Sunteți pe pagina 1din 5

An effective image encryption approach in smart phones

Honnaraju B, Deepu R, Murali S Maharaja Institute of Technology, Mysore, Karnataka, India honnaraju.gowda@gmail.com, rdeepsingh@mitmysore.in
Abstract : With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. A mobile Operating system is an OS for hand held devices or mobiles. Smart phones in todays World are found to be based on different Operating systems. For ex., Nokias Symbian OS, Apples IOS, RIMs BlackBerry OS, Microsofts Windows Phone OS, Googles Android, Samsungs Bada OS, etc., Android has a large community of developers writing applications (apps) that extend the functionality of the devices. As of March 2012 there were more than 480,000 apps available for Android. In this paper we are presenting a technique for Image Encryption which will be useful to protect confidential image data from unauthorized access. We have introduced a block-based transformation algorithm which is based on the pixel value rotation of image. The number of times pixels rotated is decided by the random number generated. Result shows encrypted and decrypted image using imagencrypt app we developed. Key words: Encryption, Decryption, RSA, Rotation, Block-based.
I.INTRODUCTION

images directly, it is not a good idea for two reasons. One is that the image size is almost always much greater than that of text. Therefore, the traditional cryptosystems need much time to directly encrypt the image data. The other problem is that the decrypted text must be equal to the original text. However, this requirement is not necessary for image data. Due to the characteristic of human perception, a decrypted image containing small distortion is usually acceptable.
II. BACKGROUND

The field of encryption is becoming very important in the present era in which information security is of utmost concern. Security is an important issue in communication and storage of images, and encryption is one of the ways to ensure security. Image encryption has applications in internet communication, multimedia systems, medical imaging, telemedicine, military communication, etc. Images are different from text. Although we may use the traditional cryptosystems to encrypt

Encryption is the process of transforming the information to insure its security. With the huge growth of computer networks and the latest advances in digital technologies, a huge amount of digital data is being exchanged over various types of networks. It is often true that a large part of this information is either confidential or private. As a result, different security techniques have been used to provide the required protection. The security of digital images has become more and more important due to the rapid evolution of the Internet in the digital world today. The security of digital images has attracted more attention recently, and many different image encryption methods have been proposed to enhance the security of these images. Image encryption techniques try to convert an image to another one that is hard to understand. On the other hand, image decryption retrieves the original image from the encrypted one. There are various image encryption systems to encrypt and decrypt data, and there is no single encryption algorithm satisfies the different image types. Most of the algorithms specifically designed to encrypt digital images are proposed in the mid1990s. There are two major groups of image encryption algorithms: (a) non-chaos selective methods and (b) Chaos-based selective or nonselective methods.

Most of these algorithms are designed for a specific image format compressed or uncompressed, and some of them are even format compliant. There are methods that offer light encryption (degradation), while others offer strong form of encryption. Some of the algorithms are scalable and have different modes ranging from degradation to strong encryption. The proposed algorithm generates a random numbers in between 1 to 8 and rotates the pixel value based on the random number. The random number for each pixel is different. At present we have worked on gray scale images. Another proposed method is to divides the image into random number of blocks with predefined maximum and minimum number of pixels, and apply the above mention method to each block independently.
III. MOTIVATION

V. THE PROPOSED TECHNIQUE A. Description of the Transformation Approach The transformation technique works as follows: the original image is divided into a random number of blocks. And generate the random number for each block and rotate the each pixel value by using the random number. Random numbers are stored in the file and then encrypted and send to the receiver. The block diagram of the proposed method is shown below:
Original Image

Divide the image into random number of blocks

Image processing on mobile phones is a new and exciting field with many challenges due to limited hardware and connectivity. Phones with cameras, powerful CPUs, and memory storage devices are becoming increasingly common. The need for benchmarking basic image processing routines such as: addition, convolution, thresholding and edge detection is important for comparison of systems. With this information developers and researchers can design complex computer vision and image processing applications while being aware of the current state of the art limitations and bottlenecks on mobile phones.
IV. CHALLENGES

Generate Random number of each block

Rotate Pixel values using random number

Encrypt Random Number File


Send Encrypted Image and Encrypted Random Number File

The Android operating system is preferable for benchmarking due to its recent growth in popularity with varying hardware manufactures e.g. HTC, Motorola, and Samsung. The Android operating system is supported and a part of the Open Handset Alliance. This alliance positions key manufacturers, cellular providers and the Android operating system in a collaborative environment which has caused large growth since October 2008 when the first Android mobile phone was released.

