A New Efficient Image Encryption Technique Based on Arnold and

advertisement
2012 International Conference on Image and Information Processing (ICIIP 2012)
IPCSIT vol. 46 (2012) © (2012) IACSIT Press, Singapore
A New Efficient Image Encryption Technique Based on Arnold and
IDEA Algorithms
Amr M. Riad 1 +, Amr H. Hussein 2, Hossam M. Kasem 2 and Atef Abou El-Azm 1
1
Faculty of Electronic Engineering, Menofia University, Menuof, Egypt
2
Faculty of Engineering, Tanta University, Tanta, Egypt.
Abstract. In this paper, a newefficient image encryption technique ispresented.It is based on a combination
between chaotic Arnold’s cat map and the international data encryption algorithm (IDEA) in order to meet
therequirements of secure image transfer. First, the IDEA accepts a 128 bits secret key which is used to
generate an encryption key. The encryption key length equals the original image width (w). Second, the
encryption key is used to generate the encryption matrix. The rows of the encryption matrix are formed by
making successive (N-decimal) rotations from the encryption key. Third, the encryption matrix is simply
XORed with the original image to produce a primary encrypted image. Finally, the Arnold cat map is used to
shuffle thepositions of the primary encrypted image pixels to produce the final encrypted image. The results
of several experimental, statistical analysisand key sensitivity tests showed that the proposed image
encryptionscheme provides an efficient and secure way for imageencryption.
Keywords: image encryption, arnold cat map, international data encryption algorithm (IDEA).
1. Introduction
Among the many expressions of information, the image isbecoming a mainstream means of expression
with its uniquevisual, direct-viewing, lively and other characteristics. In orderto ensure the security of digital
images, researchers have putforward a lot of encryption algorithms. In recent years, with thechaos theory
carried out and rapidly developed, many scholarsbegan to turn their sights on chaotic cryptography, and
haveproposed many image encryption algorithms chaos-based [1].
Arnold’s cat map (ACM) [2-4] in recognition of Russian mathematician Vladimir I. Arnold, who
discovered it using an image of a cat. It is a simple and elegant demonstration and illustration of some of the
principles of chaos – namely, underlying order to an apparently random evolution of a system. An image (not
necessarily a cat) is hit with a transformation that apparently randomizes the original organization of its
pixels.
The pixels rapidly degenerate into a television-static of chaos by iteration number five, with some
unintelligible order prominent in a number of iterations prior to the original image reappearing on the
fifteenth iteration. Therefore, the image is said to have a period of fifteen. From point of view, the ACM has
two main disadvantages that are; after a number of iterations of the ACM, the original image will return, and
the histogram of the encrypted image is the same as the histogram of the original image. This is due to the
fact that the pixel values themselves didn’t change [5].
A well-known cryptographic algorithm is the IDEA. It came into picture in 1990. IDEA uses algebraic
operations completely and it entirely avoids the use of any lookup tables or S-boxes [6-8]. IDEA most of
which are used in text or binary data. It is difficult to use them directly in multimedia data. Multimedia data
are often of high redundancy, of large volumes and require real-time interactions, such as displaying, cutting,
+
Corresponding author. Tel.: +2 01224751185.
E-mail address: amr_riad@msn.com.
140
copying, bit rate conversion, etc. videos with these ciphers directly are time consuming and not suitable for
real-time.
In this paper, a new efficient image encryption technique based on a combination between Arnold’s cat
map algorithm and the international data encryption algorithm (IDEA) is presented. The proposed technique
follows four steps; first, the IDEA accepts a 128 bits secret key which is used to generate an encryption key.
The encryption key length equals the image width (w). Second, the encryption key is used to generate the
encryption matrix. The rows of the encryption matrix are formed by making successive (N-decimal) rotations
from the encryption key. Third, the encryption matrix is simply XORed with the original image to produce a
primary encrypted image. Finally, the Arnold cat map is used to shuffle thepositions of the primary
encrypted image pixels to produce the final encrypted image.
The performance of the proposed technique is measured through a series of statistical tests. These tests
included entropy measurement, histogram analysis, processing time measurement, irregular deviation,
histogram deviation, correlation analysis, key sensitivity, and exhaustive key search. The results of these
experimental, statistical analysisand key sensitivity tests showed that the proposed image
encryptiontechnique provides an efficient and secure way for imageencryption. The proposed technique run
time is much smaller than the individual IDEA algorithm.
