Professional Documents
Culture Documents
net/publication/327500348
CITATIONS READS
29 1,058
3 authors, including:
A. Mitra
University of Burdwan
131 PUBLICATIONS 872 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by A. Mitra on 20 August 2018.
1 Introduction
In the present era, it is important to protect the information when it is passed
through an insecure channel. One way to provide such protection is to convert the
intelligible data into the unintelligible ones prior to transmission and such a pro-
cess of conversion with a key is called encryption [1]-[5]. Decryption is a reverse
process of the encryption. To protect the information from unauthorized users,
the key must be kept secret. Private and public key encryptions are two kinds
in cryptography. In symmetric or private key encryption [3]-[4], the encryption
and decryption processes are performed with the same key. But in asymmet-
ric or public key encryption [2], these operations are performed with different
keys. The entire security of the encryption technique depends on the key. Fur-
ther, the security needed may be against two types of attackers, namely, casual
listeners/observers or professional unauthorized recipients, termed as cryptan-
alysts. In the former case, the security is needed only in terms of hours while
A. Bagchi and V. Atluri (Eds.): ICISS 2006, LNCS 4332, pp. 315–325, 2006.
c Springer-Verlag Berlin Heidelberg 2006
316 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
in the later it may be in terms of years. The duration roughly indicates the
amount of time that is needed to analyze the information available in unintelli-
gible form in the insecure channel without the knowledge of keys to derive the
underlying information. The scenario where security is needed against casual
listener/observer, the cryptographic structure should be as simple as possible in
order to reduce the cost.
Our proposed scheme is mainly concentrated towards the private key en-
cryption. Both symmetric and asymmetric key encryption provides nearly same
amount of security. Depending on the application either of the technique is pre-
ferred. In real time applications, where security needs to be provided against
casual listeners, the encryption of the entire image with classical techniques
[6]-[8] like advanced encryption standard (AES), or, international data encryp-
tion algorithm (IDEA) are not always advantageous due to high computational
complexity. Further, in multimedia applications classical techniques consume
enough computational time for encryption due to its bulk size. Partial encryp-
tion approach therefore outperforms the conventional ones when speed is the
main criteria. In partial encryption techniques usually the significant informa-
tion have to be encrypted and insignificant information remain non-encrypted.
Considerable amount of recent research papers have focused towards different
kinds of partial encryption techniques in image processing. Such partial encryp-
tion techniques, reported in the literature [9]-[12], can be categorized into three
broad classes with the first one being encrypting only the AC-coefficients in dis-
crete cosine transform (DCT) domain. This technique, however, does not provide
sufficient security due to the perceptual information present in DC-coefficients
[9]. The next method is to encrypt the first few significant coefficients or few
subbands in wavelet domain which becomes complex in selection of significant
coefficients, and, the last one is the encryption of selective bitplanes in the im-
age with classical algorithms with high computational complexity. We focus on
a partial encryption technique with pseudo random sequences which is less com-
putationally complex yet effective. To the best of our knowledge, no work has
been reported in the literature using the same technique till now.
Pseudo random sequences (PRS) [13]-[15] are simple to generate yet offer rea-
sonably considerable security and can be produced with linear feedback shift
registers in high speed. The PRS are widely used in communications due to
their randomness based on the properties of low cross correlations. Images usu-
ally have high correlation between the neighborhood pixels, demanding the need
of sequences which would possess low adjacent correlation properties to pro-
vide sufficient security. PRS with simple hardware like m-sequences and Gold
sequences therefore emerge as a good alternative for partially encrypting the
MSB planes. It can also be observed from the results that the new approach
provides is able to reduce the residual intelligence as would have been obtained
by encrypting the entire image.
The paper is organized as follows. In Section 2, we deal with the PRS, and in
particular, m-sequences and Gold sequences. Section 3 provides the main idea
behind the partial encryption techniques at length. The proposed scheme of
A Partial Image Encryption Method with Pseudo Random Sequences 317
+ + +
a a a a a
4 3 2 1 0
b b b b b
4 3 2 1 0
As shown in Fig. 2 the Gold sequences can be generated by the xor operation
of the two m-sequences. Note that with only a few chosen pairs of m-sequences
we can produce the Gold sequences which are called preferred pairs. The length
of the Gold sequences is also same as the individual m-sequence’s length. But it
provides more security compared to m-sequences. Gold sequences are very simple
to generate. Using two preferred m-sequence generators of degree n, with a fixed
non-zero seed in the first generator, 2n Gold codes are obtained by changing
the seed of the second generator from 0 to 2n − 1. Another Gold sequence can
be obtained by setting all zero to the first generator, which is the second m-
sequence itself. In total, 2n + 1 Gold codes are available. Consider an m-sequence
represented by a binary vector a of length N, and a second sequence a obtained
by sampling every q th symbol of a. In other words, a = a[q], where q is odd and
either q = 2k + 1 or q = 22k − 2k + 1. Two m-sequences a and a are called the
preferred pair if
n = 0 (mod 4) (1)
i.e., n is odd or n = 2 (mod 4). The relation between n and k in such Gold
sequences follows the below stated property.
