IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, November, 2013, Pg. 552-557

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

SCRAMBLED NUMBER GENERATOR FOR SECURE IMAGE TRANSFER Y.Chaitanya Sreeram1, Shaik Abdul Naeem2, Bharath H R3, K.karthikeyan4 1,2,3

School of Information Technology, VIT University, Vellore, TN, India. Email: [email protected] 4

School of Advanced Sciences, VIT University, Vellore, TN, India. Email: [email protected]

Abstract The major function of image enhancement, an important procedure in image processing, is to alter the original image to be more observable for a specific application. The proposed new image message which is encrypted need to overcome some security analysis for image encrypted. The present way of image scrambling technique for a secure data image transfer has some security problems which we will be over coming by our new technique. The security analysis which the image has to overcome is key space analysis, statistical analysis, correlation analysis, differential analysis, key sensitivity analysis. If an image overcome the above analysis methods it is safe from intruders. To overcome all these problems we are proposing a new technique which will help in encrypting the image safely and prevent intruders to decrypt it.

Keywords: image processing, encryption, security analysis, image scrambling, and decryption.

1. Introduction With the development of network information technology, more and more image information spread on the Internet, it has already been the main way that people get information. So the image information security is certainly an important problem. Image scrambling is an important method of image encryption, Its main purpose is to make the target image so scrambled that no one is able to find the true meaning of the image by using human visual system (HVS) or computer system , it is an issue that deserves people do further research. At the same time, due to the open nature of internet, the chances of image information being illegal intercepted, modified and ravaged are also being improved, which makes the security of digital Image information in open network more important. The security of image information is rarely been studied by traditional cryptology perhaps because image stores huge information. But in recent years, with the rapid development of computer technology and especially digital image processing technology, people have obtained some useful results and the Shaik Abdul Naeem, IJRIT

552

security of image is becoming an active research topic involving with mathematics, cryptology and information techniques. The proposed techniques include visual cryptology, information sharing, image scrambling etc. Among many proposed methods for security of image, scrambling Technique is one of the basic means for covering huge image information, which can be used in pre-process or post-process of digital image processing, information hiding, digital watermarking, etc. The main purpose of image scrambling transformation is to generate a chaos image which prevents human visual or computer vision system from understanding the real meaning of the original image, and the scrambled image can be recovered if the operator knows the scrambling method and scrambling variables Security of multimedia information is used to protect the multimedia content from unauthorized access. Cryptography is the technique which is used for secure communication over the network. By using Cryptography technique readable information is converted into unreadable form. Image information is different from the text data, it has larger amount of data, higher redundancy and stronger correlation between pixels. Traditionally developed encryption algorithm such as RSA, DES is suitable for text encryption but not suitable for image encryption directly because of two reasons. One is that the image size is larger than that of text, so the traditional cryptosystems take much time to directly encrypt the image data. The other reason is that the decrypted text must be equal to the original text. However, this requirement is not necessary for image; a decrypted image containing small distortion is acceptable due to human perception. It how original image converted into encrypted image. At present there are many image encryption algorithms are available but these algorithms doesn’t satisfy the requirement of modern cryptographic mechanism and they are prone to attacks. In the recent years, the image encryption has been developed to overcome the above disadvantages. Cryptography is the art and science of protecting information from undesirable individuals by converting it into a form non-recognizable by its attackers while stored and transmitted. Data cryptography mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or unintelligible during transmission or storage called Encryption. The main goal of cryptography is keeping data secure form unauthorized attackers. The reverse of data encryption is data Decryption, which recuperate the original data. Since cryptography first known usage in ancient Egypt it has passed through different stages and was affected by any major event that affected the way people handled information. In the World War II for instance cryptography played an important role and was a key element that gave the allied forces the upper hand, and enables them to win the war sooner, when they were able to dissolve the Enigma cipher machine which the Germans used to encrypt their military secret communications. To overcome all the problems which we are facing in image scrambling and in image security. Here we are proposing a new method which will improve the security of the image which we transfer.