On the other hand, compared to the Arnold algorithm, the proposed technique provides higher entropy,
relatively uniform distributed encrypted image histogram, better irregular deviation, higher histogram
deviation, and extremely high NPCR tests values greater than 99. Furthermore, the image decryption with a
slightly different key fails completely to recover the original image. So, the proposed image encryption
technique is highly key sensitive.
2. Statistical Analysis Used to Test the Proposed Technique
Different statistical tests are used to evaluate the performance of the proposed techniqueentropy,
Irregular Deviation, Histogram Deviation, Correlation, Correlation, Key sensitivity Test and NPCR and
UACI [9-10].
3. Proposed Image Encryption Technique
In this paper, a new efficient image encryption technique based on a combination between chaotic
Arnold’s cat map and the international data encryption algorithm (IDEA) is presented.Fig.1 shows the block
diagram of the proposed image encryption technique. The proposed scheme follows these steps:
1. The image is transformed into a square × matrix.
2. The IDEA accepts a 128 bits secret key which is used to generate an encryption key from the input
1 vector “0, 1, 2, 3, 4, 5, …….., W”.
encryption matrix. The rows of the encryption matrix are formed by
3. Generation of the ×
making successive (N-decimal) rotations from the encryption key.
4. The encryption matrix is simply XORed with the original image to produce a primary encrypted
image.
5. Arnold cat map is used to shuffle thepositions of the primary encrypted image pixels to produce the
final encrypted image.
Fig. 1: The block diagram of the proposed image encryption technique.
141
4. Experiimental Analysis
A
In this section, the performancee of the propposed techniq
que is measuured throughh a series of tests. Thesee
tests includded entropy measurement
m
t, histogram analysis, prrocessing tim
me measurem
ment, irregulaar deviation,,
histogram deviation,
d
corrrelation anaalysis, key seensitivity, and
d exhaustive key search.
4.1. Statisstical analyysis
Some experimental
e
results are given in thiis section to demonstratee the efficienncy of our scheme.
s
Thee
original-imaage with thee size 256 256 is shown in Fig. 2(a) and thee histogram of the origin
nal-image iss
shown in Fiig. 2(b).
(a)
(b)
F 2: Originaal-image and its
Fig.
i histogram (a) original-im
mage; (b) histoogram of the ooriginal-imagee.
Fig.3 shhows the enccryption proccedure of thee cameraman
n image usingg the propossed techniquee. The secrett
key is takenn as 128 bitss key “'3032';'3334';'35366';'3738';'393
30';'3032';'33334';'3535'” ((in hexadecim
mal). In thiss
case, only 5-decimal suuccessive rootations of thhe encryptio
on key are used.
u
The sttatistical anaalysis of thee
proposed teechnique are listed in tabble (1) comppared to the ACM. The proposed
p
tecchnique resu
ults in higherr
entropy thann ACM, goood correlation between thhe original im
mage and thhe encrypted image, smalller and thuss
better irreguular deviatioon than ACM
M, high histtogram deviaation of 1.00031 which iss much greaater than thee
ACM histoggram deviatiion which eqquals zero. The
T NPCR teests indicate that the propposed techniique is moree
efficient andd immune too differential attacks thann ACM as listted in table (1).
( The propposed techniq
que providess
a uniform histogram
h
com
mpared to ACM as show
wn in Fig. 4.
Fig. 3: Thhe encryptionn procedure off the cameram
man image.
(a)
(
(b)
Fig.4: Thhe histogram of
o the encryptted image usin
ng (a) Proposeed technique, ((b) ACM.
142
Tablle. 1: Statisticcal Analysis off the Proposed
d Technique compared
c
to A
ACM.
