image encryption techniques using chaotic schemes

39 downloads 15920 Views 327KB Size Report
encryption techniques based on chaotic schemes has been dealt in the present .... A Technique for Image Encryption using Digital Signatures, 2003.
Monisha Sharma et. al. / International Journal of Engineering Science and Technology Vol. 2(6), 2010, 2359-2363

IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES: A REVIEW Monisha Sharma, Reader, Electronics and Telecommunication Department, Shri Shankarcharya College of Engineering and Technology, Bhilai, India Email: [email protected] Manoj Kumar Kowar, Principal, Bhilai Institute of Technology, Durg, India Email: [email protected] ABSTRACT Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can have confidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. Digital images are widely used in various applications, that include military, legal and medical systems and these applications need to control access to images and provide the means to verify integrity of images. Keywords—image encryption, chaotic schemes INTRODUCTION: The most ancient and basic problem of cryptography is secure communication over an insecure channel. Party A wants to send to party B a secret message over a communication line, which may be tapped by an adversary. The recent advances in technology, especially in computer industry and communications, allowed potentially enormous market for distributing digital multimedia content through the Internet. However, the proliferation of digital documents, image processing tools, and the worldwide availability of Internet access has created an ideal medium for copyright fraud and uncontrollable distribution of multimedia such as image, text, audio, and video content [2]. Another major challenge now is how to protect the intellectual property of multimedia content in multimedia networks. To deal with the technical challenges, the two major image security technologies are under use: (a) Image encryption techniques to provide end-to-end security when distributing digital content over a variety of distributions systems, and (b) Watermarking techniques as a tool to achieve copyright protection, ownership trace, and authentication. In this paper, the current research efforts in image encryption techniques based on chaotic schemes are discussed. SECURITY ISSUE: Multimedia security in general is provided by a method or a set of methods used to protect the multimedia content. These methods are heavily based on cryptography and they enable either communication security, or security against piracy (Digital Rights Management and watermarking), or both. Communication security of digital images and textual digital media can be accomplished by means of standard symmetric key cryptography. Such media can be treated as binary sequence and the whole data can be encrypted using a cryptosystem such as Advanced Encryption Standard (AES) or Data Encryption Standard (DES) [3]. In general, when the multimedia data is static (not a real-time streaming) it can treated as a regular binary data and the conventional encryption techniques can be used. Deciding upon what level of security is needed is harder than it looks. To identify an optimal security level, the cost of the multimedia information to be protected and the cost of the protection itself are to be compared

ISSN: 0975-5462

2359

Monisha Sharma et. al. / International Journal of Engineering Science and Technology Vol. 2(6), 2010, 2359-2363 carefully. At present, there are many available image encryption algorithms such as Arnold map, Tangram algorithm[5], Baker’s transformation[6], Magic cube transformation[7], and Affine transformation[8] etc . In some algorithms, the secret-key and algorithm cannot be separated effectively. This does not satisfy the requirements of the modern cryptographic mechanism and are prone to various attacks. In recent years, the image encryption has been developed to overcome above disadvantages as discussed in [2, 3, and 4].