2. Literature survey In the day today life security became one of the greatest tasks. Data sending faith intruders understanding is one of the greatest tasks. Now a day’s sending data without intruders getting it is becoming an important task. So to prevent it there were many methods were proposed to prevent image being hacked and understood by intruders. Some of the best techniques were explained here with some details in it. Digital Signature for Image Authentication One of the first researches on digital signature and its applications in images refers to an article published in 1998 by C. Yung Lin and S. Chang [8]. They proposed a robust digital signature based on DCT coefficients in JPEG images. This generated digital signature is robust to cropping, intensity changes, resizing and applying filters explained by Ye, G.D., Huang, X.L., Zhu, C.Q., 2007.[2]. The act of digital signature is similar to handwritten on paper signature which playing the main role in authenticating documents and verify the identity and is explained by K. Kaneko [5]. Hence, digital signature has many applications in information security. It is a mechanism that providing authentication, data integrity and nonrepudiation Guan Ke, Wang Jianxin, Qi Shumin [6]. The firs concept of digital signature was a scheme based on RSA in many years ago and today is one of the most practical techniques. Most of the digital signatures are based on asymmetric cryptography. In these systems, the private key is used to create a digital signature that uniquely proofs the signer who is holder of the private key and can be authenticated only with the corresponding public key. Public Key Image Encryption In some applications we don’t have a secure channel to transmit the private key or prefer to keep the decryption key secretly, so we have to use public key cryptography. First public key algorithm published by Diffie and Shaik Abdul Naeem, IJRIT

553

Hellman[1][2] in 1976. It was a key exchange practical method for establishing a shared secret key over an authenticated communication channel without using a prior shared secret. Most of traditional public key cryptosystems designed to encrypt textual data and a few were for image data encryption. Some works have been published on public key image encryption, one is proposed by Shuihua et al ,W. Zeng et al, and S. Lei[10]. In this scheme, the plain image divided into blocks using a certain matrix transformation and all pixels in each block transferred to DCT domain. Public key, private key, encryption process and decryption process are defined based on transformation matrix of DCT coefficients.

2.1 SECURITY ANALYSIS OF THE ENCRYPTED IMAGE Use Security analysis is the art of finding the weakness of a cryptosystem and retrieval whole or a part of a ciphered message (in this area, an image) or finding the secret key without knowing the decryption key or the algorithm. There are many techniques for applying analysis, depending on what access the analyst has to the plaintext, cipher text, or other aspects of the cryptosystem. Below are some of the most common types of attacks to encrypted images:

A. Key Space Analysis Try to find the decryption key by checking all possible keys. The number of try to find directly refers to key space of the cryptosystem grow exponentially with increasing key size. It means that doubling the key size for an algorithm does not simply double the required number of operations, but rather squares them. An encryption algorithm with a 128 bit in key size defines a key space of 2128, which takes about 1021 years to check all the possible keys, with high performance computers of nowadays. So a cryptosystem with key size of 128 bit computationally looks robust against a brute force attack.

B. Statistical Analysis Statistical attack is a commonly used method in cryptanalysis and hence an effective cryptosystem should be robust against any statistical attack. Calculating the histogram and the correlation between the neighbors pixels in the source and in the encrypted image are the statistical analysis to prove the strong of the proposed cryptosystem against any statistical attack. Statistical analyzing demonstrates the relation between the original and encrypted image. Therefore, encrypted image must be completely different from the original. Due to Shannon theory, it is possible to solve many kinds of ciphers by statistical analysis. For an image there are some ways to determine whether the ciphered image leaks any information about the original one or not.

C. Correlation Analysis Two adjacent pixels in a plain image are strongly correlated vertically and horizontally. This is the property of an image, the maximum value of correlation coefficient is 1 and the minimum is 0, a robust encrypted image to statistical attack should have a correlation coefficient value of 0.

