You are on page 1of 13

CSE3501

School of Computer Science and Engineering


20/10/2021

CSE3501- Information Security Analysis and Audit


Digital Assignment -2
IMAGE ENCRYPTION & DECRYPTION
Fall Semester 2021-22

-
Eswar M(19BCE2189)
Sanjay M(19BCE2207)
Pranesh Kannan G(19BCE2331)
Motivation:
Information security is becoming increasingly vital in data storage and transfer these
days. Images are widely used in several processes. As a result, safeguarding picture
data from unwanted access is essential. In the subject of information hiding, image

1
CSE3501

encryption is essential. The methods and algorithms for concealing or encrypting


images span from simple spatial domain procedures to more complex methods.

Aim:
Our Aim of the project is to create a new cryptographic scheme that to be researched,
developed and implemented. The cryptosystem efficiency relies on the difficulty
associated with decryption process, such that nobody can reverse the ciphertext and
obtained the original message unless knows the authentication key (decryption key).
There are many types and ways to measure and evaluate the cipher system security.
Some of them depend on determining the permissible keys by the uncertainty facing.
Other methods depend on the randomness associated with encryption process.
Proposed method should cater to all these issues.
Methodology:
We have an idea to make an encryption technique by using Gaussian elimination
method, Since we have recently learnt the method in maths. We have planned to
implement the concept to encrypt and decrypt the image.

Expected Outcome:
We believe that using gaussian elimination method will provide a cypher key that
can’t be beak down. So, the encrypted image can’t be cracked easily.

Keywords:
Gaussian Elimination, encryption, Ciphered, decryption, matrix, upper triangular
matrix, RGB values, cryptographic mechanisms, cryptosystem efficiency.

Literature Survey
No. Title AUTHOR AND ABSTRACT METHODOLOGY
YEARS OF
REFERENCE

2
CSE3501

1 A new chaotic Jui-Cheng, In this paper, an image In order to implement the algorithm,
key-based design Jiun-In Guo encryption/decryption its VLSI architecture with low
for image (2000) algorithm and its VLSI hardware cost, high computing speed,
encryption and architecture are proposed. and high hardware utilization
decryption According to a chaotic binary efficiency is also designed. Moreover,
sequence, the gray level of the architecture of integrating the
each pixel is XORed or scheme with MPEG2 is proposed.
XNORed bit-by-bit to one of Finally, simulation results are included
the two predetermined to demonstrate its effectiveness.
keys. Its features are as
follows: (1) low
computational complexity,
(2) high security, and (3) no
distortion.
2 Image Encryption Chao-shen This paper proposed an The proposed image encryption
and Decryption Chen, Rongjian image encryption and method is based on rearrangement of
Using SCAN Chen (2006) decryption process. Its the pixels of the image. The
Methodology encryption method is based rearrangement is done by scan
on SCAN patterns generated patterns that generated by the SCAN
by the SCAN methodology. methodology. The scanning path of
The SCAN is a languagebased the image is a random code form, and
two-dimensional by specifying the pixels sequence
spatial-accessing along the scanning path.
methodology which can
efficiently specify and
generate a wide range of
scanning paths.
3 Analytical Study Chiranji Lal The majority of imaging The hybrid process involves the speed
of Hybrid Chowdhury, techniques use symmetric and ease of implementation from
Techniques for Kumaresan and asymmetric symmetric algorithms, as well as
Image Encryption perumal cryptography algorithms to improved security from asymmetric
and Decryption (2020) encrypt digital media. Most algorithms. ECC and ElGamal
of the research works
cryptosystems provide asymmetric
contributed in the literature
key cryptography, while HC, AES, and
focus primarily on the
DPC are symmetric key algorithms.
Advanced Encryption
Standard (AES) algorithm for ECC with AES are perfect for remote or
encryption and decryption. private communications with smaller
This paper propose an image sizes based on the amount of
analysis for performing time needed for encryption and
image encryption and decryption.
decryption by hybridization
of Elliptic Curve
Cryptography (ECC) with Hill
Cipher (HC), ECC with
Advanced Encryption
Standard (AES) and ElGamal