IMAGE ENCRYPTION TECHNIQUES: In this section, a few newly proposed techniques for image encryption, based on chaotic schemes which will improve the complexity of algorithm as well as make the key stronger has been introduced. First section deals with already existing image encryption techniques based on chaotic schemes in spatial domain where as latter part deals with some paper in frequency domain. Spatial domain: A New Block Image Encryption Algorithm by Fridrich, 1997 Jiri Fridrich [9] presented an encryption algorithm that adapted certain invertible chaotic two-dimensional maps to create new symmetric block encryption schemes. This scheme is especially useful for encryption of large amount of data, such as digital images A New Mirror-Like Image Encryption Algorithm and Its VLSI Architecture, 1999 Jiun-In Guo and Jui-Cheng Yen in [10] have presented an efficient mirror-like image encryption algorithm. Based on a binary sequence generated from a chaotic system, an image is scrambled according to the algorithm. This algorithm possesses low computational complexity, high security and no distortion. A New Chaotic-Like Image Encryption Algorithm and Its VLSI Architecture, 2000 Jui-Cheng Yen and Jim-In Guo[11] ,an image encryption/decryption algorithm and its VLSI architecture proposed. According to a chaotic binary sequence, the gray level of each pixel is XORed or XNORed bitby-bit to one of the two predetermined keys. A New Chaotic Image Encryption Algorithm by Sobhy, 2001 In this paper [12], Sobhy used Lorenz equation for encryption, creating secure databases; secure Email, implemented in FPGA for real time images. In this paper the chaotic algorithm is used for encrypting text and images. In [13] attacks on chaotic algorithm have also been discussed. A Technique for Image Encryption using Digital Signatures, 2003 Aloka Sinha and Kehar Singh [14] have proposed a new technique to encrypt an image for secure image transmission. The digital signature of the original image is added to the encoded version of the original image. Image encoding is done by using an appropriate error control code, such as a Bose-Chaudhuri Hochquenghem (BCH) code. At the receiver end, after the decryption of the image, the digital signature has been used to verify the authenticity of the image. A Technique for Image Encryption using multi level and image dividing technique, 2003 Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim[16] proposed the multi level image encryption by using binary phase exclusive OR operation and image dividing technique. The multi level image can be divided into binary images that have same gray levels. They converted binary images to binary phase encoding and then encrypt these images with binary random phase images by binary phase XOR operation. Encrypted gray image was then obtained by combining each binary encrypted images. A Technique for Image Encryption using 1D chaotic map, 2003 In 2003 Fethi Belkhouche and Uvais Qidwai[17] used one dimensional chaotic map. It has been shown that the method can be used for binary images encryption with the possibility of using several keys such as the

ISSN: 0975-5462

2360

Monisha Sharma et. al. / International Journal of Engineering Science and Technology Vol. 2(6), 2010, 2359-2363 initial state, the external parameters and the number of iterations. It is also shown that the sensitivity to initial state plays an important role in chaotic encryption.

**A New Chaotic Image Encryption Algorithm based on nonlinear map, 2004 Zhang Han, Wang Xiu Feng [18], Firstly permutation transform and then nonlinear map to circularly iterate pixel values. Failure of encryption owing to self similarity and visional psychological characteristics of image A Technique for Image Encryption using T-matrix and watermarking, 2004 M.-R. Zhang, G.-C. Shao and K.-C. Yi [19] used a T-matrix for image scrambling and its periodicity has been proved. The T-matrix has a simple conformation and a period twice as long as the Arnold matrix. It can be applied to image encryption and pre-processing in image processing such as image watermarking algorithms. A Technique for Image Encryption using chaotic neural system, 2005 Deng Shaojiang [20] completed an image encryption by a chaotic neural system and the cat map. In this paper neural networks have been used for making the technique chaos. A Technique for Image Encryption using chaos technique, 2006 Guosheng Gu and Guoqiang Han [21] incorporate permutation and substitution methods together, to present a strong image encryption algorithm .An optimized treatment and a cross-sampling disposal have been introduced for enhancing the irregular and pseudorandom characteristics of chaotic sequences. A Technique for Image Encryption using chaos technique, 2006 Huang-PeiXiao , Guo-ji Zang[22] proposed scheme using two chaotic systems based on the thought of higher secrecy of multi-system. One of the chaotic systems is used to generate a chaotic sequence. Then this chaotic sequence was transformed into a binary stream by a threshold function. The other chaotic system was used to construct a permutation matrix. Firstly, the pixel values of a plain image have been modified randomly using the binary stream as a key stream. Secondly, the modified image was encrypted again by permutation matrix. Frequency domain: Partial Encryption Algorithms by Cheng and Li, 2000 Cheng and Li [23] proposed partial encryption methods that are suitable for images compressed with two specific classes of compression algorithms: (a) quadtree compression algorithms, and (b) wavelet compression algorithms based on zerotrees. Selective Encryption Methods for Raster and JPEG Images by Droogenbroeck and Benedett, 2002 In 2002, Droogenbroeck and Benedett proposed the selective encryption methods for uncompressed (raster) images and compressed (JPEG) images [24]. According to Droogenbroeck and Benedett, at least 4-5 least significant bitplanes should be encrypted to achieve the satisfactory visual degradation of the image Selective Bitplane Encryption Algorithm by Podesser, Schmidt and Uhl, 2002 Podesser, Schmidt and Uhl [25] proposed a selective encryption algorithm for the uncompressed (raster) images, that is quite opposite from the first method by Droogenbroeck and Benedett [26,29]. In the raster image that consists of 8 bitplanes, Schmidt and Uhl's algorithm encrypts only the most significant bitplanes. The proposed underlying cryptosystem for this method was AES. However, without loss of generality, any fast conventional cryptosystem may be chosen instead.

