IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 163-167

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Text and Image Encryption Using Color Image as A Key Shruthi K.S.1, G.Padmaja Devi2, Indira Bahaddur 1

2

Student, Department of ECE, Malnad College of Engineering, Hassan, Karnataka, India [email protected]

Associate Professor, Department of ECE, Malnad College of Engineering, Hassan, Karnataka, India [email protected] 3

Assistant Professor, Department of ECE, Malnad College of Engineering, Hassan, Karnataka, India [email protected]

Abstract Security of multimedia information is used to protect the multimedia content from unauthorized access. In this paper, we implemented security for text and image information using a cryptographic key. Based on the session type a key is generated which is used for encrypting and decrypting the messages which are transmitted between two sides. The length of the key varies in every session according to the session type. It is a reliable and flexible way to generate the key and it is easy to implement. This method ensures the prevention of guesses the key and provides a more secure way for information encryption. The proposed approach is implemented for different images using MATLAB.

Keywords: Text,Image cryptography,LSB of RGB image,Session log

1. Introduction With the rapid development of information technology and compression techniques, more and more multimedia applications have been recently used in all sectors of the society due to their easy understanding and attractive presentation characteristics. But the communication networks such as mobile networks and Internet are public media and are not suitable for direct transmission of confidential information[6]. Sensitive information like medical and legal records, credit ratings, Business transactions, Voice mail, Images like a protected geographical area of military importance or drawings which correspond to critical components of the system, defense information are routinely exchanged through Internet. Cryptography is a practical means for protecting this private information.However, conventional ciphers such as DES and AES are found unfit for multimedia information. The encryption key must be long. Yet, it is difficult to remember and even storing the key in a database or in a file may be insecure[5]. In addition, the protection of the confidentiality of encryption keys is one of the important issues to be dealt with. This issue can be efficiently solved through generating the key before starting the process of encryption and decryption, rather than storing it. In secure communication, key generation phase has many challenges and this problem can be solved if the sender and the receiver share the key in any other form or if they generate the keys readily during Shruthi K.S,IJRIT

163

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 163-167

encryption and decryption separately, thus, the concept of generating the key from an image came to the role.The main objective of this study is to create a new algorithm to secure connection by using the content of an image. The algorithm uses a color RGB image to generate a key which will be used in the encryption and decryption operations.The remaining parts of this paper are organized as follows: In section 3, we described the details of the proposed approach for image encryption. In section 4 we provided and analyzed the experimental results, In section 5, we concluded the paper.

2. Literature Review Anju1, Babita2, Reena3 and Ayushi Aggarwal4,[1] have published the paper on ” An approach to Improve the Data Security using Encryption and Decryption Technique”. The paper can give brief description about symmetric key algorithm. The proposed algorithm contains two levels of Exclusive OR (XOR) operation. Santhi et al. [2], have proposed a novel algorithm for key generation using image features. This study uses the Gray Level Co-occurrence matrix of an image to extract the Gray Level Co-occurrence properties of the image. A 56-bit subkey is generated from the extracted Gray Level Cooccurrence properties.Varsha Bhatt[3] have proposed a Implementation Of New Advance Image Encryption Algorithm To Enhance Security Of Multimedia Component. In this paper a simple and strong mechanism has been proposed for image security using a combination of block based image transformation and proposed encryption techniques. Prashant Vaidyanathan ,Nitish Malhotra ,Jagadish Nayak have proposed[4] ,” A New Encryption Technique For The Secured Transmission And Storage Of Text Information with Medical Images”. The plain text such as patient information is given a primary layer of security by using a pattern based on the arrangement of characters within a matrix.

3. Session Based Key Generation Algorithm The proposed Session Based Encryption technique is a new approach to both the text and image encryption, which aims to transfer confidential information over a shared network. Our algorithm aims to transfer confidential information over a shared network .It includes the following steps as showed in figure.1. Text encryption algorithm Plain text Original Image

Encrypted Text

Key

Session log and Image database Key

Image encryption algorithm

Encrypted Image

Figure 1(a): Block diagram of encryption Text decryption algorithm Encrypted Text Encrypted Image

