOSYSTEM
For studying image encryption, we must first analyze the implementing differences between image and text data:
1) When cipher text is produced, the decrypted text must be equal to the original text in a full lossless manner. This
requirement is not necessary for image, the cipher image can be decrypted to a original image in some lossy
manner.
2) Text data is a sequence of words, it which can be encrypted directly by using block or stream ciphers. However,
digital image data are represented as 2D array.
3) Since the storage space of a picture is very large, it is inefficient to encrypt or decrypt image directly. One of the
best methods is to only encrypt/decrypt information that is used by image compression for reducing both its
storage space and transmission time.
For privacy, an unauthorized user can not disclose a message. For integrity, an unauthorized user can not modify or
corrupt a message. For availability, message is made available to authorized users faithfully. A perfect image
cryptosystem is flexible in the security mechanism, has high overall secure performance, the image security requires
following characteristics [8]:
1) The encryption system in use should be computationally secure. It requires a extremely long time to attack,
unauthorized user should not be able to read privileged image.
2) Encryption and decryption should be fast enough not to grade system performance. The algorithm for
encryption and decryption must be simple enough to be done by user in personal computer.
3) The security mechanism must be as widespread as possible.
4) The security mechanism should also be flexible.
5) There should not be a large expansion of encrypted image data.
IV. PROPOSED KEY GENERATION ALGORITHM

1) A palm image is taken and divided into n number of pixels such that each pixel possesses 24 bit size.
2) Based on the RGB component, pixels binary value is calculated.
3) Now binary to decimal conversion occurs.
4) Here we have decimal value of each pixel
5) Then we group the pixels such that all group consists of equal numbers of pixels
6) Rms value of each group is calculated.
7) Again grouping of above calculated rms value is done whose rms value is calculated.
Amrita et al., I nternational J ournal of Advanced Research in Computer Science and Software Engineering 2 (10),
October- 2012, pp. 285-291
2012, I J ARCSSE All Rights Reserved Page | 287
8) We repeat the process of grouping and calculating rms value until we get the rms value of 5-10 pixels. For
example if we have number of 1000 pixels in an image then after calculating its decimal value followed by
binary value, we group pixels in 100 numbers, each group consisting of 10 pixels. It means we have 100 groups
of pixels. Of each group we calculate the rms and so here we have 100 rms values. Now again we group 100
rms values into 10 groups each group consisting of 10 pixels whose rms value is calculated.
9) Calculated rms vaue is converted into ASCII format(string of characters) which is called as password or key
value.
The objective of Biometric Encryption algorithm is to provide a mechanism for the linking and subsequent retrieval of a
digital key using biometric such as palm print. This digital key can then used as cryptography key.

A. Encryption
Step1: Taking a matrix of input image as A.
Step2: Taking the matrix of palmprint to be used for encryption as B which is retrieved from the generated
encryption key.
Step3: Calculating bit XOR of A and B.
Step4: Resultant matrix C is the encrypted image.
Saving the encrypted image as bmp file.

B. Decryption
Step1: Taking the matrix of palmprint to be used for decryption as D
Step 2: Calculating bit XOR of C and D.
Step 3: Resultant matrix E is the decrypted image.
Saving the decrypted image as bmp file.

V. EXPERIMENTAL RESULT


Figure 5.1: Layout of Proposed System

Amrita et al., I nternational J ournal of Advanced Research in Computer Science and Software Engineering 2 (10),
October- 2012, pp. 285-291
2012, I J ARCSSE All Rights Reserved Page | 288




Figure 5.2: Taking Input Image



Figure 5.3: Input Image for Encryption



Figure 5.4: Generating Key Using Palm Print for Encryption

Amrita et al., I nternational J ournal of Advanced Research in Computer Science and Software Engineering 2 (10),
October- 2012, pp. 285-291
2012, I J ARCSSE All Rights Reserved Page | 289


