Enhancement of Image Security Using Random Permutation S.Vasu Deva Simha

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number 8–Nov2014
Enhancement of Image Security Using Random
Permutation
S.Vasu Deva Simha#1, Mr.K.Mallikarjuna*2
#
M.Tech student, Rajeev Gandhi Memorial College of Engineering and Technology (Autonomous),
Nandyal (Kurnool Dist), A.P,India
*
Associate Professor, Rajeev Gandhi Memorial College of Engineering and Technology (Autonomous),
Nandyal (Kurnool Dist), A.P,India
Abstract— in recent days transmitting digital media having large
size data through the internet became simple task but providing
security and security became big issue these days. Using
pseudorandom permutation, image encryption is obtained.
Confidentiality and access control is done by encryption. Image
encryption has to be conducted prior to image compression. In
this paper how to design a pair of image encryption and
compression algorithms such that compressing encrypted images
can still be efficiently performed .This paper introduced a highly
efficient image encryption-then compression (ETC) system. The
proposed image encryption scheme operated in the prediction
error domain is able to provide a reasonably high level of
security. More notably, the proposed compression approach
applied to encrypted images is only slightly worse, unencrypted
images as inputs.
Keywords— encryption-then compression, Arithmetic coding,
and bilateral filter.
I. INTRODUCTION
The transmission and the transfer of images, in free spaces
and on lines, are actually still not well protected. The standard
techniques of encoding are not appropriate for the particular
case of the images. The best would be to be able to apply
asymmetrical systems of encoding so as not to have a key to
transfer. Because of the knowledge of the public key, the
asymmetrical systems are very ex-pensive in calculation, and
thus a protected transfer of images cannot be envisaged. The
symmetrical algorithms impose the transfer of the secret key.
The traditional methods of encoding images impose the
transfer of the secret key by another channel or another means
of Communication. Consider an application scenario in which
a content owner Alice wants to securely and efficiently
transmit an image I to a recipient Bob, via an untrusted
channel provider Charlie. Conventionally, this could be done
as follows. Alice first compresses I into B, and then encrypts
B into Ie using an encryption function EK (·), where K
denotes the secret key as illustrated in Fig.1 (a).
The encrypted data I is then assed to Charlie, who simply
forwards it to Bob upon receiving I Bob sequentially performs
decryption and decompression to get a reconstructed image I.
Even though the above Compression-then-Encryption (CTE)
paradigm meets the requirements in many secure transmission
scenarios, the order of applying the compression and
encryption needs to be reversed in some other situations.
ISSN: 2231-5381
Fig.1 (a). Traditional Compression-then-Encryption (CTE)
system
Fig.1 (b). Encryption-then-Compression (ETC) system
As the content owner, Alice is always interested in protecting
the privacy of the image data through encryption.
Nevertheless, Alice has no incentive to compress her data, and
hence, will not use her limited computational resources to run
a compression algorithm before encrypting the data. This is
especially true when Alice uses a resource-deprived mobile
device. In contrast, the channel provider Charlie has an
http://www.ijettjournal.org
Page 411
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number 8–Nov2014
overriding interest in compressing all the network traffic so as
to maximize the network utilization. It is therefore much
desired if the compression task can be delegated by Charlie,
who typically has abundant computational resources. A big
challenge within such Encryption-then-Compression (ETC)
framework is that compression has to be conducted in the
encrypted domain, as Charlie does not access to the secret key
K. This type of ETC system is demonstrated in Fig.1 (b).
II. PROPOSED WORK
The proposed system consists of the three key components
namely, image encryption conducted by Alice, image
compression conducted by Charlie, and the sequential
decryption and decompression conducted by Bob.
A. Image Encryption via Prediction Error Clustering and
Random Permutation
Encryption refers to set of algorithms, which are used to
convert the plain text to code or the unreadable form of text,
and provides privacy. To decrypt the text the receiver uses the
“Secret key” for the encrypted text. The feasibility of lossless
compression of encrypted images has been recently
demonstrated by relying on the analogy with source coding
with side information at the decoder. Upon receiving the
compressed and encrypted bit stream B, Bob aims to recover
the original image I. A multimedia technology for information
hiding which provides the authentication and copyright
protection.
Step 3: Reshape the prediction errors in each Ck into a 2-D
block having four columns and ⌈|Ck|/4⌉ rows, where |Ck|
denotes the number of prediction errors in Ck.
