Document not found! Please try again

Image Encryption using Quad Phase Masks in ... - IEEE Xplore

2 downloads 0 Views 559KB Size Report
Image Encryption using Quad Phase Masks in. Fractional Fourier Domain and Case Study. Monika Dahiya. Sanatan Sukhija. Hukum Singh. Computer Science ...
Image Encryption using Quad Phase Masks in Fractional Fourier Domain and Case Study Monika Dahiya

Sanatan Sukhija

Hukum Singh

Computer Science and Engineering

Computer Science and Engineering

Applied Science and Humanities

ITM University, Gurgaon

ITM University, Gurgaon

ITM University, Gurgaon

[email protected]

[email protected]

[email protected]

Abstract— A Technique for the encryption of the image is proposed using the random phase masks and fractional Fourier transform. The method uses four random phase masks and two fractional orders that act as the encryption key. The encryption scheme transmits the data to the authorised user maintaining its integrity and confidentiality. Numerical simulations results have been carried out to validate the algorithm and its Mean Square Error (MSE) is calculated. Furthermore, an image is divided in to four sections and on each of the section of the image different algorithms are applied and then there encryption and the decryption time is studied and also their MSE are calculated and compared to find an algorithm which is most optimal. Keywords— Encryption; Decryption; Random Phase Encoding; Fourier Transform; Fractional Fourier Transform.

I. INTRODUCTION With the development that has been made in the multimedia technologies, the information security of the images has become an important subject. We are living in the age of information where maintaining the integrity and confidentiality of information is a great concern. In today’s world it has become more important to secure the images during transmission. So, Encryption is the process in which sender wants to send an information to the receiver, he takes an input information and apply some algorithms on the information called the encryption algorithms and converts it into an unintangible information. This information sent to the receiver can be termed as the encrypted information. Then, this information is transmitted over some channel to the recipient. The receiver receives the encrypted image. Then the receiver applies the decryption algorithm to obtain the actual image that the sender intended to send. Many encryption algorithms have been proposed [1-8]. Among them Double Random Phase Encoding (DRPE) method has been widely used. The DRPE scheme uses two random phase masks that are statistically independent in the input domain and the Fourier domain respectively to encrypt the input image in to a stationary white noise [1]. An enhancement to this technique is the Fractional Fourier Transform. Fractional Fourier Transform enhances the key space of the algorithm as it uses the fractional orders. Other researchers have also made significant contributions in this

c 978-1-4799-2572-8/14/$31.00 2014 IEEE

area [8-9]. Madhusudan Joshi and Keher Singh[10] have given the encryption of the colored images by splitting the colored image in to RGB components. Zhang and Karim[11] have proposed encryption of the colored image using single channel. Inspired by the Double Random Phase Encoding and Fractional Fourier Transform, we have proposed a method that combines the Double Random Phase Encoding algorithm and the Fractional Fourier Transform to encrypt and decrypt the image. Since, this method uses four random phase keys, one in the input domain, two in the Fourier domain and one in the fractional Fourier domain. Now to decrypt the image we need two fractional orders and three decrypting keys, the correct knowledge of all these five parameters lead to correct decryption. Results have being studied to what happens if incorrect decryption keys or incorrect fractional orders are used in the decryption. Numerical Simulation results have been studied and the Mean Square Error between the primary (input) image and the decrypted image is calculated. Then, we will further take a colored input image and divide the image in to four sections. And then, to first part of the colored image, we will encrypt this colored image by dividing it in to the Red, Green, Blue component [10] . Then, we will consider the second part of the image and initially convert the colored image in to the greyscale image and then encrypt the image using Fractional Fourier Transform[9] Further, taking the third part of the image we will apply the algorithm that we will be discussing in this paper. Then, finally on fourth part of image convert the colored image in to an indexed image initially and then encrypting the image using the Fractional Fourier Transform [11] . II. PRINCIPLE OF ENCRYPTION AND DECRYPTION Fractional Fourier Transform (FRT) is the enhancement to the Fourier Transform. 1-D notations have been considered for notifying the symbols. Let xm and xp be the coordinates of the input plane and the output pth fractional plane respectively. The FRT of the function f(xm) of the order p can be defined as [12]-