End Process

Figure 1: Flow chart Encryption Process

The function of the receiver is to decrypt the encrypted random file. The decrypted file is stored in the text file. This random file is used for the image decryption. The flow chart of the image decryption is shown in the below figure.

Encrypte d files

Decrypt the Encrypted random number file

Divide the Encrypted image file in blocks

Output: Decrypted Image File Steps: 1. Read Encrypted Image File and Encrypted Random file. 2. Decrypt the random number file. 3. Decrypt the image by rotating pixel values by using the decrypted random number file. (val << Rnum) | (val >> (8-Rnum)); 4. Output decrypted image. VII. RSA Scheme The RSA scheme is a block cipher. Each plain text is an integer 0 to n-1 for some n, which leads to a block size < log2(n). The typical size for n is 1024 bits. The details of the RSA algorithm are described as follows Key Generation 1. Pick two large prime number p & q, p q 2. Calculate n = p x q. 3. Calculate 4. Pick e, so that gcd(e,

Rotate Pixel values using random number

Get the Original Image


End Process

Figure 2: Flow chart for decryption process Algorithm: EncryptImageUsingPixelRotation() Input: Original Image I Output: Encrypted Image, and Random Number File Steps: 1. Read Image file. 2. Divide the image file into number blocks. 3. Generate random number for each block 4. Rotate each pixel using the random number. (val>>n) | (val<<(8-n)) Where val is the actual value of the image pixel, and n represent the number bit rotation. 5. Encrypt the random number file using RSA algorithm. Algorithm: DecryptImageUsingPixelRotation() Input: Encrypted Image, and Encrypted Random number file.

5. Calculate d, so that i.e d is the multiplicative inverse of e in mod

6. Get public key as 7. Get Private key as Encryption Decryption

; ;

For plain text P<n, its cipher text For plain text C, its plain text VIII. RESULTS

applications and real time application such as mobile phone services and wireless networks. a) Input Image REFERENCE [1] National Institute of Standards and Technology, Advanced Encryption Standards (AES),http://csrc.nist.gov/publications/fips/f ips197/fips-197.pdf, 2001. [2] J. Cheng; J.I. GUI, A new chaotic keybased design for image Encryption and Decryption, The 2000 IEEE International Symposium on Circuits and Systems, 2000. Proceedings. ISCAS Geneva, vol.4, pp. 49-52, May. 2000. [3] K. C. lyer and A. Subramanya, Image Encryption by Pixel Property Separation, http://eprint.iacr.org/2009/043.pdf, Cryptology ePrint Archive, 2009. [4] M. Ashtiyani, P. M. Birgani, and H. M. Hosseini, Chaos- Based Medical Image Encryption Using Symmetric Cryptography, in Information and Communication. [5] M. Yang, N. Bourbakis, and S. Li, Dataimage-video Encryption, potential, IEEE, vol. 23, no. 3, pp. 28-34, 2004 [6] Y. Zhou, S. Again, V. M. Joyner, and K. Panetta, Two Fibonacci p-code based image scrambling algorithms, in Image Processing: Algorithms and Systems VI, San Jose, CA, USA, 2008, pp. 681215-12. [7] J. Zou, R. K. Ward, and D. Qi, A new digital image Scrambling method based on Fibonacci numbers, in Circuits And Systems, 2004. Iscas04. Proceeding of the 2004 International Symposium on, 2004, pp.III-965-8 vol. 3. [8] Chen, Wei-Chao and Xiong, Yingen and Gao, Jiang and Gelfand, Natasha and Grzeszczuk, Radek. Efficient Extraction of Robust Image Features on Mobile Devices. In Proc. ISMAR 2007, 2007.

b) Encrypted Image

c) Decrypted Image Figure 3: Encryption and Decryption output CONCLUSION The Android Operating system for the mobile phones is making new stepping stone for every new aspect. Image Encryption in android based phones helps users in storing or sending confidential images. We have shown that using this app we can encrypt the image and send it to the destination of our choice. The recipient user should have same app to view the original image. The sender will provide secret key to recipient. We have introduced Lossless Encryption for Gray scale Images using a Binary rotation of image pixel values in smart phones. This algorithm is easy to implement in smart phones because they operate at the binary levels. They are also suitable for multimedia

[9] Mobile Image Processing on the Google Phone with the Android Operating System by Michael T. Wells

S-ar putea să vă placă și