Step 4: Perform two key-driven cyclical shift operations to
each resulting prediction error block, and read out the data in
raster-scan order to obtain the permuted cluster ˜C k.
Step 5: The assembler concatenates all the permuted
clusters Ck, for 0 ≤ k ≤ L−1, and generates the final encrypted
image.
in which each prediction error is represented by 8 bits. As
the number of prediction errors equals that of the pixels, the
file size before and after the encryption preserves.
Step6: Pass Ie to Charlie, together with the
length of
each cluster |˜C k|, for 0 ≤ k ≤ L − 2. The values of |˜C k|
enable Charlie to divide Ie into L clusters correctly. In
comparison with the file size of the encrypted data, the
overhead induced by sending the length |˜C k| is negligible.
B. Compression of Encrypted Image via Arithmetic
Coding
Fig. 3. Schematic diagram of compressing the encrypted
data.
Fig: 2 Schematic diagram of image encryption.
The algorithmic procedure of performing the image
encryption is then given as follows:
Step 1: Compute all the mapped prediction errors ˜ei,j of
the whole image I.
Step 2: Divide all the prediction errors into L clusters Ck,
for 0 ≤ k ≤ L − 1, where k is determined by (5), and each Ck is
formed by concatenating the mapped prediction errors in a
raster-scan order.
ISSN: 2231-5381
Arithmetic coding
Arithmetic coding is especially suitable for small alphabet
(binary sources) with highly skewed probabilities. Arithmetic
coding is very popular in the image and video compression
applications.
Consider a half open interval [low, high).Initially, interval is
set as [0, 1) and range=high -low = 1-0 = 1.Interval is divided
into cumulative probabilities of n symbols. For this example,
n=3; p (a) =1/2, p (b) =1/4 and p(c) =1/4.We propose an
image encryption scheme operated over the prediction and
permutation based image encryption method and the
efficiency of compressing the encrypted data.
The compression of the encrypted file Ie needs to be
performed in the encrypted domain, as Charlie does not have
access to the secret key K. In Fig. 3, we show the diagram of
compression of Ie. Assisted by the side information|˜C k|, for
0 ≤ k ≤ L − 2, a de-assembler can be utilized to parse Ie into L
http://www.ijettjournal.org
Page 412
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number 8–Nov2014
segments ˜C 0, ˜C 1,・・, ˜C L−1 in the exactly same way as
that done at the encryption stage. An AC is then employed to
encode each prediction error sequence ˜C k into a binary bit
stream Bk. Note that the generation of all Bk can be carried
out in a parallel manner to improve the throughput. An
assembler concatenates all Bk to produce the final compressed
and encrypted bit stream B, namely,
B = B0B1 ・ ・ ・BL−1
prediction error ei, j, which implies ˆIi,j = Ii,j , i.e., error-free
decoding is achieved.
C. Sequential Decompression and Decryption
Fig. 6 Sample Results of (a) original Lena; (b) encrypted
Lena; (c) original Baboon; (d) encrypted Baboon.
III. PERFORMANCE MEASURES
To study the relative performance of cluster based
segmentation methods the following quality measures are
calculated.
Fig. 5. Schematic diagram of sequential
decompression.
decryption and
After receiving the compressed and encrypted bit stream B,
Bob aims to recover the original image I. The schematic
diagram demonstrating the procedure of sequential decryption
and decompression is provided in Fig. 4. According to the side
information |Bk|, Bob divides B into L segments Bk, for 0 ≤ k
≤ L−1, each of which is associated with a cluster of prediction
errors. For each Bk, an adaptive arithmetic decoding can be
applied to obtain the corresponding permuted prediction error
sequence C k. As Bob knows the secret key K, the
corresponding de-permutation operation can be employed to
get back the original Ck. With all the Ck, the decoding of the
pixel values can be performed in a raster-scan order. For each
location (i, j), the associated error energy estimator i,j and the
predicted value ˜Ii,j can be calculated from the causal
surroundings that have already been decoded. Given _i,j , the
corresponding cluster index k can be determined by using (5).
The first ‘unused’ prediction error in the kth cluster is selected
as ˜ei,j , which will be used to derive ei,j according to ˜Ii,j and
the mapping rule described in Section II-A. Afterwards, a
‘used’ flag will be attached to the processed prediction error.
