Pages From Abstract Revised

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

A Hybrid Image Encryption Scheme for Color Images

Adnan Malik1,, Nisar Ahmedb,, Muhammad Ali1,∗


a Electrical Engineering Department, University of Engineering and Technology, Lahore, Pakistan
b Computer Engineering Department, University of Engineering and Technology, Lahore, Pakistan

Abstract
The usage of the internet as a communication medium imposes numerous security threats to the security of digital
images. It is desirous to compress the image to save bandwidth, but it is tough to do in an encrypted image with highly
random pixel values. This problem is solved by proposing a two-stage encryption method that is friendly to compression.
First, Chaotic maps are used to ensure high randomness, and then as a second step, the Singular value decomposition
(SVD) method is applied to deliberately bring some correlation in the encrypted version of the image so that compression
can be achieved. SVD also provides another layer of security as well. JPEG compression is applied to test the viability
of the method and high compression ratios are achieved. The performance of the devised algorithm is also analyzed by
determining various parameters.
Keywords: Encryption, Chaos theory, Color images

1. Introduction and hence requires more computational time. Secondly


the decrypted information in case of textual data should
Encryption is the transformation of information, using be the exact reconstruction of the original plaintext infor-
a designed system or algorithm, to a random useless infor- mation whereas this is not a compulsory requirement in
mation or unintelligent form, so that only a legit receiver image data. A close or near approximation to the plain-
of information, possessing valid secret key, can retrieve it. text image is sufficient requirement for image encryption
It hence provides a way for both retaining and transmit- scheme as this is due to the characteristics of human way
ting sensitive data over non-secure channels or mediums. of perception. The value of nearby or adjacent pixels in
This encryption process of information is also regarded as natural images can be fairly predicted because of high cor-
information cryptography. It does provide security for the relation and data redundancy.
sensitive data, but hacking this information or in techni- To add extra security features, hybrid encryption algo-
cal term, cryptanalysis, can be used to perform in depth rithms are widely used. Such algorithms commonly in-
analysis for contravention of information. Data security is volve different encryption stages such as usage of chaotic
necessary for several applications that are used over inse- maps followed by any other encryption method. Thus,
cure wireless and public networks that are susceptible to hybrid encryption algorithms have gained high popularity
eavesdropping and so the information security of data is among researches in past years as they can provide both
one of the vital issues addressed by researchers. Cryptog- security and other statistical properties required by any
raphy has several areas of applications that need data pro- good encryption scheme.
tection. Some such application includes camera security,
securing multimedia database and online teleconferencing.
1.1. Image Cryptography
The research on cryptography has proposed many effective
data-protection schemes and algorithms. There are vast Just like the text data requires protection for the sake
kinds of data with their own characteristics and attributes, of security, visual and image data are also needed to be
requiring specific kind of cryptographic techniques for each secured. This is evident from present-day technology
type of data. Standard modern algorithms such as DES, where the exchange of multimedia content is excessively
IDEA, RSA, and AES are mainly designed for text data made over the internet and most of the channels used for
and hence are not suitable for multimedia content. this purpose are unsecured. Unlike text data, image data
There are mainly two reasons behind the fact that we avoid has its attributes and thus they require special treatment.
the usage of traditional encryption schemes for image data. The basics for the image cryptography are the same as in
Firstly, the size of image data is larger than textual data, the case of text data, only here the visual information is
now being processed. The image that is to be encrypted
∗ Corresponding author
is referred to as plaintext image. The encrypted image is
Email address: m.ali@uet.edu.pk (Muhammad Ali) called ciphertext. And just like the key is required in the
1 case of text data, image cryptosystem also requires a key.
Preprint submitted to Journal of Visual Communication and Image Representation September 21, 2020

You might also like