3
CSE3501

with Double Playfair Cipher


(DPC)
4 Image Encryption Arun JB , With rapid progress in In image cryptography most of the
for Secure Data Reshu internet and digital imaging available encryption algorithms are
Transfer and Choudhary technology there are more mainly used different size images so
Image based (2014) and more ways to easily they get easily decrypted image at
Cryptography create, publish and receiver. In this paper image
distributed images. A major encryption is applied on colour
issue for computer networks images of same size and type. For
is to prevent important resultant compressed data is secured
information from being by Data Encryption Standard
disclosed to illegal users. encryption algorithm.
Valuable multimedia
content such as digital
images, however, is
vulnerable to unauthorized
access while in storage and
during transmission over a
network.
5 Image G. Keryer, A. In this paper, we propose a By using the concept of segmented
Encryption and Assoum novel encryption method as filter, encryption can be considered
Decryption by (2006) an optical architecture of as an image encrypting with a
Means of an cryptography, based on the segmented phase mask called keys
Optical Phase grouping of the information and consists in modifying the phase
Mask in the Fourier plane. This profile of the original image by
grouping is termed multiplying it by the adapted phase
segmentation; it has been mask. In our case, this key group
used to make the so-called information gathered from different
segmented filter used in subkeys according to a well-defined
optical target recognition to criterion.
optimize the performances
of the correlator decision.

4
CSE3501

6 Multidimensional Ajita Sahay, Multimedia data are Image Encryption, Image Decryption
comparative Chittaranjan transferred through various using Gauss iterated map and
analysis of image Pradhan networks for personal and comparing them with logistic map in
encryption using (2017) professional uses. Hence, both the dimensions
gauss iterated everyone wants to send or
and logistic maps receive the data in a secure
manner without any
interruption or modification.
In general, data security is
done using cryptographic
techniques or chaotic
techniques. This paper
focuses on an image
encryption technique using
multidimensional Gauss
iterated map instead of
multidimensional logistic
map. The multidimensional
Gauss iterated map uses
more control parameters as
compared to

multidimensional logistic
map, which enhances the
data security. NPCR and
UACI parameters are used to
prove this. Similarly, the
Gauss variations take lesser
time for encryption and
decryption as compared to
the logistic variations.

5
CSE3501

7 Enhanced chaotic M. Salleh Imaging has gained improving Fridrich's work in chaotic
image encryption S. Ibrahim importance due to the image encryption using Baker's map.
algorithm based I.F. Isnin improvements of The algorithm proposed is tested by
on Baker's map (2003) performances in computer experimenting with grayscale value of
speed, media storage and the pixels and transposing of the
network bandwidth. Along pixels, in two different operational
with this advancement, the modes. The analysis of the resulted
fundamental issue of image image in the experiment shows that
security has become a major the enhancement algorithm can
concern and because of this effectively eliminate the weak keys
reason, research in image and increase the encryption strength.
confidentiality has gained
popularity amongst security
experts. This paper discusses
an alternative chaotic image
encryption based on Baker's
map. This enhanced
symmetric-key algorithm
can support a variable-size
image as opposed to the
algorithm which is mainly
based on Baker's map that
requires only square image
for encryption. In addition,
the algorithm also includes
other functions such as
password binding and pixel
shifting to further
strengthen the security of
the cipher image. The
algorithm also supports two
modes of operation namely
EBC and CBC. The number of
iterations to be performed
can vary depending on the
security level required by
the user. The paper also
includes an example of
image encryption. From the
analysis done, it shows that
the security level is high
even though keys that are
found to be weak keys for