The reconstructed pixel value can then be computed by ˆIi,j =
˜Ii,j + ei,j (9) As the predicted value ˜Ii,j and the error energy
estimator _i,j are both based on the causal surroundings, the
decoder can get the exactly same prediction ˜Ii,j . In addition,
in the case of lossless compression, no distortion occurs on the
ISSN: 2231-5381
A. Peak Signal to Noise Ratio (PSNR)
PSNR is most commonly used to measure the quality of
for image compression. The signal in this case is the original
data, and the noise is the error introduced by compression.
When comparing compression, PSNR is a human perception
of reconstruction quality. The PSNR is calculated based on
color texture based image segmentation. The PSNR range
between [0, 1), the higher is better.
PSNR = 20 * log10 (255 / sqrt (MSE))
B. Mean Square Error (MSE)
Mean Square Error (MSE) is calculated pixel-by pixel by
adding up the squared difference of all the pixels and dividing
by the total pixel count. MSE of the segmented image can be
calculated by using the Equation. The MSE range between [0,
1], the lower is better.
MSE =
http://www.ijettjournal.org
Page 413
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number 8–Nov2014
IV. RESULTS
(a) Original Image
(b)Encrypted Image
Fig. 6 Result1
V. CONCLUSIONS
In this paper, we have designed an efficient image Encryptionthen Compression (ETC) system. Within the proposed work,
the image encryption has been achieved via prediction error
clustering and random permutation. Efficient compression of
the encrypted data has then been done by arithmetic coding
approach. By Arithematic Coding based, Coding can’t be
cracked. Both theoretical and experimental results have shown
that reasonably high level of security has been retained. The
coding efficiency of our proposed compression method on
encrypted images is very close to that of the image codecs,
which receive original, unencrypted images as inputs. The
Compressed image is measured in terms of Quality measures
like MSE and PSNR.
REFERENCES
[1]
[2]
(a)Encrypted Image (b) Reconstructed Image
Fig. 7 Result2
Table.1 Quality Measures of Image
Image
[3]
[4]
Lena
[5]
Quality Measures
PSNR
MSE
[6]
Original Image
23.86 dB
267.12
Encrypted Image
26.55 dB
144.00
J. Zhou, X. Liu, and O. C. Au,“ On the design of an efficient
encryption then-compression system,”[2] T. Bianchi, A. Piva, and M.
Barni, “On the implementation of the discrete Fourier transform in the
encrypted domain,” IEEE Trans. on Inf. Forensics Security, vol. 4, no.
1, pp. 86-97, March 2009.
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and
K.Ramchandran, “On compressing encrypted data,” IEEE Trans. on
Signal Process., vol. 52, no. 10, pp. 2992-3006, Oct. 2004.
D. Schonberg, S. C. Draper, and K. Ramchandran, “On compression
of encrypted images,” in Proc. IEEE Int. Conf. Image Process., pp.
269 -272, 2006.
W. Liu, W.J. Zeng, L. Dong, and Q.M. Yao, “Efficient compression of
encrypted grayscale images,” IEEE Trans. on Image. Process. vol. 19,
no. 4, pp. 1097–1102, April 2010.
A. Kumar and A. Makur ,“Lossy compression of encrypted image by
compressing sensing technique,” in Proc. IEEE Region 10 Conf., pp.16, 2009.
X. Wu and N. Memon, “Context-based, adaptive, lossless image
codec,”IEEE Trans. On Commun., vol. 45, no. 4, pp. 437–444, April
1997.
BIODATA
Author
Reconstructed Image
32.11 dB
39.98
S.Vasu Deva Simha presently pursuing
M.Tech DSCE (Digital Systems and
Computer Electronics) Electronics and
Communication (ECE) Department,
Rajeev Gandhi Memorial College of
Engineering
and
Technology
(Autonomous) Nandyal (Kurnool Dist)
A.P, India. He completed his B.Tech in
ECE (Electronics and Communication)
Annamacharya Institute of Science and Technology
(Autonomous) Rajampet (Kadapa Dist) A.P, India.
Co-Author
Mr.K.Mallikarjuna working as Associate Professor in ECE
Department , Rajeev Gandhi Memorial College of
Engineering and Technology(Autonomous) Nandyal (Kurnool
Dist), A.P,India.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 414
Download