1 for n odd
gcd(n, k) = (2)
2 for n = 2 (mod 4)
Gold sequence autocorrelation Rxx (k) and cross correlation functions Rxy (k)
can be defined as
1 k=0
Rxx (k) = t(n) 1 t(n)+2 (3)
{− N , − N , N } k = 0
t(n) 1 t(n) + 2
Rxy (k) = {− ,− , } (4)
N N N
A Partial Image Encryption Method with Pseudo Random Sequences 319
where
1 + 20.5(n+1) for n odd
t(n) =
1 + 20.5(n+2) for n even
The auto and cross correlations for one/multiple typical Gold sequence(s) of
period 219 − 1 are shown in Fig. 3 and Fig. 4.
ORIGINAL
IMAGE
CORRELATED UNCORRELATED
DATA DATA
ENCRYPTED
IMAGE
part remains non-encrypted. After the encryption the significant and insignifi-
cant parts are combined before transmission. This encrypted image is transmit-
ted through an insecure channel to the receiver. At the receiver the encrypted
image is again decomposed into significant and insignificant components, the
decryption operation is performed only on significant part and then combined
to get original image. If the significant information is very less the public key
encryption techniques will be preferred or otherwise the private key techniques
are often used.
In the proposed scheme, the image is initially separated into correlated and
uncorrelated data by dividing it into first four MSB planes and last four LSB
planes. The correlated data (first four MB planes) are encrypted with the highly
uncorrelated PRS while keeping the uncorrelated data as unencrypted ones.
After the encryption of correlated data, it is combined with the remaining data
to form the final encrypted image. The block diagram of the proposed scheme
is shown in Fig. 5. In the present work we consider the first four MSB planes as
correlated data as it is seen that for reducing the residual intelligence as could
be obtained by encrypting the entire image, we need to encrypt a minimum of
these four bit planes. Here first we encrypt the MSB planes of the image with
the m-sequence generated by the pseudo random generator as shown in Fig. 1.
A Partial Image Encryption Method with Pseudo Random Sequences 321
Fig. 6. Decomposition of image. (a) Original image. (b)-(i) The bitplanes starting from
the MSB to LSB planes respectively.
Fig. 7. Partial encryption with m-sequences. (a) Original image. (b, d, f, h) Bit planes
to be encrypted from the MSB plane. (c, e, g, i) Encrypted images using the combina-
tion of encrypted and remaining bit planes.
to be encrypted and encrypted images after combining the encrypted and un-
encrypted bit planes are shown in Fig. 7. After the encryption of the first two
MSB planes the encrypted image appears as the noisy image. However, it is also
necessary to encrypt the third and fourth MSB planes because these planes have
some perceptual information. The resultant image doesn’t have the significant
information after the encryption of four MSB plane. Fig. 8 shows the decryption
process of the partial encryption. If the correlation is measured among the pixels
in the encrypted images, it will be found that, compared to original image, the
correlation decreases significantly. But the correlation among the pixels in the
image after the encryption of first four bitplanes is nearly same as that of the
encryption of all bitplanes.
(g) (h)
Fig. 9. Partial encryption with Gold sequences. (a) Original image. (b, d, f, h) Bit
planes to be encrypted from the MSB plane. (c, e, g, i) Encrypted images using the
combination of encrypted and remaining bitplanes.
324 Y.V. Subba Rao, A. Mitra, and S.R. Mahadeva Prasanna
(g) (h)
Fig. 10. Decryption of partial encryption with Gold sequences. (a, c, e, g) Decrypted
bit planes from the MSB bitplane. (b, d, f, h) Decrypted images using the combination
of decrypted and the remaining bitplanes.
6 Conclusions
A simple yet effective technique for partial image encryption is proposed. The
main idea stems from the fact that the most information in an image is present
in the correlated data. This information is converted into unintelligible form by
encrypting with the uncorrelated sequences. This paper has presented an ap-
proach for the partial encryption of image using pseudo random sequences with
simple hardware. From the results, it is observed that partial encryption method
achieves the same security with the improvement in processing speed. The per-
formance of the method mainly depends on the differentiation of correlated and
uncorrelated information in the image. Here we have treated the MSB planes as
correlated information. However, even in MSB planes sometimes uncorrelated
data are present. A better approach might reduce the computational time fur-
ther if proper importance is given for separating the correlated data in the image
considering the above point.
References
1. Feng, Y., Li, L., Huang, F.: A Symmetric Image Encryption Approach based on
Line Maps. in Proc. Int. Symp. Sys. and Cont. Aeros. Astro. (2006) 1362–1367
2. Diffie, W., Hellman, M. E.: New Directions in Cryptography. IEEE Trans. Info.
Theory 22 (1976) 644–654
3. Stallings, W.: Cryptography and Network Security. Englewood Cliffs, NJ: Prentice
Hall (2003)
A Partial Image Encryption Method with Pseudo Random Sequences 325