Conference PaperPDF Available

Partial Image Encryption Algorithm Using Pixel Position Manipulation Technique: The SMART Copyback System

Authors:

Abstract and Figures

Nowadays, the most important locomotive to provide confidentiality is image encryption. In real-time applications the classical and modern ciphers are not appropriate because of vast quantity of data. However, certain applications like Pay-TV or Payable Internet Imaging Albums do not require entire part of an encryption, but requires a part of the image to be transparent to all users. Partial encryption is an approach to encode only the most essential portion of the data in order to afford a proportional confidentiality and to trim down the computational requirements and also execution time for encryption is reduced. In this paper, partial image encryption of color images using pixel position manipulation technique based on region of interest is proposed. It offers the amenities of partial encryption and reconstructs the images partially. Here input image is divided into sub blocks, and then selected blocks are encrypted using the proposed technique. The proposed technique achieves quick security by encrypting the selected blocks of an image. Encrypted data can be store long term without fail using SMART (Self Monitoring Analysis and Reporting Technology Copyback) system.
Content may be subject to copyright.
Partial Image Encryption Algorithm Using Pixel Position Manipulation Technique:
The SMART Copyback System
Parameshachari B D
Dept. of ECE, K S Institute of Technology, Bangalore.
(Dept. of Electronics Engineering, Jain University,
Bangalore, Karnataka, India).
E-mail: parameshbkit@gmail.com
Rajashekarappa
Dept. of ISE, SDMCET, Dharwad.
(Dept. of Computer Science & Engineering, Jain
University, Bangalore, Karnataka, India.)
E-mail: rajashekarmb@gmail.com
K M Sunjiv Soyjaudah
Department of Electrical & Electronic Engineering.
University of Mauritius, Reduit, Mauritius.
Sumithra Devi K A
R V College of Engineering
Bangalore, Karnataka, India.
Abstract Nowadays, the most important locomotive to
provide confidentiality is image encryption. In real-time
applications the classical and modern ciphers are not
appropriate because of vast quantity of data. However, certain
applications like Pay-TV or Payable Internet Imaging Albums
do not require entire part of an encryption, but requires a part
of the image to be transparent to all users. Partial encryption is
an approach to encode only the most essential portion of the
data in order to afford a proportional confidentiality and to
trim down the computational requirements and also execution
time for encryption is reduced. In this paper, partial image
encryption of color images using pixel position manipulation
technique based on region of interest is proposed. It offers the
amenities of partial encryption and reconstructs the images
partially. Here input image is divided into sub blocks, and then
selected blocks are encrypted using the proposed technique.
The proposed technique achieves quick security by encrypting
the selected blocks of an image. Encrypted data can be store
long term without fail using SMART (Self Monitoring Analysis
and Reporting Technology Copyback) system.
Keywords- Region of interest; Partial encryption; Random
key generator; Exclusive-OR; Partial decryption;SMART;
I.
I
NTRODUCTION
The product of the area of mathematics in information
theory and the various ways of manage and manipulate
information addresses area gives the data encryption. There
are two fundamentals methods in Cryptography; one is,
called plain data, converted to an unidentifiable data called
cipher data. This process is also called encipher the data or
encryption. The Second method is to convert cipher data
back to the original plain data, this process is called to
decipher, or decrypting the data. The encrypted data is
allowed to access only an authorized person with known
secret key. The fundamental concept of most data
encryptions algorithms is secret key [1-5].
Multimedia data requires either full encryption or partial
encryption depending on the application requirements. For
example military and law enforcement applications require
full encryption. Nevertheless, there is a large spectrum of
applications that demands security on a lower level, as for
example that ensured by partial encryption. Such approaches
reduce the computational requirements in networks with
diverse client device capabilities [6]. In this paper, the aim of
partial encryption of an image is to encrypt only regions of
interest (ROI) which are defined within particular areas of
the image. The goal of partial encryption is to encrypt a well
defined range of parameters or coefficients, as for example
would be the higher spectrum of frequencies. Partial
encryption can be used to process and transmit images
acquired by a surveillance video-camera. Indeed, in order to
envisage these images in real time, they must be rapidly
transmitted and the full encryption is not really necessary.
On the other hand partial encryption diminishes the data size
to be encrypted and accordingly requires lower
computational time which is an important quality in wireless
and portable multimedia systems. In [16] a novel concept of
combined partial image encryption using phase manipulation
and sign encryption has been proposed.
The concept of region based partial image encryption
finds use in time crucial applications wherein security is also
anxiety such as, internet banking transactions, military image
database and communication and medical imaging systems.