1048

F p > f x m @

f

³ f x Q x m

f

p

m

, x p dx m

(1)

:KHUH 

>

4 S [P  [ S

­ .I H[S LS [P FRW I   [P [ S FVF I  [P FRW I ° ®G [P  [ S ° ¯G [P  [ S

@

7KH IROORZLQJ H[SUHVVLRQ VWDWHV WKH DERYH HQFU\SWLRQ DOJRULWKP LI D z Q LI D

Q

LI D

Q r 

H [  \ 

)57E ^)57D >^,))7 >^))7 ^ I [ \ 5`` 5 @` 5@ 5 `

$QG .I

VLQ I

  

ª LS VJQ I LI º  » I H[S «  ¼ ¬

NS  

:KHUH)SGHQRWHVWKHIUDFWLRQDO)RXULHUWUDQVIRUP  ,,, ,0$*((1&5

>

@

@

 1RZWDNHWKHIRXUWKUDQGRPSKDVHPDVNDQGPXOWLSO\ LWZLWKWKHRXWSXWRI)57VWHSLQWKHIUDFWLRQDOGRPDLQ  )LQDOO\SHUIRUPWKHVHFRQG)57RSHUDWLRQRIWKHRUGHU E

)LJVKRZVWKHHQFU\SWLRQSURFHVV



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

 7KH HQFU\SWHG LPDJH LV ,QYHUVH )UDFWLRQDO )RXULHU WUDQVIRUPHGZLWKRUGHUE  7KHQ LW LV PXOWLSOLHG E\ WKH FRQMXJDWH RI WKH UDQGRP SKDVHPDVN5  I  )57 E ^H [ \ `  5 c 

>

@

 7KHLPDJHLVWKHQDJDLQLQYHUVH)UDFWLRQDOO\)RXULHU 7UDQVIRUPHGZLWKRUGHUD

 7KHQLWLVPXOWLSOLHGE\WKHFRQMXJDWHRIWKHUDQGRP 3KDVHPDVN5

 I  >)57  D ^ I `@ 5c   7KHQWKHUHVXOWLQJLPDJHLV)RXULHUWUDQVIRUPHG  H [ \ )57E > I 5 @   ,W LV WKHQ PXOWLSOLHG E\ WKH FRQMXJDWH RI WKH VHFRQG  $OOWKHVWHSVVWDWHGDERYHUHVXOWVLQWKHIRUPDWLRQRIDQ UDQGRPSKDVHPDVN5 HQFU\SWHGLPDJH

 I 

>))7 I  @ 5 c 

2014 IEEE International Advance Computing Conference (IACC)

1049

 )LQDOO\WKHLPDJHLVLQYHUVH)RXULHUWUDQVIRUPHGWRJHW  D  E  F 

 WKHGHFU\SWHG RULJLQDO LPDJH  I [ \ ,))7 I   7KH IROORZLQJ H[SUHVVLRQ VWDWHV WKH DERYH HQFU\SWLRQ DOJRULWKP I [ \ ,))7 ^>))7 ^>)57 D ^>)57E H [ \ @ 5 c`@ 5c`@ 5 c`

    G  H  )LJD 6KRZVWKHLQSXWLPDJHE 6KRZVWKHILUVWTXDGUDQW RIWKHLPDJHF 6KRZVWKHVHFRQGTXDGUDQWRIWKHLPDJHG  6KRZVWKHWKLUGTXDGUDQWRIWKHLPDJHH 6KRZVWKHIRXUWK TXDGUDQWRIWKHLPDJH  ,9 6,08/$7,215(68/7$1'',6&866,21 1RZ ZH SUHVHQW WKH UHVXOWV RI WKH VLPXODWLRQ WKDW GHVFULEHV WKH SHUIRUPDQFH RI WKH V\VWHP GHVFULEHG DERYH $Q LQSXW LPDJH RI VL]H î SL[HOV LV WDNHQ DV WKH LQSXW LPDJH FDPHUDPDQ  /HW WKH IUDFWLRQDO RUGHUV WKDW KDYH EHHQ FKRVHQ IRUWKHHQFU\SWLRQWRRFFXUDUH DP[DP\EQ[EQ\ /HWEHWKH IUDFWLRQDORUGHUIRUHQFU\SWLRQ:LWKDP[DP\DQGEQ[EQ\DVWKH ILUVW DQG VHFRQG IUDFWLRQDO RUGHUV UHVSHFWLYHO\ XVHG LQ WKH HQFU\SWLRQDOJRULWKP