6
CSE3501

Baker's map algorithm are


being used in the algorithm.
8 Digital Image Qiang Wang In this paper, a digital image an algorithm based on discrete
Encryption Qun Ding watermark algorithm based wavelet transform and chaos image
Research Based Zhong Zhang on discrete wavelet encryption is referred and the security
on DWT and (2008) transform and chaos theory is enhanced by chaotic binary
Chaos is referred. During the sequence; wavelet transform is not
embedding of the only used in original image but also
watermarking, discrete used in the chaos encrypted
wavelet transform is done watermark image, what we
firstly and extract low embedded is the low frequency part
frequency part as the of the encrypted image not the whole
embedding field; then the image which is enhance with good
chaotic sequence is used to robustness. The results show that
encrypt the watermark and through the combination of wavelet
transform the encrypted technology, chaos and digital
part and extract the low watermarking, the encryption
frequency; finally, embed standards are fulfilled with good
the low frequency part into robustness in JPEG compression,
that of the original image. It noise attacks and lowpass filter,
is a kind of non-blind finally, a good encryption effect is
detection as the extracting reached.
needs original image. The
similar coefficient NC and
peak noise to signal ration
(PNSR) are used to evaluate
the algorithm. The
experiment results indicate
that this algorithm can resist
JPEG compression, noise
attack, filter and so on. The
effect of watermark image
is very well.

7
CSE3501

9 Image Encryption Md. Towsif The main objective of this Step-1:Let’s say the first red pixel
and Decryption Abir, Lamiya paper is to present a (“red” value of the pixel
using Enigma Rahman , more secured and on row 1, column 1 of the image) Red-
Algorithm Samit computationally efficient 51, used here is passed
Shahnawaz procedure of through the plug-board. It swaps to
encrypting and decrypting another value, such as
Miftah
images using the enigma Red-61 here, that has been mentioned
(2019)
algorithm in initially.
comparison to the existing Step-2:Next the position of the rotor
methods has to be mentioned
by the user and which rotors have
been used is also know by
the user. Thus, after passing through
the rotor 1, the pixel
value has been changed into Red-133
which is the value of the first
rotor in the 61st index.
Step-3:Similarly, after passing through
rotor 2 and rotor 3,

the pixel value goes to the reflector.


The reflector compliments the pixel
value and hence finally it turns to Red-
180.
Step-4:Again, this process is reversed
as shown in the figure
2. It passes through rotor-3 then rotor
2 and finally rotor 1 to
the plug-board and a totally different
pixel value is achieved at the
end of this process.

8
CSE3501

10 A fast image Yong Zhang A fast image cryptosystem This paper attempts to study the
encryption Xueqian Li based on AES is verified in image cryptosystem based on AES to
scheme based on Wengang Hou this paper. The plain image testify the viewpoints of AES not
AES (2017) is divided into data blocks of suitable for image encryption.
size 128 bits. The first block However, we conclude that AES in CBC
of plain image is permutated mode can be used for image
by an initial vector. Then, encryption. In the tested system, the
AES in cipher block chaining initial vector (IV) is generated by
mode is used to encrypt chaotic system and AES is
each block sequentially. The implemented by look-up table
initial vector and cipher method. The key of AES is also the key
image are transmitted to of image cryptosystem. AES is secure
the decryption party by far, so the tested image
through the public cryptosystem is secure. And
information channel. The simulation results show that the
decryption party use the image cryptosystem based on AES are
secret key and initial vector faster than some image
to decrypt the cipher image cryptosystems based on chaotic
to obtain the original image. systems. Thus, the tested system can
Simulation results show that be used as the comparison basement
this image cryptosystem is of newly proposed image
both secure and high-speed, cryptosystems. Those image
which can be used as the cryptosystems whose
comparison basement of encryption/decryption speed is
newly proposed image slower than the AES based scheme in
cryptosystems based on the same computer need to be
chaotic systems. improved.
11 Distributed Mamadou I. The objective of this novel homomorphic image encryption
Image Encryption Wade research is to develop a scheme where each pixel intensity
Based On a Mohamed novel image encryption value in the original image is written
Homomorphic Chouikha method that can be used to as a sum of several subvalues, leading
Cryptographic Tepper Gill considerably increase the to producing many component images
Approach (2019) security of encrypted that are
encrypted to produce many
images. To solve this image
corresponding cipher-images; and
security problem, we therefore, increase the security of the
propose a distributed associated images. The
homomorphic image formulation includes encryption and
encryption scheme where decryption phases, as well
the images of interest are
those in the visible
electromagnetic spectrum.

