International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 Enhanced Cipher Image Generation Using Nibbles and Zigzag Patterns 1 M.srinivasarao, 2D.srinivasulu M.tech student, st.ann'scollege of engineering&technology 2 assoc professor, st.ann'scollege of engineering&technology 1 Abstract: Today data protection is very converting the known data format into essential and main concern issue. As the unknown data format. Nowadays, image communication in now a days has been encryption schemes have been increasingly increasing rapidly through mobile phones, developed to meet the requirements for televisions and web there is need of providing secure transmission over the communication security to the data to be transmitted. channels. However there are several image Information exchange encryption methods, each of them having is must in any communication field like military, defense their applications. As the data to be transmitted Classification must be highly secured and confidential we methods in to three major types: position need to protect the data from the hackers. The permutation, value transformation and visual technique employed to provide the data transformation. In this paper we do the security is encryption. Here we employ an encryption partially on the image which saves effective fractional encryption method based time of execution and complexity. We have on SCAN patterns and selecting a pixel value presented of rearranged mapping image based on the performs both lossless compression and mapping function. encryption of binary and gray-scale images. Keywords: Encryption, Decryption, SCAN The compression and encryption schemes are language, DCT, Image processing based on SCAN patterns generated by the Introduction: In the digital world today, the SCAN methodology. The SCAN is a formal protection of digital images becomes more language-based and the accessing methodology which can efficiently communications of digital products over specify and generate a wide range of networks occur more and more recurrently. scanning paths or space filling curves. Let us consider transferring of an image Principles of encryption: In a simplest form, through the network which needs more encryption is to convert the data in some attention while delivering the data. We make unreadable form. This helps in protecting the sure that every thing is secured in the privacy while sending the data from sender to transmission. Encryption is the process of receiver. Cryptography has become one of more significant, ISSN: 2231-5381 since own a http://www.ijettjournal.org strength of the new and weakness. image encryption methodology two-dimensional which spatial Page 3563 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 the main tools for privacy, trust, access for encryption and decryption. AES is a control, symmetric key algorithm which uses same electronic payments, corporate security, and countless other fields. Strong key for both encryption and decryption. encryption is the kind of encryption that can Block diagram decryption: be used to protect information of real value against organized criminals, multinational corporations, and major governments. In Original data of encryption and Key encryption terminology, the message is called clear text. Coding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the cipher Encrypted data Key text. Cryptography is the art or science of keeping Original data messages secret. Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. There are The above block diagram shows the basic two encryption building blocks of encryption and decryption asymmetric which converts the user understandable data algorithms. The symmetric key algorithms into unknown format and vice versa with the uses same key for both encryption and help of encryption and decryption algorithms. classes algorithms, of key-based symmetric and decryption where asymmetric algorithms uses different keys at encryption and decryption. Advantages of encryption: Strong cryptographic algorithms are designed Individuality Theft avoidance. to be executed by computers or specialized Secure hardware devices. In most applications, cryptography is done in computer software. Decommissioning of Computer. Unauthorized entrée Protection. Here we discuss about different algorithms in Designing of system: The SCAN is an encryption. Data Encryption Standard this is official language-based two dimensional a cipher that operates on 64-bit blocks of spatial accessing methodology which can data, using a 56-bit key. The algorithm is best symbolize and produce a large number of suited to implementation in hardware. A 'hash wide varieties of scanning paths. This algorithm' is used for computing a condensed method converts a 2D image into a 1D list, representation of a fixed length message/file. and employs a SCAN language to describe RSA is the algorithm that uses different keys the converted result. In this language, there ISSN: 2231-5381 http://www.ijettjournal.org Page 3564 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 are several SCAN letters. Each SCAN approaches. Furthermore, many image letter represents one kind of scan array. encryption algorithms have been Different kinds of combinations of SCAN implemented in software, due to the resulting letters may produce different kinds of flexibility and the