 1RZDIWHUVWXG\LQJWKLVPHWKRGZHZLOOWDNHDQRWKHULPDJH ZKLFK ZH ZLOO GLYLGH LQ WR IRXU TXDGUDQWV 1RZ HDFK TXDGUDQW RI WKH LPDJH LV VXEMHFWHG WR GLIIHUHQW DOJRULWKPV DQGWKHQWKHLU06(DUHFRPSDUHGDQGWKHWRWDOWLPHWDNHQ E\ HDFK DOJRULWKP WR HQFU\SW DQG GHFU\SW WKH LPDJH KDV EHHQVWXGLHG)LJXUHVKRZVWKHLPDJHSDUWLWLRQ   ,QLWLDOO\ ZH KDG DQ LPDJH YHJHWDEOHV  WKHQ ZH SDUWLWLRQHGWKHLPDJHLQWRIRXUTXDGUDQWV  2QWKHILUVWTXDGUDQWZHKDYHDQFRORUHGLPDJH7KLV FRORUHG LPDJH LV HQFU\SWHG E\ GLYLGLQJ LW LQ WR 5HG *UHHQ%OXHFRPSRQHQWV>@  2QWKHVHFRQGTXDGUDQWWKLVTXDGUDQWFRORUHGLPDJHLV ILUVWFRQYHUWHGLQWRDQJUH\VFDOHLPDJHWKHQDSSO\LQJ WKH )UDFWLRQDO )RXULHU 7UDQVIRUP >@ RQ WKH JUH\VFDOH LPDJH  2Q WKH WKLUG TXDGUDQW WKLV TXDGUDQW FRORUHG LPDJH LV FRQYHUWHG LQ WR DQG JUH\VFDOH LPDJH DQG WKHQ WKH DOJRULWKP SURSRVHG LQ WKH SDSHU LV DSSOLHG WKDW LV DOJRULWKP FRPELQLQJ '53( DQG )UDFWLRQDO )RXULHU 7UDQVIRUP  2Q WKH IRXUWK TXDGUDQW WKH FRORUHG LPDJH LV ILUVW FRQYHUWHG LQ WR DQ LQGH[HG LPDJH DQG WKHQ )UDFWLRQDO )RXULHU7UDQVIRUP>@LVDSSOLHGRQLW 



1050



    D  E  F 



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¶VSHUIRUPDQFHEDVHGWRWKH PHDQ RI WKH VTXDUHG HUURU :H ZLOO FDOFXODWH WKH 06(



2014 IEEE International Advance Computing Conference (IACC)

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î SL[HOV LPDJH WKH LPDJH LV VXEMHFWHG WR WKH DOJRULWKPDQGIROORZLQJUHVXOWVKDYHEHHQVWXGLHG7KHLPDJH KDV EHHQ HQFU\SWHG DQG FRUUHFWO\ GHFU\SWHG XVLQJ WKH )UDFWLRQDORUGHU

     D  E  F  )LJD 2ULJLQDOILUVWTXDGUDQWLPDJH )LJE (QFU\SWHGLPDJH )LJF 'HFU\SWHGLPDJH  1RZZHPDNHDFRPSDULVRQRI06(¶VZKHQWKHZKROHLPDJH D DQGWKHILUVWTXDGUDQWLPDJHD XQGHUJRHV HQFU\SWLRQXVLQJ5*%FRPSRQHQWV 



