Paper-4 Compact Image Encryption Method For Flexible Security
Paper-4 Compact Image Encryption Method For Flexible Security
6 ISSN: 1837-7823
Abstract
Multimedia has become an inevitable part of any presentation. It has found a variety of applications right from entertainment to education. The evolution of internet has also increased the demand for multimedia content. Security and storage are the major concerns while transmitting multimedia content over the computer networks. This paper presents a new image encryption technique which ensures both security and storage efficiency. It involves substitution-based block cipher that considers an image to be encrypted as bit-stream. Key words: Image encryption, Block cipher, Compression, Types of compression, Block substitution.
1. Introduction
One of the main applications of image encryption is to transmit the image securely over the network such that no unauthorized user should be able to decrypt the image [4]. Image is a data type which requires enormous storage capacity or transmission bandwidth due to the large amount of data involved. As communication bandwidth and storage are limited, image is mostly subjected to compression after digitization. The basic objective of a data compression algorithm is to reduce the redundancy in data representation so as to decrease the data storage requirement. Data compression also provides an approach to reduce communication cost by effectively utilizing the available bandwidth. Data compression becomes important as file storage becomes a problem. In general, data compression consists of taking a stream of symbols and transforming them into codes. If the compression is effective, the resulting stream of codes will be smaller than the original symbols. To provide secure communication and ensure privacy, many image encryption algorithms have been proposed recently. In this paper, a new image encryption technique is introduced to achieve two goals efficiently i.e. security and storage efficiency. Security is achieved by block substitution, which induces high confusion to the intruder [3]. Lossless compression ensures storage efficiency and rate of compression completely depends on the pattern of image. This lossless compression has uses in medical, scientific and professional video processing applications.
33
International Journal of Computational Intelligence and Information Security, July 2012 Vol. 3, No. 6 ISSN: 1837-7823
In the proposed scheme, initially pixels are extracted from image. This stream of pixels is considered as source bitstream. The source bit-stream is decomposed into blocks of equal length i.e.8. From those blocks, distinct blocks are identified and for each distinct block, replaced code is generated [1][2]. These replaced codes are substituted in source bit-stream to get cipher bit-stream. Then key is formed based on information related to distinct blocks. Using key, cipher text is decrypted to produce source bit-stream, from which image is retrieved. It can be described by the figure1.
2.2.2.2 Key Generation Key plays a vital role in decryption process, as accurate key decrypts ciphertext to produce accurate plaintext. Key contains 3 segments. 1st segment denotes length of the blocks, while 2nd segment contains number of distinct blocks appeared in source bits stream, 3rd segment holds set of all distinct bit blocks with their proper length and sequence, that occurs in source bits stream.
34
International Journal of Computational Intelligence and Information Security, July 2012 Vol. 3, No. 6 ISSN: 1837-7823 If L bit blocks is taken for encrypting source bit stream. Find out an integer; say d for which 2d-1 L 2d 1. Key structure is shown in table 1.
This stream of pixels is decomposed into blocks of 8- bit length. Distinct blocks are identified and sorted in ascending order according to their frequency of appearance. Then replaced code is computed for each distinct block as shown in the table 2. 35
International Journal of Computational Intelligence and Information Security, July 2012 Vol. 3, No. 6 ISSN: 1837-7823
Rate of compression = (1- cipher bit-stream length /source bit-stream length)* 100 Here, Rate of compression = (1-508/1024)*100 Hence, an image is compressed approximately to 50%.
2.2.4.2 256x256 image
The stream of binary pixels, which is of length 65536 bits is extracted from the image ( of size 256X256). Distinct blocks and replaced codes are computed as shown in table 3. After substituting replaced codes in source bit-stream, cipher is generated (length 40945) Rate of compression = (1-40945/65536)*100 Hence, an image is compressed approximately to 38%. These experimental results are tabulated in table 4.
36
International Journal of Computational Intelligence and Information Security, July 2012 Vol. 3, No. 6 ISSN: 1837-7823
3.2 Tables
Table 1: Key Structure
Segment 1st
Size D
2nd
n bits binary form of the number of distinct blocks appeared in source-bitstream(count starts from 0).
3rd
L*N
All distinct blocks with their proper sequence and length ,i.e ,L
37
International Journal of Computational Intelligence and Information Security, July 2012 Vol. 3, No. 6 ISSN: 1837-7823
S.no 1 2
38
International Journal of Computational Intelligence and Information Security, July 2012 Vol. 3, No. 6 ISSN: 1837-7823
References
[1]
[2]
[3] [4]
Pranam Paul, Saurabh Dutta, A K Bhattacharjee, Enhancement of Security through an Efficient Substitution-based Block Cipher of Bit-level Implementation with Possible Lossless Compression Vol. 8 No. 4 pp. 318-326. Pranam Paul, Saurabh Dutta, A. K. Bhattacherjee, An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression, International Journal of Computer Science and Network Security, Vol. 8 No. 2, pp 291 299. Bruce Schneier, Applied Cryptography, John Wiley & Sons (Asia) Pte Ltd, ISBN 9971-51-348-X. Digital Image Processing by Jayaraman, Esakkirajan and Veerakumar Tata McGraw Hill.
39