ISSN: 0975-5462

2361

Monisha Sharma et. al. / International Journal of Engineering Science and Technology Vol. 2(6), 2010, 2359-2363 SUMMARY: In this paper, many of the current important image encryption techniques have been presented and analyzed. In this survey report, initially the emphasis have been made on already existing image encryption algorithms because the best way of protecting multimedia data like images is by means of the naive algorithm; i.e., by encrypting the entire multimedia bit sequence using a fast conventional cryptosystem . Much of the past and current research targets encrypting only a carefully selected part of the image bitstream in order to reduce the computational load, and yet keep the security level high. Many of the proposed schemes could only achieve moderate to low level of security, which may find applications in which quality degradation is preferred over absolute security. However, only few of the proposed methods promise to achieve substantial security, which is the prime requirement in many multimedia applications. In the next part of the paper emphasis have been made on those techniques which are based on chaotic systems, because these systems will improve the security level of encryption algorithm by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. In the third part of survey report, a very brief discussion on selective image encryption techniques using chaotic schemes and work in frequency domain have been enlighten. In general, a well-studied, fast and secure conventional cryptosystem should be chosen, surely those algorithms, which provides higher security. Furthermore, the experts should investigate the security aspects of the newly proposed image encryption techniques and also enhance the security level by introducing more than one chaotic scheme for image encryption algorithms. Moreover, none of the techniques have used Genetic Algorithm, Elliptic curve, Galois field (Group theory). REFERENCE: [1]

[2] [3] [4] [5]

[6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]