Special and reliable security in transmission of digital images
is desired in many applications, such as pay-TV, confidential
video conferencing and corporate communications. Looking
at the requirements of the hour and the existing techniques,
the initiative of region based partial image encryption finds a
major role in the field of image security. Secured data can be
stored for long time with Copyback of SMART [17]. The
remaining paper is arranged as follows. Section 2 describes
the basics of partial image encryption and region of interest.
Section 3 illustrates the proposed method. Section 4 monitors
the results of the experiments and conclusion of this paper is
described in section 5.
2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology
978-1-4799-7910-3/14 $31.00 © 2014 IEEE
DOI 10.1109/ICAIET.2014.37
177
II. O
VERVIEW OF
P
ARTIAL
I
MAGE
E
NCRYPTION
Selective image encryption can be realized in the spatial
domain by decomposing the image into bit-planes before
compression. Consequently, encryption is achieved by
encrypting a subset of the most significant bit-planes [9-
10].The significant bit-planes have higher adjacent
correlations and carry more perceptual information proposed
by Subba Rao et al.[11]. The majority of the selective
encryption schemes encrypt a selected number of DC or AC
coefficients for JPEG images, when the image is transformed
into the frequency domain using discrete cosine transform
[12-16].
The utilization of partial encryption has increased with
the increase in prerequisite for conditional access of
multimedia data. This paper proposes an partial encryption
technique in which the coefficient value of only selected
coefficients are changed, thus controlling the transparency of
the multimedia data at the time of encryption. The
coefficients to be encrypted are decided on the basis of a user
defined criterion or region of interest, which acts as partial
encryption technique. According to the partial encryption, is
applied only to the selected part of the image, not the whole
part of the image. Selected part of the image based on the
region of interest area is directing to decrease the execution
time for encryption. The implementation of partial image
encryption suitable for the real time applications like image
encryption for medical, image encryption for satellite among
others. The main objective of partial encryption of a bit
stream is to formulate the complete stream somehow
inadequate for anybody that who cannot decrypt the ciphered
subset. Figure 8.1shows the Selection of region of interest
area.
Figure 1: Block diagram for Selection of region of interest area
III. P
ROPOSED
M
ETHOD
Figure 2: Block diagram of the proposed technique
This paper explains the concept of partial image
encryption. Here input color image is divided in to sub
blocks, then selected blocks are fed into the encryption
block. Encrypt the selected blocks using XOR (Exclusive-
OR) and mod (modulus after division) operator with a
random key generator. Then combine the encrypted selected
blocks and unselected blocks gives partially encrypted
image.
IV. E
XPERIMENTAL
R
ESULTS
The proposed system is implemented successfully using
MATLAB R2010a and the following results are obtained.
From the experimental results we can observe that sub block
based partial image encryption is sufficient to secure the
significant information in an image. The decrypted image is
analogous to the input image demonstrate that the algorithm
has also been successful in decrypting it suitably. To
demonstrate that our proposed algorithm has strong
resistance to statistical attacks, test is carried out on the
histogram of enciphered image. Several color images are
selected for this purpose and their histograms are compared
with their corresponding ciphered image. Fig. 4, Fig. 6, Fig.
8, and Fig. 10, show the histogram of the different color
images. It is clear that the histogram of the encrypted image
is appreciably different from the particular histogram of the
original image and tolerate no statistical similarity to the
plain image. Hence statistical attack on the proposed image
encryption procedure is difficult. Using the RAID Level 5
for storing these encrypted data for long term without fail as
illustrated in table I.
V. C
ONCLUSION
In this paper, proposed a simple but effective method of
partial image encryption of color images using pixel
position manipulation technique based on region of interest
proposed. The aim of the overall study was to develop a
partial image encryption processing system that was secure
prior to entering the electronic communication system and
to decrypt such an image after reception. All steps of partial
encryption and decryption were simulated using MATLAB.
The proposed partial encryption technique controls the
transparency and security in a proficient conduct by
encrypting the selected blocks of an image based on region
of interest. Thus the experimental results show that the not
only proposed techniques achieved quick security,
flexibility, effectiveness and reliable but also store these
data for long time with copyback of self monitoring analysis
and reporting technology.
A
CKNOWLEDGEMENT
The work described in this paper is supported by
President and Secretary, K S Group of Institutions, Principal
and, HOD, ECE, K. S Institute of Technology, Bangalore.
178
Authors would like to thank Dr. Sandeep Shastri, Pro-
Vicechancellor, Jain University, Bangalore for providing a
strong platform for research work.
R
EFERENCES
[1] Petkovic, M., Jonker, W. Preface, “Special issue on secure data
management,” Journal of Computer Security, 17(1), pp.1-3,2009.
[2] Bernstein, D.J., Chen, T.R., Cheng, C.M., Lange, T. & Yang, B.Y.
