Choase Based Image Encryption Using Block-Based Transformation Algorithm
Choase Based Image Encryption Using Block-Based Transformation Algorithm
Choase Based Image Encryption Using Block-Based Transformation Algorithm
Abstract: Encryption is used to securely transmit data in open them to the choase based encryption algorithm. By using the
networks. Each type of data has its own features; therefore correlation and entropy as a measure of security, this process
different techniques should be used to protect confidential results in a lower correlation and a higher entropy value
image data from unauthorized access. Most of the available when compared to using the choase based algorithm alone,
encryption algorithms are mainly used for textual data and may and thus improving the security level of the encrypted
not be suitable for multimedia data such as images. In this images. There are two main keys to increase the entropy; the
paper, we introduce a block-based transformation algorithm
variable secret key of the transformation process and the
based on the combination of image transformation and Choase
base image encryption algorithm. The original image was
variable secret key of the choase based algorithm works
divided into blocks, which were rearranged into a transformed using an iterative cipher mechanism that is based on the
image using a transformation algorithm presented here, and logistic function. The encryption module encrypts the image
then the transformed image was encrypted using the Choase pixel by-pixel, taking into consideration, in each iteration
base algorithm. The results showed that the correlation between the values of the previously encrypted pixels. This feedback
image elements was significantly decreased by using the property, combined with the external secret key of 256-bit,
proposed technique. The results also show that increasing the makes our stream cipher robust against cryptanalytic
number of blocks by using smaller block sizes resulted in a attacks. Furthermore a simple implementation of image
lower correlation and higher entropy. encryption achieves high encryption rates on general-
purpose computers.
Keywords—Image correlation, Image encryption, Image
entropy, Permutation, Choase function.
2. Background
1. Introduction Encryption is the process of transforming the information
to insure its security with the huge growth of computer
The rapid growth of computer networks allowed large networks and the latest advances in digital technologies, a
files, such as digital images, to be easily transmitted over the huge amount of digital data is being exchanged over various
internet [1]. Data encryption is widely used to ensure types of networks. It is often true that a large part of this
security however, most of the available encryption information is either confidential or private. As a result,
algorithms are used for text data. Due to large data size and different security techniques have been used to provide the
real time constrains, algorithms that are good for textual required protection [8].
data may not be suitable for multimedia data [2]-[4]. The
efficiency and success of e-commerce and business was The security of digital images has become more and more
fueled by the underlying growth of available network important due to the rapid evolution of the Internet in the
bandwidth. Over the past few years, internet-enabled digital world today. The security of digital images has
business or e-business has drastically improved revenue and attracted more attention recently, and many different image
efficiency of large scale organizations. It has enabled encryption methods have been proposed to enhance the
organizations to lower operating costs and improves security of these images [9].
customer’s satisfaction. Such applications require networks
which accommodate voice, image, video and protected data. Image encryption techniques try to convert an image to
Obviously, privacy must another one that is hard to understand [9]. On the other
In most of the natural images, the values of the hand, image decryption retrieves the original image from
neighboring pixels are strongly correlated (i.e. the value of the encrypted one. There are various image encryption
any given pixel can be reasonably predicted from the values systems to encrypt and decrypt data, and there is no single
of its neighbors) [5]-[7]. In order to dissipate the high encryption algorithm satisfies the different image types.
correlation among pixels and increase the entropy value, we
propose a transformation algorithm that divides the image Most of the algorithms specifically designed to encrypt
into blocks and then shuffles their positions before it passes digital images are proposed in the mid-1990s. There are two
20 (IJCNS) International Journal of Computer and Network Security,
Vol. 1, No. 3, December 2009
4. Algorithm Choase based feedback image Input original Block Based Transform
encryption image Transformation Image
[∑ ]
32
Kimod256 Case Number of Block size
C0 =
i=1 Number blocks
Here Ki , Floor , and M1 are, respectively, the decimal
equivalent of the ith session key, the floor function, and 1 30×30 10 pixels × 10
mapping from the session, key space, all integers between 0 pixels
and 255, into the domain of the logistic map, all real 2 60×60 5 pixels × 5
numbers in the interval [0,1]. pixels
4. Read a byte from the image file (that represent a block
of 8-bits) and load it as plain image pixel Pi.. 3 3 100×100 3 pixels × 3
5. Encryption of each plain image pixel Pi to produce its pixels
corresponding cipher image Pixel Ci can be expressed
mathematically as:
Case1.
N
Pi+M2 ∑ rXi1− Xi mod256 .
Ci =
i=1
Where Xi represents the current input for logistic
Map and computed as:
Xi = M1[X i-1 + C i-1 + K i]
N is the number of iteration of logistic map for its current
input Xi and calculated as:
N = K i +1 + C i-1
And M2 maps the domain of the logistic map, back into
the interval [0,255]. (a) (b) (c)
6. Repeat steps 5-6 until the entire image file is Figure 2. Results of encryption by using 10 pixels × 10 pixels
encrypted. blocks. (a) Original image.(b) Transformed image. (c) Encrypted
image using transformed followed by the Choase Based algorithm.
5. An overview of the proposed technique. Case2.
22 (IJCNS) International Journal of Computer and Network Security,
Vol. 1, No. 3, December 2009
00
300×3 0.0016 5.5439
00
RC4(2048 30×30 0.0024 5.5438
60×60 0.0026 5.5437
100×1 0.0034 5.5439
00
300×3 0.0034 5.5438
00
(a) (b) (c)
Figure 3. Results of encryption by using 60 pixels × 60 pixels 7. Conclusion
blocks. (a) Original image.. (b) Transformed image. (c) Encrypted
image using transformed followed by the Choase Based algorithm In this paper a simple and strong method has been
proposed for image security using a combination of block
based image transformation and encryption techniques.
Case3. Experimental results of the proposed technique showed that
an inverse relationship exists between number of blocks and
correlation, and a direct relationship between number of
blocks and entropy. When compared to many commonly
used algorithms, the proposed algorithm resulted in the best
performance; the lowest correlation and the highest entropy.
References
Author Profile
Kamlesh Gupta received B.E degree in
Computer science and Engineering.
FromRajiv Gandhi Proudyogiki
Vishwavidyalaya, Bhopal in 2001 and
M.Tech degree in Computer science and
Engineering. from Rajiv Gandhi
Proudyogiki Vishwavidyalaya,Bhopal in
2005 Currently pursuing Ph...D from Rajiv
Gandhi Proudyogiki Vishwavidyalaya, Bhopal Research interests
include image processing and image security . He is working as
Lecturer in the Department of Information Technology,
Rustamji Institute of Technology, BSF Academy Tekanpur,
Gwalior Madhya Pradesh, India