Plain text

Key

Session log and Image database Key

Image decryption algorithm

Original Image

Figure 1(b): Block diagram of decryption Shruthi K.S,IJRIT

164

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 163-167

Table 1: Stages of the Entire Process Stages Stage 1 Stage 2 Stage 3 Stage 4

Process Image Database Key generation Encryption Decryption

3.1 Image Database: In this phase, consider a database of color RGB images which would be used for generating the key for encryption/decryption process [4]. In case of using hourly session, the database should contain 24 images, otherwise, it should contain 7 images for the daily session. Both the sender and the receiver should use the same database of images (24 or 7 images) as the names of the images should be the same in both sides. 3.2 Key Generation:Key is generated from the color image stored in database based on the session type.In this phase,24 images are used on hourly basis.Only authorized sender and receiver can access the image database.Color image is composed of 3 images. Color digital images are made of pixels, and pixels are made of combination of primary colors, a channel is made of just one of these primary colors. In this paper we used one channel of RGB color image either red, blue or green[7]. So we have to choose one of these Channels where each pixel should donate only bit called the Least significant Bit(LSB).The time of implementation was 01:20:05,so the image 1.jpg will be choosen from the database for key generation phase to encrypt or decrypt the information.Extract the pixels values of R/G/B channels.Derive the LSB values of all the pixels.compare the two neighbor values where the absolute difference between them is one.The values of the component should be stored in an array of size[N*K] where N= the number of message bits in the information and K=length of the key varies between 2 to N which is even number.This K value should be same at both sender and receiver.

Figure 2: Key generation phase and the key array. 3.3 Encryption: Transforms the values of the message characters or pixel values which are in decimal to binary values.the binary values are stored in multidimensional array of size[N,N].In this phase, a new array of encrypted data is created by comparing the rows of the data array with the columns of the key array.The first row of Data/image array is processed with the first two columns of key array as we described in figure 6 where the bits will be substituted to 0 or 1 according to the key bits. If the Data array bit equals to key bit in the first column, it is substituted to 0 else while is substituted to 1.Thiscomparison is repeated for the next bits of the first row of Data array. After that the operation is repeated for the next Data row and next two Key columns and so on to all bits in Data array where the Key array has a specific number of columns.

Shruthi K.S,IJRIT

165

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 163-167

2.4 Decryption: By using same images database, image channel(R/G/B),K value for key array and session type. The generated key along with the encrypted message is sent for decryption finally the original message is retrieved. Table 2: Shows the key generated and the encryption for different Messages. Time

Image

K

01:35:43

1.jpg

8

Encrypted text Time 02:10:43

Account number 432987610086412

Key length 240bits

: K

Image 2.jpg

8

Encrypted text: Time Image

08:28:19

Message(N)

8.jpg

Message(N) Account number 432987610086412

K

10

Message(N)

Account number 432987610086412

Key length 240bits

Key length

300bits

Encrypted text:

4. RESULTS Assume the time of implementation was 19:46:15,so the image 19.jpg will be chosen from the database for key generation. Figure 3 shows encryption of text data for two different key length.As the K value varies,the length of the key changes.

Figure 3: Running implementation algorithm in MATLAB

Shruthi K.S,IJRIT

166

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 163-167

The proposed method used to secure both text and image information but Image information is different from the text data, it has larger amount of data [6], higher redundancy and stronger correlation between pixels. The effectiveness is very low in the image encryption as shown in Table 3.The third party can easily guess the original image. Compared with text encryption, which most existing encryption standards aim at, image encryption (or multimedia encryption) has its own characteristics and special features with many unique specifications.

Figure 4: Image encryption using LSB of color Image

5.Conclusion In this paper a simple and strong method has been proposed for text and image security. Due to Image information is different from the text data, the proposed method don’t give better result for image data as with text data. For the encryption of text. the proposed method creates a complex system for cracking and an easy way to implement. The security of the cryptographic system relies on the fact that the cryptographic keys are secret and known only to the legitimate user. Thus we proposed a new Cryptography method, in which encryption is performed based on sessions and the key length varies according to the message length. This creates more complexity to c r a c k or guess t he ke ys b y u si n g t h e c r yp t a n a l ys i s techniques. The experimental results revealed that this method is more secure than traditional. This algorithm is further enhanced by focusing on the image data base security.

6. References [1]. Anju,Babita, Reena and Ayushi Aggarwal,” An Approach to Improve the Data Security using

[2].

[3].

[4].

[5]. [6]. [7].

Encryption and Decryption Technique” International Journal of Information and Computation Technology.ISSN 0974-2239 Volume 3, Number 3 (2013), pp. 125-130. Santhi, B., K.S. Ravichan dran, A.P. Arun and L. Chakkarapani.”A Novel Cryptographic Key Generation Method Using Image Features”, Research Journal of Information Technology,4(2): 88-92, 2012. Varsha Bhatt,”Implementation Of New Advance Image Encryption Algorithm To Enhance Security Of Multimedia Component” International Journal Of Advanced Technology & Engineering Research (IJATER) ISSN No: 2250-3536 Volume 2, Issue 4, July 2012 13. Prashant vaidyanathan,Nitish Malhotra,Jagadish NAYAK,” A New Encryption Technique For The Secured Transmission And Storage Of Text Information With Medical Images”, Engineering Review Vol. 32, Issue 1, 57-63, 2012. Introduction to Cryptography – Ranjan Bose – Tata Mc-Grewhill Publisher ltd, 2001. William Stallings,” Cryptography and Network Security:Principles and Practice", 2/3e Prentice hall, 1999. Wikipedia, Channel (digital image). http://en.wikipedia.org/wiki/Channel_(digital_image), Jan 1, 2013.