T. Maples and G. Spanos, "Performance study of a selective encryption scheme for the security of networked, real-time video," in Proceedings of the 4th International Conference on Computer Communications and Networks, Las Vegas, Nevada, September 1995. Borko Furht, Daniel Socek, Ahmet M. Eskicioglu, “Fundamentals of Multimedia Encryption Techniques”. D.R. Stinson, "Cryptography Theory and Practice," CRC Press, Inc., 2002. Li Chang-Gang, Han Zheng-Zhi, and Zhang Hao-Ran, “Image Encryption Techniques: A Survey”, Journal of Computer Research and Development, Vol 39, No. 10, pp. 1317-1324, Oct. 2002. Wei Ding, Wei-qi Yan, and Dong-xu Qi, “A Novel Digital Hiding Technology Based on Tangram Encryption”, IEEE Proceedings of on NEWCAS 2005,and Conways Game”, Proceeding of 2000 International Conference on Image Processing, Vol 1, pp. 601-604, Sept. 2000 Zhao Xue-feng, “Digital Image Scrambling Based on the Baker’s Transformation”, Journal of Northwest Normal University (Natural Science), Vol 39, No. 2, pp. 26-29, Feb. 2003 Bao Guan-jun, Ji Shi-ming, and Shen Jian-bin, “Magic Cube Transformation and Its Application in Digital Image Encryption”, Computer Applications, Vol 22, No. 11, pp. 23-25, Nov. 2002. Zhu Guibin, Cao Changxiu, Hu Zhongyu, et al., “An Image Scrambling and Encryption Algorithm Based on Affine Transformation”, Journal of Computer-Aided Design & Computer Graphics, Vol 15, No. 6, pp. 711-715, June. 2003. Jiri Fridrich, “Image Encryption Based on Chaotic Maps”, Proceeding of IEEE Conference On Systems, Man, and Cybernetics, pp. 1105-1110, 1997. Jiun-In Guo, Jui-Cheng Yen, "A new mirror-like image encryption algorithm and its VLSI architecture", Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China in 1999. Jui-Cheng Yen, and Jiun-In Guo, “A New Chaotic Key-Based Design for Image Encryption and Decryption”, IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000. M.I.Sobhy, and A.R.Shehata, “Chaotic Algorithms for Data Encryption”, IEEE Proceeding of ICASSP 2001, Vol 2, pp. 997-1000, May. 2001. M.I.Sobhy, and A.R.Shehata, “Methods of Attacking Chaotic Encryption and Countermeasures”, IEEE Proceeding of ICASSP 2001, Vol 2, pp. 1001-1004, May. 2001. Aloha Sinha, Kehar Singh, "A technique for image encryption using digital signature", Optics Communications, ARTICLE IN PRESS, 2003, 1-6, www.elsevier.com/locate/optcom Mazleena Sallen, Subariah Ibrahim, and Ismail Fauzi Isnin, “Enhanced Chaotic Image Encryption Algorithm Based on Vaker’s Map”, IEEE Proceedings of ISCAS 2003, Vol 2, pp. II-508-II-511, May. 2003. Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim, “ Multilevel Image Encryption by Binary Phase XOR Operations “, IEEE Proceeding in the year 2003. Fethi Belkhouche and Uvais Qidwai ,”Binary image encoding using 1D chaotic maps”, IEEE Proceeding in the year 2003. Wang Ying, Zheng DeLing, Ju Lei, et al., “The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System”, Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004

ISSN: 0975-5462

2362

Monisha Sharma et. al. / International Journal of Engineering Science and Technology Vol. 2(6), 2010, 2359-2363 [19] M.-R. Zhang, G.-C. Shao and K.-C. Yi, “ T-matrix and its applications in image processing”, IEEE Electronics Letters 9th December 2004 Vol. 40 No. 25 [20] Shaojiang Deng, Linhua Zhang, and Di Xiao, “Image Encryption Scheme Based on Chaotic Neural System”, J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872, 2005. [21] Huang-Pei Xiao Guo-Ji Zhang “An Image Encryption Scheme Based On Chaotic Systems”, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006. [22] Guosheng Gu ,Guoqiang Han “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006. [23] H. Cheng and X. Li, "Partial Encryption of Compressed Images and Video," IEEE Transactions on Signal Processing, 48(8), 2000, pp. 2439-2451. [24] M. Van Droogenbroeck and R. Benedett, "Techniques for a Selective Encryption of Uncompressed and Compressed Images," Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002, Ghent, Belgium, September 9-11, 2002. [25] M. Podesser, H.-P. Schmidt and A. Uhl, "Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments," 5th Nordic Signal Processing Symposium, on board Hurtigruten, Norway, October 4-7, 2002. [26] IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection, and Information Hiding, Vol. 13, No. 8, August 2003. [27] B. Furht and D. Socek, "Multimedia Security: Encryption Techniques," IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, 2003. [28] A.M. Eskicioglu, "Protecting Intellectual Property in Digital Multimedia Networks," IEEE Computer, July 2003, pp. 39-45. [29] X. Liu and A.M. Eskicioglu "Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions," IASTED International Conference on Communications, Internet and Information Technolog (CIIT2003), Scottsdale, AZ, November 17-19,2003.

ISSN: 0975-5462

2363