9
CSE3501

In our encryption phase, a as a block diagram for a special case


red green blue (RGB) image implementation
is first separated into its
constituent channel images,
and then the numerical
intensity value of a pixel
from each channel is written
as a sum of smaller pixel
intensity sub-values, leading
to having several component
images for each of the R, G,
and B-channel images.
12 Advanced image O. Abraham The revolution in the encryption and decryption of a
encryption and Panicker communication technology two dimensional image by using
decryption using A. Jabeenaa facilitates fast and reliable simple Fourier transform and
sandwich phase Abdul Hassan information transfers and is sandwich phase diffuser. The
diffuser and false Mujeebb being increasingly used in sandwich phase diffuser is made using
(2010) various fields like scientific,
image along with two laser speckle patterns. After
military, civilian and
cryptographical phase diffusion another image is
economic. Apart from the
enhancement fused to the resultant image and then
speed and reliability,
security in transferring the cryptographical enhancement is done
information is gaining much which provide an additional security
importance now days. to the system. The algorithm is simple
Optical data transfer offers and at the same time efficient and it
several dimensions in which provides high security to the image.
information can be hidden Simulation results are presented and
such as phase, polarization, MSE is calculated between original
and wavelength, etc., and encrypted image which is very
making it possible to encode small.
data more securely.
13 Digital Image Nan Wan, Yi Digital image chaotic system Firstly, the parameters of chaos
Encryption and zhang (2020) has the characteristics of parameters are optimized by genetic
Decryption large key space and strong algorithm to obtain a better chaotic
Algorithm Based anti-plaintext attack, so it Logistic mapping encryption
on Optimization has become a hot research relationship. Then, the fusion
and Fusion topic in recent years. At encryption is carried out by two-level
permutation and one-level diffusion
Strategy present, there are still two
technology. Finally, the
important problems to be corresponding decryption algorithm is
solved. One is that the chaos
given in this paper. Through the test
degree of chaotic sequence
of various Performance evaluation
is not enough due to indexes, the rationality and validity of
improper selection of initial the proposed algorithm are verified.
parameters and the other is
easy to solve by using

10
CSE3501

chaotic encryption and


decryption alone.

11
CSE3501

Architecture:

Step 1: Average of RGB values is taken to extract matrix for each image.
Step 2: Image Encryption is performed using Gaussian Elimination/Forward
Elimination, where image matrix is converted to upper triangular matrix. Upper
triangular matrix is converted back to RGB values, this gives encrypted image
also known as ciphered image. Encrypted image is used for transmission.
Step 3: Key is generated alongside encryption of image which is further used for
decryption. Key matrix stores all the operations performed on image matrix
while converting it into upper triangular matrix.

Step 4: Ciphered image is converted back to original image using key.

12
CSE3501

References:

1. A new chaotic key-based design for image encryption and decryption


2. Image Encryption and Decryption Using SCAN Methodology
3. Analytical Study of Hybrid Techniques for Image Encryption and
Decryption
4. IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH
ALGORITHM IN MATLAB
5. Gaussian Elimination Method-A Study of Applications
6. Image encryption and decryption in public key cryptography based on
MR
7. Multidimensional comparative analysis of image encryption using gauss
iterated and logistic maps
8. Enhanced chaotic image encryption algorithm based on Baker's map
9. Digital Image Encryption Research Based on DWT and Chaos
10.A fast image encryption scheme based on AES
11.Distributed Image Encryption Based On a Homomorphic Cryptographic
Approach
12.Advanced image encryption and decryption using sandwich phase diffuser
and false image along with cryptographical enhancement
13.Digital Image Encryption and Decryption Algorithm Based on
Optimization and Fusion Strategy
14.Image Encryption and Decryption by Means of an Optical Phase Mask
15.Discrete Gyrator Transform based optical image encryption and
decryption using Double Random Phase Mask
16.Image Encryption and Decryption using Enigma Algorithm
17.An efficient and self-adapting colour-image encryption algorithm based
on chaos and interactions among multiple layers
18.Image Encryption for Secure Data Transfer and Image based
Cryptography

13

You might also like