Statistical Analysis
En
ntropy
Coorr2
Irrregular Deviaation (DI)
Hiistogram Devviation (DH)
Time Consuming (Hole Proocess)
NP
PCR (first pixxel change)
NP
PCR (Middlee pixel changee)
NP
PCR (Last pixel change)
Prroposed Tech
hnique
7.9940
0.0024
0.5934
1.0031
0.534 secc
99.9985
99.9985
99.9985
A
Arnold
Chaottic Map (ACM
M)
7.00097
0.00006
0.77165
0
0.0944963 sec
0
0
0
4.2. Key sensitivity
s
t
test
In this section we introduced several
s
key sensitivity
s
teests using thhe secret keyy with differrent decimall
rotations off the generateed encryptionn key.
For 5-ddecimal rotattions, the keyy sensitivity analysis sho
ows that chaanging one bbit in the seccret key willl
result in a completely different cippher image. In Fig. 5, we
w have shoown the resuults of some attempts too
encrypt imaage with sligghtly differennt secret keyys than the on
ne used for the
t encryptioon of the original image..
Particularlyy, in Fig. 5(aa) and Fig. 5(b)
5
respectively, the oriiginal imagee and the enccrypted imag
ge producedd
using the secret
s
key “'3032';'3334
“
4';'3536';'37338';'3930';'3032';'3334';'35535'” (in heexadecimal) are shown,,
whereas Fig. 5(c) annd Fig. 5(d) show thhe encrypteed images produced uusing the secret keyss
“'2032';'33334';'3536';'3738';'3930';'30032';'3334';'33535'”and“'3
3032';'3334';'3536';'3738';;'3930';'3032
2';'3334';'353
4'” respectivvely.
In Fig. 5, we have shown the original imaage as well as the threee encrypted images prod
duced in thee
aforesaid stteps. It is noot easy to coompare the encrypted
e
im
mages by sim
mply observing these images. So forr
comparisonn, we have calculated
c
thhe correlationn between the
t corresponnding pixelss of the threee encryptedd
images. Forr this calculaation, we havve used the saame formula as given in Eq.
E (5) exceppt that in thiss case A andd
B are the vaalues of corrresponding pixels
p
in the two encryptted images too be comparred. In Tablee 2, we havee
given the results
r
of thee correlationn coefficientts between the
t corresponnding pixelss of the threee encryptedd
images A, B and C. It is clear from
m the table that
t
no correelation existss among the three encry
ypted imagess
even thoughh these have been producced by using slightly diffe
ferent secret keys.
k
The imaages after the decryptionn of the encryypted image (shown in Fig.
F 6(c)) witth the originaal secret keyy
“'3032';'33334';'3536';'3738';'3930';'30032';'3334';'33535'” and Fig.
F 6(d) shows the deccrypted imag
ge using thee
key “'30322';'3334';'35336';'3738';'39930';'3032';'3334';'3534'”.. It is clear that the deccryption witth a slightlyy
different key fails comppletely and heence the propposed image encryption procedure
p
is highly key sensitive.
s
(a) Original
O
imagee
(b) Encrypteed image with original key
'3032';'3334';'3536'';'3738';'3930';'3032';'3334';;'3535'
(c) Encrypted image witth key
(d) Encrrypted image w
with key
'2032';'33334';'3536';'33738';'3930';'33032';'3334';'3353
'3032';'3334';'3536'';'3738';'3930';'3032';'3334';;'3534'
5'
Fig. 5: Encrypted image with 5-decimal rotattions.
143
Table. 2: Coorrelation coeffficients betweeen the corressponding pixells of the threee different encrypted imagess obtained by
using slighttly different secret key of th
he image show
wn in Fig. 5.
Image 1
Imaage A of Fig. 5(a)
5
Imaage A of Fig. 5(a)
5
Imaage B of Fig. 5(b)
5
( Original im
(a)
mage
Image 2
Imagge B of Fig. 5(b)
5
Image C of Fig. 5(c)
5
Image C of Fig. 5(c)
5
Corrrelation coeffiicient
0.0217
-0.0819
0.1028
(b) Encrypted im
mage with origginal key
'3032';'3334';'3536';'33738';'3930';'33032';'3334';'
3535'
(c) Decryppted image wiith original key
(d) Decrypteed image with key
'3032';'33344';'3536';'37388';'3930';'3032';'3 '3032';'3334';'3536';'33738';'3930';'33032';'3334';'
334';'35355'
3534'
Fig. 6: Keey sensitivity test
t results forr the 5-decimaal rotations.