D. Differential Analysis The aim of this experiment is to determine the sensitivity of encryption algorithm to slight changes. If an opponent can create a small change (e.g. one pixel) in the plain image to observe the results, this manipulation should cause a significant change in the encrypted image and the opponent should not be able to find a meaningful relationship between the original and encrypted image with respect to diffusion and confusion, the differential attack loses its efficiency and become useless.

E. Key Sensitivity Analysis In addition of large enough key space to resist a cryptosystem at brute force attack, also a secure algorithm should be completely sensitive to secret key which means that the encrypted image cannot be decrypted by slightly changes in secret key.

3. Proposed algorithm To overcome all the problems which we are facing in image scrambling and in image security. Here we are proposing a new method which will improve the security of the image which we transfer. To develop it we require a new scrambled number generator which will generate numbers in a random way according to the number count we entered. In the process first the image will be divided into many small minute pieces and numbering will be done according to the pieces generated and made in the original image. Now count the number pieces to which the image is divided into. In the number generator enter the number which we got that is count of number of pieces. The number generator will generate a sequence of scrambled numbers in an order and will generate a key to sender. The system will arrange the image according to the numbers generated in the generator in a particular order. The image Shaik Abdul Naeem, IJRIT

554

which we got now will be different from the original image. To decrypt it the receiver also required to have the scrambled number generator decryptor machine. When we enter the key which we got during the encrypted image sending time. The decryptor will generate the original sequence of the numbers. And arrange the sequence in its original way. If any intruder catches the image in the way it will be difficult for him to decrypt it as the sequence generation will be difficult. He needs to have the key to produce the decryption sequence. If any packet or file is lost in transfer the particular point or file can be transferred again. So it will be an easier and simpler technique for transferring image or file in a secured way. So we will use the following Encryption-Decryption algorithm to overcome the problem which we have specified above.

3.1 Encryption – Decryption Algorithm: Step 1: select the image Step 2: Read the resolution of the image Step 3: Divide the image into small pieces Step 4: Scramble the divided image in a random order. Step 5: Store the random order number of the scrambled image. Step 6: Transfer the scrambled image over the network in the form of packets. Step 7: Collect the packets at the receiver and arrange it in the order. Step 8: Enter the random order number of the scrambled image. Step 9: If the random order key generated at sender coincides with the key which we entered at the receiver then it will decrypt the original image Step 10: otherwise it won’t decrypt the original image.

4. Results and discussion The original image which we will be using for this method to work will be as below. To this image we will be applying this technique and the result will be shown below.

After using the algorithm which we proposed above it will take the original image and divides it into small pieces and then use the count in the scrambled number generator according to the number provided and also will generate an encrypted pin. The processor will automatically arrange the image in an encrypted way with according to the sequence generated. Now each piece can be sent as a packet to the receiver and when the receiver enters the correct encrypted pin then the generator will automatically decrypt the image in a correct sequence. By using this method we will be overcoming many problems like safe and secure image transfer. After implementing the above algorithm in a digital image processing kit. The output will be as Shaik Abdul Naeem, IJRIT

555

The above divided parts of an image will be again scrambled and arranged in the order of the sequence generated in the scrambled number generator according to the parts divided. And will generate a pin which helps us in decoding the image again accordingly. The proposed method will be more efficient, reliable and more secure than the previous existing techniques. Also it is low cost as we need only a scrambled number generator to work. The image will automatically encrypt and allocate its sequence number to itself. During sending of packets also it is reliable as packets will be having their own sequence numbers. If any of the packet get lost during transmission that packet can be traced back and sent easily. It is easier than previous cases.