“ECM on graphics cards”. In A. Joux (Ed.), Advances in Cryptology
- Eurocrypt 2009 (28th Annual International Conference on the
Theory and Applications of Cryptographic Techniques, Cologne,
Germany, April 26-30, 2009. Proceedings) Vol. 5479. Lecture Notes
in Computer Science (pp. 483-501). Berlin: Springer ,2009.
[3] Bernstein, D.J., Lange, T., Peters, C.P. & Tilborg, H.C.A. van.
“Explicit bounds for generic decoding algorithms for code-based
cryptography”. In International Workshop on Coding and
Cryptography (WCC 2009, Ullensvang, Norway, May 10-15, 2009.
Pre-proceedings) (pp. 168-180). Bergen: Selmer Center, University of
Bergen ,2009.
[4] Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A.K., Molnar, D.,
Osvik, D.A. & Weger, B.M.M. de. “Short chosen-prefix collisions for
MD5 and the creation of a 18 rogue CA certificate”. In S. Halevi
(Ed.), Advances in Cryptology - CRYPTO 2009 (29th Annual
International Cryptology Conference, Santa Barbara CA, USA,
August 16-20, 2009. Proceedings) Vol. 5677. Lecture Notes in
Computer Science (pp. 55-69). Berlin: Springer ,2009.
[5] Kahate A., “Cryptography And Network Security”, Tata-McGraw-
Hill, 2nd edition, 2008.
[6] H. Cheng and X. Li. Partial Encryption of Compressed Images and
Videos. IEEE Trans. On Signal Processing, 48(8):2439–2445, 2000.
[7] Peng Chang and John Krumm, "Object Recognition with Color Co-
occurrence Histograms", IEEE Conference on Computer Vision and
Pattern Recognition, Fort Collins, CO, June 23-25, 1999
[8] Rafael C. Gonzalez and Richard E. Woods, "Digital Image
Processing", second edition, Pearson Education, 2003
[9] Norcen, R., Podesser, M., Pommer, A., et al.,. Confidential storage
and transmission of medical image data. Comput. Biol. Med.,
33(3):277-292, 2003
[10] Podesser, M., Schmidt, H.P., Uhl, A.,. Selective bitplane encryption
for secure transmission of image data in mobile environments. Proc.
5th Nordic Signal Processing Symp., p.1034-1037 (2002)
[11] Subba Rao, Y.V., Mitra, A., Mahadeva Prasanna, S.R.,. “A partial
image encryption method with pseudo random sequences”, LNCS,
4332:315-325, 2006
[12] Droogenbroeck, M.V., Benedett, R., “Techniques for a selective
encryption of uncompressed and compressed images”, Proc.
Advanced Concepts for Intelligent Vision Systems, p.90-97. (2002)
[13] Stutz, T., Uhl, A.,. Transparent image encryption using progressive
JPEG. LNCS, 4176:286-298,2006
[14] Krikor, L., Baba, S., Arif, T., et al.,. Image encryption using DCT and
stream cipher. Eur. J. Sci. Res., 32(1): 48-58.,2009
[15] H.T.Panduranga, and S. K. Naveenkumar, “Selective image
encryption for Medical and Satellite Images”, International Journal of
Engineering and Technology,vol. 5, no. 1, pp. 115–121,2013.
[16] Parameshachari B D, Dr. K M Sunjiv Soyjaudah and Dr. Sumithra
Devi K A,“Secure Transmission of an Image using Partial Encryption
based Algorithm”, International Journal of Computer Applications
(0975–8887), 63(16). Published by Foundation of Computer Science,
New York, USA, pp 33-36,2013.
[17] Rajashekarappa and Dr. K M Sunjiv Soyjaudah, ”Self Monitoring
Analysis and Reporting Technology (SMART) Copyback”, pp 463-
469, ©Springer-Verlag Berlin Heidelberg 2011.