In the same way, the key sensitiivity tests forr 10, 15, 20, and 25 decim
mal rotationss are made. The
T resultantt
correlation coefficients are listed in table (3).
Table. 3: Coorrelation coeffficients betweeen the corressponding pixells of the threee different encrypted imagess obtained by
using sligghtly differentt secret key off the cameram
man image.
Imagee 1
Image 2
Correelation
coefficieents at 10
decimalss rotation
Correlation
n
coefficients att 15
d
decimals
rotattion
Correlation
coeffiicients at 20
decimals rotation
Correlattion
coefficientss at 25
decimals ro
otation
Imagee A
Imagee A
Imagee B
Image B
Image C
Image C
0.00213
-0.00792
0.11039
0.0211
-0.0786
0.1041
0
0.0212
-00.0788
0
0.1032
0.0186
6
-0.0802
0.1035
5
5. Conclu
usions
In this paper, a neew efficient image encrryption techn
nique based on a combination betw
ween chaoticc
orithm (IDEA
A) is presentted. The perrformance off
Arnold’s caat map and thhe internatioonal data enccryption algo
the proposeed techniquee is measured through a series of teests. These tests includedd entropy measurement,
m
,
histogram analysis,
a
proocessing tim
me measurem
ment, irregu
ular deviatioon, histogram
m deviation,, correlationn
analysis, keey sensitivityy, and exhausstive key seaarch. The results of these experimentaal, statisticall analysisandd
key sensitivvity tests shoowed that thhe proposed image encry
yptiontechniqque providess an efficientt and securee
way for im
mageencryption. The prooposed technnique run tim
me is muchh smaller thaan the indiv
vidual IDEA
A
algorithm. On
O the otherr hand, com
mpared to thee Arnold alg
gorithm, the proposed tecchnique prov
vides higherr
entropy, unniformly disstributed enccrypted imagge histogram
m, better irrregular deviation, higheer histogram
m
deviation, and
a extremely high NPCR
R tests valuees greater thaan 99. Furthermore, the image decry
yption with a
slightly diff
fferent key fails
f
complettely to recovver the origiinal image. So, the propposed imagee encryptionn
procedure iss highly key sensitive.
6. Refereences
[1] J. M. Am
migo, L. Kocarrev, J. Szczepanski. Theoryy and practice of chaotic cryyptography.Phhysics Letters, 2007,A 366,,
pp. 211--216.
144
[2] L. Wu; J. Zhang; W. Deng; D. He. Arnold Transformation Algorithm and Anti-Arnold Transformation
st
Algorithm.1 International Conference on Information Science and Engineering (ICISE), Dec. 26-28,
2009,pp.1164-1167.
[3] Y. Wang; T. Li. Study on Image Encryption Algorithm Based on Arnold Transformation and Chaotic
System.International Conference on Intelligent System Design and Engineering Application (ISDEA). Oct.13-14,
2010,vol.2, pp.449-451.
[4] H. Zhao. Arnold Transformation of n Dimensions and its Periodicity.Journal of North China University of
Technology. 2002vol. 14, pp. 21-25.
[5] S. Lian, Multimedia content Encryption, CRC Press, Taylor & Francis Group, 2009.
[6] S. Yang; H. Piao; Li Zhang; X. Zheng. An Improved IDEA Algorithm Based on USB Security Key.3rd International
Conference on Natural Computation (ICNC). Aug. 24-27, 2007,vol.3, pp.184-188.
[7] Schneier, Bruce Applied Cryptography “IDEA”, John Wiley and Sons, 1996,pp.319 – 323.
[8] P. Xu; J. Zhao; D. Wang. A selective image encryption algorithm based on hyper-chaos.IEEE 3rd International
Conference on Communication Software and Networks (ICCSN). May 27-29, 2011,pp.376-379.
[9]H. El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah. An Efficient Chaos-Based Feedback Stream
Cipher (ECBFSC) for Image Encryption and Decryption.Informatica,The Slovene Society Informatika, Ljubljana,
Slovenia, 31, 2007, pp.121–129.
[10] I. F. El-Ashry. Digital Image Encryption. M.Sc. Thesis, Department of Electronics and Electrical
Communications Engineering, Faculty of Electronic Engineering, Menofia University, 2010.
145
Download