5. Conclusions This paper proposes a new image scrambling algorithm based on dividing the image into many small minute pieces and arranging them in scrambled positions. This method is improved and applied in the digital image by encryption, then do cross scrambling operation, thus, position of the image bit changes and the whole image changed greatly, and the gray histogram of the scrambling image will be clearly different from the original one. This algorithm is easy to realize, and suitable for encrypt digital image of any size. This method reduces the probability of target image decrypted by the illegal owner and makes the target image more safety. The proposed algorithm shows, the method proposed by this paper is suitable for image encryption transmission. This algorithm to work need a mechanism which will generate a scrambled series of numbers which are allotted to the number of pieces arranged in order at actual image. Now these pieces are scrambled and arranged according to the series generated by the key. After arranging them in generated sequence order it will be different from the original one. It will be difficult to rearrange it in original order without the sequence. To decrypt, it needs the same sequence of pattern numbers to get the original image. This will be one of the best methods for image encryption technique. This method still is enhanced according to the requirements needed.

6. References 1. 2. 3. 4. 5.

K. Wang, W. Pei, L. Zou, A. Song, Z. He, on the security of 3D Cat map based symmetric image encryption scheme, Phys. Lett. A 343 (2005) 432–439. Ye, G.D., Huang, X.L., Zhu, C.Q., 2007. Image encryption algorithm of double scrambling based on ASCII code of matrix element. In: IEEE Internet Conf. on Computational Intelligence and Security, pp. 843–847. Jean-Yves chouinard.,. Design of secure computer systems CSI4138/CEG4394 notes on the advanced encryption standard (AES). M. Ali BaniYounes and A. Jan tan, 2008,Image encryption using block-based transformation algorithm, in IAENG International Journal of Computer Science, Volume 35, Issue 1. K. Kaneko, Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency, Physical D (34) (1989) 1–41.

Shaik Abdul Naeem, IJRIT

556

6. 7. 8.

Guan Ke, Wang Jianxin, Qi Shumin.Information theory and encoding technology[M](in Chinese).Beijing:370 Tsinghua University Press, 2009.8:210-211. D. Qi, “Matrix transformation and its application to image hiding,” Journal of North China University of Technology, vol.11, no.1, pp.24–28, 1999. L. Zhu, W. Li, L. Liao, and H. Li, “A novel algorithm for scrambling digital image based on cat chaotic mapping,” In: Proc. of IIH-MSP '06, pp.601–604, 2006.

Shaik Abdul Naeem, IJRIT

557

scrambled number generator for secure image transfer

... Press, 2009.8:210-211. 7. D. Qi, “Matrix transformation and its application to image hiding,” Journal of North China University of. Technology, vol.11, no.1, pp.24–28, 1999. 8. L. Zhu, W. Li, L. Liao, and H. Li, “A novel algorithm for scrambling digital image based on cat chaotic mapping,” In: Proc. of IIH-MSP '06, pp.601–604, ...

855KB Sizes 0 Downloads 184 Views

Recommend Documents

Scrambled Number Generator For Secure Image ... - IJRIT
The present way of image scrambling technique for a secure data image ... space analysis, statistical analysis, correlation analysis, differential analysis, key ...

Scrambled Number Generator For Secure Image ... - IJRIT
Scrambled Number Generator For Secure Image. Transfer. Y.Chaitanya ... and decryption. Full text: https://sites.google.com/a/ijrit.com/papers/home/V1I1150.pdf.

TinyMT Pseudo Random Number Generator for Erlang
Sep 14, 2012 - vided as a general library for multiple operating systems, since .... 3 On Kyoto University ACCMS Supercomputer System B cluster; the test.

SFMT Pseudo Random Number Generator for Erlang - Kenji Rikitake ...
Erlang/OTP [5] has a built-in PRNG library called random mod- ule. ..... RedHat Enterprise Linux AS V4 of x86_64 architecture5. We chose the five SFMT ... WN time [ms] leciel reseaux thin. Figure 5. Total own time of SFMT gen_rand_list32/2 for 10 cal

Adaptively Secure Oblivious Transfer
cult to discover the cleartext, it binds the sender and receiver to the cleartext. .... (sender/receiver/prover/committer) is corrupted. ..... \Plug-And-Play Encryption.

TinyMT Pseudo Random Number Generator for Erlang
Sep 2, 2012 - Now default PRNG for Python and R. Kenji Rikitake / Erlang ... A) Generate a 32-bit integer random number R. B) Compute Q which is the ...