algorithm complexity. This furtive images. The SCAN is a family of means that most of these algorithms are good formal languages such as Simple SCAN, for non real- time image encryption but not Extended SCAN, and Generalized SCAN, for compressed video encryption. Very few each of which can represent and generate a extensively used image encryption algorithms specific set of scanning paths. After have been implemented in hardware, and determining the combination of SCAN generally letters, the scheme then generates a SCAN compression. On the other hand, many block string. This string defines the scan order of cipher, which are used for encrypting text the original image. Scanning of a two data, have been used to encrypt images. In dimensional array is an order in which each reality, SCAN is a class of formal languages, element of the array is accessed exactly which can be applied to compression, once. Following by basic scan patterns and encryption, data hiding, or combinations partition patterns to produce concept, we thereof. The SCAN family of general use a random code generating produce the languages includes several versions such as SCAN word and to define encryption key. Simple The SCAN word contain scan and partition Generalized SCAN, each of which can patterns. represent and produce a specific set of Various algorithms have been proposed to scanning paths. Each SCAN language is encrypt images. Most image encryption defined by a grammar and each language has algorithms position a set of basic scan patterns, a set of permutations with or without confusion transformations, and a set of rules to create functions in which the pixel values are simple scan patterns, which in turn are used jumbled to different positions on the 2D to obtain complex scan patterns. A scanning array. The other algorithms are based on of a two dimensional array is an order in confusion transformations where disordered which each part of the array is accessed binary sequences are generated for the exactly once. The SCAN is a formal reorganization of the image pixels, on tree language-based structures accessing methodology which can represent are where based the on pixel values are converted by using certain functions, or on in SCAN, conjunction Extended two with image SCAN, dimensional and spatial and produce wide variants of scanning paths. other methods like the quantization based ISSN: 2231-5381 http://www.ijettjournal.org Page 3565 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 DCT: DCTs many intermediate values of the computation we applications in science and engineering, from should allow two or more parties to interact. lossy compression of audio and images (e.g. However, since we would keep the DCT as JPEG) to spectral methods for the numerical simple as possible, it is preferable to avoid solution of partial differential equations. A the use of interactive protocols. A final discrete cosine transform (DCT) expresses a setback finite sequence of data points in terms of a separately increases the size of the encrypted sum of cosine functions oscillating at image and affects the complexity. different frequencies. In particular, a DCT is Image compression: Digital images are very a Fourier-related transform analogous to the large in size and occupy more bandwidth discrete Fourier transform (DFT), except while uploading to the web, to combat this using only real numbers. The most common problem user has to reduce the size of the variant of discrete cosine transform is the digital image with out degrading its quality. type-II DCT, which is often called simply Image compression plays a key role in image "the DCT", its inverse, the type-III DCT, is processing where the channel capacity is the correspondingly often called simply "the main concern. Image compression is the inverse DCT" or "the IDCT". The DCT, is novel method to reduce the size occupied by widely used in signal and image processing, the image when we are transmitting through especially compression, the band limited channel. The main motto of because it has a strong "energy compaction" the image compression is to reduce the property. redundancy and irrelevant data in the The DCT can be computed on the encrypted transmitted image. pixel the Image compression can be done in two ways homomorphism properties and the fact that lossy and lossless. In lossy compression the DCT coefficients are public. However, technique user should compromise in the data this needs several issues to be satisfied. The quality and we may loss some useful foremost thing is that we should represent the information, lossy methods are especially pixel values, the DCT coefficients, and the suitable transformed values in the domain of the photographs in applications where minor cryptosystem, i.e., as integers on a finite (sometimes imperceptible) loss of fidelity is field/ring. acceptable. for values are significant lossy by data relying to on One more difficulty is that is that for encrypting natural In images case the such as lossless compression truncated by relying on homomorphism information with out any compromises in the computations only. In general, for scaling the quality of the data. With the implementations http://www.ijettjournal.org get of pixel encrypted values can not be scaled or ISSN: 2231-5381 we the each maximum Page 3566 