Figure 5.5: Generated Key



Figure 5.6: Encrypted Image



Figure 5.7: Encrypted Image For Decryption
Amrita et al., I nternational J ournal of Advanced Research in Computer Science and Software Engineering 2 (10),
October- 2012, pp. 285-291
2012, I J ARCSSE All Rights Reserved Page | 290

Figure 5.8: Generated Key For Decryption


Figure 5.9: Decrypted Image

VI. CONCLUSION & FUTURE SCOPE

In this paper, we proposed a new key generation algorithm based on palm print which is used for encryption and
decryption of an image. Our scheme allows one party to send a secret image to another party over the open network, even
if many eavesdroppers listen. Therefore, we can use our scheme in many applications. Our scheme gives reliable security
[11]. We presented an image encryption/decryption scheme based on bitXOR method in this paper. The salient features
of the proposed asymmetric image encryption scheme can be summarized as: (a) Lossless encryption of image. (b) Less
computational complexity. (c) Convenient realization. (d) Choosing a suitable size of matrix according to the size of
image. (e)Encryption/decryption scheme uses integer arithmetic and logic operations. It requires minimized
computational resources [7].We can implement this type of system in various fields like in Military, Defence, and other
places where the confidentially of data should be must.



Figure 6.1: Application in Military

Amrita et al., I nternational J ournal of Advanced Research in Computer Science and Software Engineering 2 (10),
October- 2012, pp. 285-291
2012, I J ARCSSE All Rights Reserved Page | 291
REFERENCES

[1]. Cancellable biometrics, Information Processing Letters, vol. 93, no. 1, pp. 1-5, 2005.
[2]. C.-S. Laih, and K. Y. Chen, "Generating visible RSA public keys for PKI", International Journal of Information
Security, Vol. 2, No. 2, Springer-Verlag, Berlin, 2004, pp. 103- 109.
[3]. X.Y. Jing and D. Zhang, A face and palmprint recognition approach based on discriminant DCT feature
extraction, IEEE Transactions, vol. 34, no. 6, pp. 2405-2415, 2004.
[4]. X. Wu, D. Zhang, K. Wang, Palmprint classification using principal lines, Pattern Recognition, vol. 37, no. 10,
pp. 1987-1998, 2004.
[5]. C. Poon, and H.C. Shen, Personal identification and verification: fusion of palmprint representations,
Proceedings of International Conference on Biometric Authentication, pp. 782-788, 2004.
[6]. F. Li, M.K.H. Leung and X. Yu, Palmprint identification using Hausdorff distance, in Proceedings of
International Workshop on Biomedical Circuits and Systems, pp. S3/3-S5-8, 2004.
[7]. A. Okatan, C. Akpolat and G. Albayrak, Palmprint verification by using cosine vector, IJSIT Lecture Note of
International Conference on Intelligent Knowledge Systems, vol. 1, no. 1, pp. 111-113, 2004.
[8]. S. Ribaric and N. Pavesic, Multimodal biometric user-identification system for network-based applications,
IEEE Proceedings, 2003, 1-6.
[9]. MS, "Public Key Cryptography-Applications Algorithms and Mathematical Explanations", Tata Elxsi Ltd, 2007.
[10]. C. Chan, and Y. Wu, "A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key
Agreement Scheme", International Journal of Computer Science and Network Security, Vol. 8, No. 4, 2008, pp.
128-132.
[11]. W. Stallings, Cryptography and Network Security-Principles and Practices, Prentice Hall, Inc, 4th Ed., (2006).
[12]. F. Yan, B. Ma, Q.X. Wang, D. Yao, C. Fang and X. Zhou, Information fusion of biometrics based-on
fingerprint, hand-geometry and palm-print in Proceeding of IEEE Workshop on Automatic Identification
Advanced Technologies, pp. 7-8, no. 247-252, 2007.
[13]. T. Connie, A. Teoh, M. Goh and D. Ngo, PalmHashing: a novel approach for Processing, vol. 150, no. 6, pp.
409-416, 2003.

You might also like