Figure 3: Partial encryption and decryption of the input color image Figure 4: Histograms of Partial encryption and decryption of the input
color image of figure 3
179
Figure 5: Partial encryption and decryption of the input color Figure 6: Histograms of Partial encryption and decryption of the input
color image of figure 3
Figure 7: Partial encryption and decryption of the input color image Figure 8: Histograms of Partial encryption and decryption of the
input color image of figure 7
180
Figure 9: Partial encryption and decryption of the input color image Figure 10: Histograms of Partial encryption and decryption of the input color
image of figure 9
Figure
11
: Partial encryption and decryption of the input color image
Figure 10: Histograms of Partial encryption and decryption of the
input color image of figure 11
TABLE I: Test Case for Virtual Disk Creation Successful Test
SL. No. of Test Case Unit Test Case - 01
Name of test Virtual Disk Creation
Successful test
Feature being tested Creating a RAID Level 5 using Three Physical Disks (PD)
Sample Input Selected 3 Physical Disks (PDs)
Expected Output Action Performed and its log file
Actual output As Expected
Remarks Test Successful there is no error
181
Article
Full-text available
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper we propose a novel concept of combined partial image encryption using phase manipulation and sign encryption. Entire encryption process involves two stages where image to be encrypted are applied to phase manipulation block. In first stage Fourier Transform (FT) is applied to get phase and magnitude of the input image. Phase of the image are scrambled to get modified image after applying Inverse Fourier Transform. In second stage the modified image is partially encrypted by using sign encryption. Sign Encryption finally gives resultant partially encrypted image by extracting the sign bits of modified image. Experiment is conducted for an image using MATLAB software. From the experiment we obtained partially encrypted image at the end of encryption process. Decryption process employs exactly reverse process of encryption which results in the reconstructed images.
Article
Full-text available
Information security plays a very important role in fast growing information and communication technology. Few applications like medical image security and satellite image security needs to secure only selected portion of the image. This paper describes a concept of selective image encryption in two ways. First method divides the image in to sub blocks, then selected blocks are applied to encryption process. Second method automatically detects the positions of objects, and then selected objects are applied to encryption process. Morphological techniques are used to detect the positions of the objects in given images. These two approaches are specifically developed to encrypt the portion of an image in medical images and satellite image.
Article
Full-text available
In this work we present a new method for image encryption by selecting specific higher frequencies of DCT coefficients that taken as the characteristic values, and encrypting them, and the resulted encrypted blocks are shuffled according to a pseudo-random bit sequence. Selective encryption is a recent approach to reduce the computational requirements for huge volumes of images.
Article
Users have variety of requirements of data storage that can be addressed using Self Monitoring Analysis and Reporting Technology (SMART) Copyback. It is estimated that over 94% of all new information produced in the world is being stored on magnetic media, most of it on Physical Disks (PD). Moreover, larger population studies rarely have the infrastructure in place to collect health signals from components in operation, which is critical information for detailed failure analysis. It presents the data collected from detailed observations of a large disk drive population in production Internet services deployment. Analysis identifies several parameters from the Physical Disks (PD), self monitoring facility (SMART) that correlate highly with failures. Despite this high correlation conclude that models based on SMART parameters alone are unlikely to be useful for predicting individual drive failures. Surprisingly, it found that temperature and activity levels were much less correlated with Physical Disk (PD) failures.
Article
We propose selective bitplane encryption to provide secure image transmission in low power mobile environments. Two types of ciphertext only attacks against this scheme are discussed and we use the corresponding results to de-rive conditions for a secure use of this technique.
Article
We present a refined chosen-prefix collision construction for MD5 that allowed creation of a rogue Certification Authority (CA) certificate, based on a collision with a regular end-user website certificate provided by a commercial CA. Compared to the previous construction from Eurocrypt 2007, this paper describes a more flexible family of differential paths and a new variable birthdaying search space. Combined with a time-memory trade-off, these improvements lead to just three pairs of near-collision blocks to generate the collision, enabling construction of RSA moduli that are sufficiently short to be accepted by current CAs. The entire construction is fast enough to allow for adequate prediction of certificate serial number and validity period: it can be made to require about 2<sup>49</sup> MD5 compression function calls. Finally, we improve the complexity of identical-prefix collisions for MD5 to about 2 <sup>16</sup> MD5 compression function calls and use it to derive a practical single-block chosen-prefix collision construction of which an example is given. © 2009 Springer.
Article
We discuss computationally efficient techniques for confidential storage and transmission of medical image data. Two types of partial encryption techniques based on AES are proposed. The first encrypts a subset of bitplanes of plain image data whereas the second encrypts parts of the JPEG2000 bitstream. We find that encrypting between 20% and 50% of the visual data is sufficient to provide high confidentiality.
Conference Paper
We use the color cooccurrence histogram (CH) for recognizing objects in images. The color CH keeps track of the number of pairs of certain colored pixels that occur at certain separation distances in image space. The color CH adds geometric information to the normal color histogram, which abstracts away all geometry. We compute model CHs based on images of known objects taken from different points of view. These model CHs are then matched to subregions in test images to find the object. By adjusting the number of colors and the number of distances used in the CH, we can adjust the tolerance of the algorithm to changes in lighting, viewpoint, and the flexibility of the object We develop a mathematical model of the algorithm's false alarm probability and use this as a principled way of picking most of the algorithm's adjustable parameters. We demonstrate our algorithm on different objects, showing that it recognizes objects in spite of confusing background clutter partial occlusions, and flexing of the object