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 of compression algorithms we can send more data through the same channel at different time instants without any disturbance among image. the data packets. We can employ region of interest coding method to encode and Decrease color nuances within the Decrease the color resolution with respect to the prevailing light intensity compress any particular part of the image Remove small, invisible parts of the picture effectively. As we send more data packets through the channel it increases the bit rate of the channel. Bit rate tells how many are transmitted through the channel in the given time period. It is the ration of bits per second Basically there are two standards in image compression JPEG and MPEG. JPEG deals with the still images while MPEG is associated to the video sequences. Generally use DCT method followed by quantization to reduce the size of the image. Compression ratio varies from technique to technique. In the ordinary JPEG algorithm the image is divided into 8×8 blocks, these blocks are converted from the spatial to the frequency domain by the Discrete Cosine Transform (DCT). Then, each DCT coefficient is divided by its equivalent constant in a standard quantization table and rounded down to the nearest integer. After this step, the DCT quantized coefficients are scanned in a predefined zigzag order to be used in We can upload the images very speedily into the web. They use less space in web hosting. They take very less time to host. (bits/sec). we Advantages: the final compression. Image data reduction: step, the lossless Sharing of files can be easy with compression. Image compression does not decrease the physical size of an image but compresses the data that makes up the image into a smaller size. DCT process on image: Take the input image and resize it. Segment the image into 8x8 blocks. Reduce the higher intensity values from the image. Consider a quantized matrix with quantized values. Divide the image with the quantized matrix. Procedure of encryption: We perform the partial encryption of the image as follows. Step 1: select an input image to be transmitted and take a combine value. Combined value defines the level of encryption. ISSN: 2231-5381 http://www.ijettjournal.org Page 3567 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 Step 2: select a mapping image and rotate it by some angle. Step 3: perform encoding of an image which consists the following steps. Segment the image with DCT and reduce the higher values in the image. Generate the nibbles and zigzag pattern from the image. Combine all these to get the transformed form of the image. Step 4: to retrieve the image we do the reverse operations such as IDCT and inverse zigzag operations. Finally the resultant image Transmit the image is stored as restored image. The following diagram shows the procedure to generate a secret image by using DCT and SCAN patterns. We generate partially encrypted image through this process. Flow diagram: Results: Select the input image Select mapping image & rotate with an angle Reduce the higher values from the image Apply DCT with quantized matrix ISSN: 2231-5381 Generate http://www.ijettjournal.org Page 3568 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 data. We can employ the encryption methods in cellular broadcasting, technology, military applications. We can television and defense employ encryption methods where the these channel capacity is limited. Conclusion: In this communication, new ways of image encryption scheme have been proposed which utilizes SCAN patterns. This paper has presented a concept of combination of nibble value of a pixel is used as a mapping function. This Encryption uses only integer arithmetic and it can be easily implemented in the hardware. we conclude with the remark that the method is expected to be useful for real time image encryption and transmission applications. References: [1] Data Privacy and Security: Encryption and Information Hiding By David Salomon. [2]Computer security and the data encryption standard ... Volume 500, Issues 1-6 By Advantages: We can keep our data more securely from United States. National Bureau of Standards. the unauthorized persons. The system which we employ is easy to [3]Multimedia Content Encryption: Techniques and Applications By Shiguo use. United States Civil Service Commission, Generation of key (patterns) is easy as we are generating from image it self. The partial encryption saves the time and Lian. [4]Multimedia Encryption and Authentication Techniques and Applications By Borko Furht, Darko Kirovski. complexity of the process. Applications: As the technology is growing rapidly we must provide the security for the [5]Applied Cryptography for Cyber Security and Defense: Information Encryption by Li yang. ISSN: 2231-5381 http://www.ijettjournal.org Page 3569 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 [6]Computational Intelligence in Information Assurance and Security edited by Nadia Nedjah, Ajith Abraham, Luiza De Macedo Mourelle. [7]http://www.computer.org/csdl/proceedings /iv/2004/2177/00/21770217-abs.html. [8]http://www.docstoc.http://www.researchm anuscripts.com/isociety2012/46.pdf [9]http://www.docstoc.com/docs/50227726/S electiveImageEncryptionUsing-DCT-withStream-Cipher. ISSN: 2231-5381 http://www.ijettjournal.org Page 3570