Shruthi K.S,IJRIT

167

Text and Image Encryption Using Color Image as A Key - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June ... 1 Student, Department of ECE, Malnad College of Engineering,.

1MB Sizes 0 Downloads 237 Views

Recommend Documents

Text and Image Encryption Using Color Image as A Key - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June ... 1 Student, Department of ECE, Malnad College of Engineering,.

Fire Detection Using Image Processing - IJRIT
These techniques can be used to reduce false alarms along with fire detection methods . ... Fire detection system sensors are used to detect occurrence of fire and to make ... A fire is an image can be described by using its color properties.

Fire Detection Using Image Processing - IJRIT
Keywords: Fire detection, Video processing, Edge detection, Color detection, Gray cycle pixel, Fire pixel spreading. 1. Introduction. Fire detection system sensors ...

Image Retrieval: Color and Texture Combining Based on Query-Image*
into account a particular query-image without interaction between system and .... groups are: City, Clouds, Coastal landscapes, Contemporary buildings, Fields,.

Comparison of Symmetric Key Encryption Algorithms - IJRIT
Today it becomes very essential to protect data and database mostly in .... within today's on-chip cache memory, and typically do so with room to spare. RC6 is a ...

Underwater Image Enhancement Techniques: A Survey - IJRIT
Different wavelength of light are attenuated by different degree in water. Underwater images are ... 75 found in [28]-[32]. For the last few years, a growing interest in marine research has encouraged researchers ..... Enhancement Using an Integrated

Comparison of Symmetric Key Encryption Algorithms - IJRIT
In this paper we provides a comparison between most common symmetric key cryptography algorithms: DES, AES, RC2, ... Today it becomes very essential to protect data and database mostly in e-transaction. The information has .... For most applications,

Image processing using linear light values and other image ...
Nov 12, 2004 - US 7,158,668 B2. Jan. 2, 2007. (10) Patent N0.: (45) Date of Patent: (54). (75) ..... 2003, available at , 5.

Image inputting apparatus and image forming apparatus using four ...
Oct 24, 2007 - Primary Examiner * Cheukfan Lee. (74) Attorney, Agent, or Firm * Foley & Lardner LLP. (57). ABSTRACT. A four-line CCD sensor is structured ...

2D Image Morphing Using Pixels Based Color Transition.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2D Image ...

Image Retrieval Using Weighted Color Co,occurrence ...
Dong Liang, Jie Yang, Jin4jun Lu, and Yu4chou Chang. Institute of Image Processing and Pattern Recognition,. Shanghai Jiao Tong University, Shanghai 200030, China. Abstract. Weighted Color Co4occurrence Matrix (WCCM) is introduced as a novel feature

Using Text-based Web Image Search Results ... - Semantic Scholar
top to mobile computing fosters the needs of new interfaces for web image ... performing mobile web image search is still made in a similar way as in desktop computers, i.e. a simple list or grid of ranked image results is returned to the user.

Using Text-based Web Image Search Results ... - Semantic Scholar
In recent years, the growing number of mobile devices with internet access has ..... 6 The negative extra space is avoided by the zero value in the definition of ...

Text-Based Image Retrieval using Progressive Multi ...
The resultant optimization problem in MIL-. CPB is easier in this work, ... vant web images returned by the image search engine and the method suggested in ...

Improvement in Performance Parameters of Image ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, ... Department of Computer Science and Engineering, Technocrats Institute of Technology ... Hierarchical Trees (SPIHT), Wavelet Difference Reduction (WDR), and ...

IMAGE RESTORATION USING A STOCHASTIC ...
A successful class of such algorithms is first-order proxi- mal optimization ...... parallel-sum type monotone operators,” Set-Valued and Variational. Analysis, vol.

Clear key encryption using MP4BOX -
What tools are needed and where are they ? MP4Box to encrypt or decrypt ... drm_file. It is an XML file whose syntax looks like this: XML Syntax. 1. 2. 3. 4. 5. 6. 7.

Image segmentation approach for tacking the object: A Survey ... - IJRIT
Identification: Colour is a power description tool, for example, the red apple versus the ..... Conference on Pattern Recognition., Quebec City, Canada, volume IV, ...

a new color image cryptosystem based on a ... - Semantic Scholar
is used to build a new digital chaotic cryptosystem. The characteristics of PWLCM are very suitable for the de- sign of encryption schemes. The implicit digital ...

Image segmentation approach for tacking the object: A Survey ... - IJRIT
Identification: Colour is a power description tool, for example, the red apple versus the brown ..... Code available at http://www.cis.upenn.edu/˜jshi/software/.

Lesson 1.2: Filter image results by color
Key idea: Posing a general query, then filtering the results. ○ Example: Filtering image results by color. Page 2. Filter image results by color. ○ When the results aren't quite what you want … filter by color. Page 3. Filter image results by c