SFMT Pseudo Random Number Generator for Erlang - Kenji Rikitake ...
List of sfmt-erlang exported functions referred in this paper. 128-bit shift registers. ..... and does not effectively utilize the concurrent and parallel nature of. Erlang.

A recipe for an unpredictable random number generator
mean-square distance from the origin of the random walk as a function of the number of .... Using this method we have generated a very long sequence of random ... 1010. 100. 101. 102. 103. 104. 105 log(N) log. (a). 101. 102. 103. 104.

TinyMT Pseudo Random Number Generator for Erlang - Kenji Rikitake ...
Sep 14, 2012 - Statistics]: Random Number Generation. General Terms Algorithms, Performance. Keywords .... Table 1 shows a list of tinymt-erlang major exported functions referred in this paper. Figure 1 shows the ..... hiroshima-u.ac.jp/~m-mat/MT/ART

A NOVEL SECURE IMAGE STEGANOGRAPHY.pdf
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... A NOVEL SE ... GRAPHY.pdf. A NOVEL SE ... GRAPHY.pdf. Open. Extract. Open with. Sign In. Main

A fast optimization transfer algorithm for image ...
Inpainting may be done in the pixel domain or in a transformed domain. In 2000 ... Here f and n are the original noise-free image and the Gaussian white noise ...... Step: δ t=0.08. Step: δ t=0.04. Step: Linear Search. Our Method. 0. 100. 200.

Scrambled Animal Sentences.pdf
Page 1 of 7. snakes are. oviparous because. they lay. Page 1 of 7. Page 2 of 7. eggs birds. have feathers. and a. Page 2 of 7. Page 3 of 7. beak zebras. are white.

How to Break a \Secure" Oblivious Transfer Protocol
destruction of data, resources, and dependability. Proofs are ... the same problem, but our analysis shows how to break Rabin's protocol in a network of .... may seem secure when used only once, subtle aws such as these preclude its use.

Show and Tell: A Neural Image Caption Generator - The Computer ...
The main inspiration of our work comes from recent ad- vances in machine translation, where the task is to transform a sentence S written in a source language, ...

Transfer Learning and Active Transfer Learning for ...
1 Machine Learning Laboratory, GE Global Research, Niskayuna, NY USA. 2 Translational ... data in online single-trial ERP classifier calibration, and an Active.

PartBook for Image Parsing
effective in handling inter-class selectivity in object detec- tion tasks [8, 11, 22]. ... intra-class variations and other distracted regions from clut- ...... learning in computer vision, ECCV, 2004. ... super-vector coding of local image descripto

PartBook for Image Parsing
effective in handling inter-class selectivity in object detec- tion tasks [8, 11, 22]. ... automatically aligning real-world images of a generic cate- gory is still an open ...

Minecraft Generator Rex Roleplay Generator 742 - PDFKUL.COM
Minecraft Hacked Games next game, channel for Code Generator Minecraft Hive Premium Hack Downloadgame today, Code Generator. Minecraft Generator Recipe what time do the Free Game Generator Codes Minecraft Games Online MultiplayerVideo Games Code. Gen

SECURE NEGOTIATIONS FOR MOBILE AGENT ... - Sapao.net
rity challenges [Chess, 1998]. Among these are ... Agent Places: an agent place is a server appli- cation where ..... Internet Computing, pages 40-48. [Yee and ...

SECURE NEGOTIATIONS FOR MOBILE AGENT ... - Sapao.net
autonomous agents to roam around virtual stores and find desired products ... (owner) wants to send an agent to a virtual store ..... S. M., and Buttyan, L. (2000).

Sign Generator For Minecraft 825
... discussion about Minecraft, Minecraft development and anything that doesn't fit ... Codes on Android phone, Code Generator Minecraft Account Hack 2017.

Improved generator objectives for GANs
[2] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil. Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Z. Ghahramani,. M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, editors