Professional Documents
Culture Documents
A Scheme For Secure Transmission of Multiple Images Using MCKBA and FFWPDM
A Scheme For Secure Transmission of Multiple Images Using MCKBA and FFWPDM
A Scheme For Secure Transmission of Multiple Images Using MCKBA and FFWPDM
ABSTRACT
Chaos based encryption may offer new quality in secure data transmission. A recently proposed chaotic-
key based algorithm(CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext
attacks and ciphertext-only attacks. In this paper , a new algorithm based on modified chaotic-key based
algorithm (MCKBA) and finite field wavelet packet division multiplexing (FFWPDM) is proposed for
secure orthogonal multiplexing of images .
Keywords: chaos, cryptography, image encryption, image decryption, wavelet packet division multiplexing
IJSRSET15116 | Received: 26 Dec 2014 | Accepted: 6 Jan 2015 | January-February 2015 [(1)1: 80-84] 80
Let H s ( z) , Gs ( z) where s 0,1 , be the polynomial x(i 1) x(i)(1 x(i)) (7)
representation of the filters hs (n) , gs (n) in Fig. 1.
where 3.9 . Let g denote an image of size MxN
Suppose that these polynomials have order 2 N 1 with
pixels and f(x, y ) , 0 x M 1, 0 y N 1, be the gray
poly phase components Es 0 ( z) , Es1 ( z) , R0 s ( z) and
level f at position (x, y ).
R1s ( z ) so that
A. The Proposed MCKBA -FFWPDM for
Hs ( z) Es 0 ( z 2 ) z 1 Es1 ( z 2 ) (1)
multiplexer
Gs ( z) z 1 R0 s ( z 2 ) R1s ( z 2 )
(2)
The MCKBA for encryption is as follows.
Using the poly phase representation for the two-band Step 1: choose key1 and key2 and set j=0
orthogonal filter banks, the following can be deduced:
Step 2: Choose the initial point x(0) and generate
H1 ( z) z (2 N 1) H0 ( z 1 ) , the chaotic sequence x(0), x(1), x(2),…., x(MN/16-
1) using eq.(1) and then create b(0), b(1), b(2), ….,
G0 ( z) H1 (z) , G1 ( z) H0 (z) (3)
b(2MN-1) from x(0), x(1),x(2),…..,
Any two polynomials A(Z ) and B(Z ) over a Galois x(MN/16 -1) by the generating scheme such that
b(32i+0) b(32i+1)… b(32i+29) b (32i+30)
field F (Z ) that satisfy the polynomial equation
b(32i+31)… is the binary representation of x (i) for
A( z) Ac ( z) B( z) Bc ( z) Z M (4) i = 0, 1, 2,.. ..(MN/16-1).
Step 3: For x=0 to M-1
can be used to generate the coefficients of wavelet filter
For y = 0 to N-1
banks. The polynomials A(Z ) and B(Z ) over a Galois
field F (Z ) are defined as Switch (2b(j) + b (j+1))
M M Case 3: fe (x, y) = mod ((f (x, y)+key1), 2n-1)
A( z ) ai z , a0 0,
i
B( z) bi z , bk 0, i
i 0 i 0
(5) fe(x, y) = fe(x, y) XOR key1
ai , bi GF ( p r ) Case 2: fe (x, y) = mod ((f (x, y)+key1), 2n-1 )
In our notation, the superscript “c” means the reciprocal Case 1: fe (x, y) = mod ((f (x, y)+key2), 2n-1 )
of the polynomial. The reciprocal of a polynomial q( z ) fe(x, y) = fe(x, y) XOR key2
of degree M is defined as qc ( z) z M q( z 1 )
Case 0: fe(x, y) = mod ((f (x, y)+key2), 2n-1)
The coefficients of the two polynomials A(Z ) and B( z) fe(x ,y) = fe(x, y) XNOR key2
are related to the poly phase components E00 ( z) and
= j+2;
E01 ( z) by
End; End
E00 ( z) A( z ) , E01 ( z) z
1 M N
B( z ) 1
(6)
Step 4: apply the above steps for images f1,f2, f3 and f4
The M channel transmultiplexer is shown fig. 2a. Finite and obtain fe1,fe2,fe3 and fe4.
field two-band orthogonal filter banks are used to Step 5: apply the fe1, fe2, fe3 and fe4 to FFWPDM
construct a finite field wavelet packet-division multiplexer to obtain F .
multiplexing (FFWPDM) transmultiplexer for four-users
which is shown fig 2b. B. The Proposed MCKBA -FFWPDM for
2.2 The Proposed Secure Transmultiplexer demultiplexer
Algorithms Based on Chaos and FFWPDM
Step 1: apply the F to FFWPDM demultiplexer
The chaotic function that used is the well-known logistic
to obtain fe1,fe2,fe3 and fe4.
map given by
Step 2: choose key1 and key2 and set j=0
f(x,y) = mod((f(x,y)-key2),2n-1)
case 0: f(x,y) = fe(x,y)XNOR key2
f(x,y) = mod((f(x,y)-key2),2n-1)
j= j+2;
End; End
Fig. 1 Two band wavelet filter bank
Step 5: Apply the above steps 2 to 4 for images fe1, fe2,
fe3 and fe4 to obtain f1,f2, f3 and f4.
The „mod‟ stands for modulus after division.
Because not all secrete keys can make well disorderly
encrypted images, the basic criterion to select key1and
n 1
key2 should satisfy ( ai di) = n/2,
i 0
n 1 n 1
key1 =
i 0
a i2i and key2 =
i 0
d i 2i , n is bit
SIMULATION RESULTS
V. REFERENCES
[1] Jui-cheng Yen and Jiun-In Guo, “A New Chaotic Key –Based Design
for Image Encryption and Decryption, ,” Proc. IEEE International
Symposium on Circuits and Systems, May 28-31, 2000, Geneva,
Switzerland, vol. IV, pp.49-52.
[2] N. Masuda . and K. Aihara , “Cryptosystems with discretized chaotic
maps,” IEEE Trans. on Circuits and Systems - I: Fundamental Theory
and Applications, 2002, vol. 49, no. 1, page(s): 28-40.
[3] B. Furht and D. Socek. Multimedia security: encryptiontechniques. In
IEC Comprehensive Report on InformationSecurity, International
Engineering Consortium,Chicago, IL, pages 335.349, 2004
[4] S. Li, G. Chen, and X. Zheng. Chaos-based encryptionfor digital images
and videos, in B. Furht andD. Kirovski (Eds.), Multimedia Security
Handbook,Vol. 4 of Internet and Communications Series, Ch. 3,CRC
Press, December 2004.
[5] D. Socek, S.Li, S. S. Magliveras, and B. Furht, “Enhanced 1-D Chaotic
Key-Based Algorithm for Image Encryption,”Proc. IEEE First
International Conference on Security and Privacy for Emerging Areas in
Communications Networks, 2005. SecureComm 2005, Sep. 2005.
[6] S. Li and X. Zheng, "Cryptanalysis of a Chaotic Image Encryption
Method", ISCAS 2002, vol. 2, pp. 708-711, 2002.
[7] K.Deergha Rao and Ch. Gangadhar, “Modified chaotic key-based
algorithm for image encryption and its VLSI realization” IEEE
International Conference on Digital Signal Processing (DSP-2007),
July 1-4, 2007, Cardiff, Wales, U.K, pp. 439 - 442.
[8] K.Deergha Rao and Ch. Gangadhar, “VLSI Realization of a Secure
Cryptosystem for Image Encryption and Decryption” ,IEEE
International Conference on Communications and Signal Processing
(ICCSP 2011) ,10-12, February 2011,NIT Calicut,Kerala, India.