 )LJE 06(REWDLQHGE\DSSO\LQJWKHILUVWDOJRULWKPRQWKH YHJHWDEOHLPDJH     )RU WKH VHFRQG FDVH LPDJH LV HQFU\SWHG XVLQJ E\ ILUVW FRQYHUWLQJ WKH FRORUHG LPDJH LQ WR D JUH\VFDOH LPDJH WKHQ HQFU\SWLQJLWXVLQJ)UDFWLRQDO)RXULHUWUDQVIRUPRQLW DSSOLHG RQILJF ZHZLOOWDNHLQSXWLPDJHDVWKHVHFRQGTXDGUDQW RIDLQSXWîSL[HOVLPDJHWKHLPDJHLVVXEMHFWHGWRWKH DOJRULWKPDQGIROORZLQJUHVXOWVKDYHEHHQVWXGLHG7KHLPDJH KDV EHHQ HQFU\SWHG DQG FRUUHFWO\ GHFU\SWHG XVLQJ WKH )UDFWLRQDORUGHU 







 )LJD 06(REWDLQHGE\DSSO\LQJWKHILUVWDOJRULWKPRQWKH ILUVWTXDGUDQW  ,QILJXUHD DQGE WKHJUDSKOLQHVUHSUHVHQWWKH 06( IRU WKHWKUHHFRORUFRPSRQHQWV 5HSUHVHQWVWKH06(IRU5('FRORU  5HSUHVHQWVWKH06(IRU*5((1FRORU  5HSUHVHQWVWKH06(IRU%OXHFRORU 



 D  E  F 





 G  )LJ D  VKRZV WKH VHFRQG TXDGUDQW FRORUHG LPDJH E  VKRZV WKH JUH\VFDOH LPDJH F  VKRZV WKH HQFU\SWHG LPDJH ZLWK WKH IUDFWLRQDO RUGHU RI  G  VKRZV WKH LPDJH GHFU\SWHGFRUUHFWO\XVLQJWKHIUDFWLRQDORUGHU  1RZ ZH PDNH D FRPSDULVRQ RI 06(¶V ZKHQ WKH ZKROH LPDJHD DQGWKHILUVWTXDGUDQWLPDJHLQILJE XQGHUJRHV (QFU\SWLRQXVLQJ)UDFWLRQDO)RXULHUWUDQVIRUP  )RUILJXUHD DQGE WKHIUDFWLRQDORUGHUXVHGIRU (QFU\SWLRQ'HFU\SWLRQ ȕ  ȕ   

2014 IEEE International Advance Computing Conference (IACC)

1051

)LJD 06(REWDLQHGEHWZHHQWKHGHFU\SWHGLPDJHDQGWKH  RULJLQDO LPDJH E\ DSSO\LQJ WKH DOJRULWKP RQ WKH VHFRQG )LJD 06(REWDLQHGE\DSSO\LQJWKHWKLUGDOJRULWKPRQWKH WKLUGTXDGUDQWRIWKHLPDJH TXDGUDQWRIWKHLPDJH   )RUILJXUHD DQGE WKHIUDFWLRQDORUGHUXVHGIRU (QFU\SWLRQ'HFU\SWLRQ ȕ  ȕ  

 )LJ E  06( REWDLQHG E\ DSSO\LQJ WKH DOJRULWKP RQ WKH YHJHWDEOHLPDJH   )RU WKH WKLUG FDVH LPDJH LV HQFU\SWHG E\ ILUVW FRQYHUWLQJ WKH FRORUHG LPDJH LQ WR D JUH\VFDOH LPDJH WKHQ HQFU\SWLQJ LW XVLQJ WKH DOJRULWKP GLVFXVVHG LQ WKH SDSHU D FRPELQDWLRQ RI IRXUUDQGRPSKDVHPDVNVDQG)UDFWLRQDO)RXULHUWUDQVIRUPRQ LW DSSOLHG RQ ILJ G ZH ZLOO WDNH LQSXW LPDJH DV WKH WKLUG TXDGUDQWLPDJH7KHLPDJHKDVEHHQHQFU\SWHGDQGFRUUHFWO\ GHFU\SWHGXVLQJWKH)UDFWLRQDORUGHU

   D  E  F 



   G  )LJ D  VKRZV WKH WKLUG TXDGUDQW FRORUHG LPDJH E  VKRZV WKHJUH\VFDOHLPDJHRILWF VKRZVWKHHQFU\SWHGLPDJHZLWK WKH IUDFWLRQDO RUGHU RI  G  VKRZV WKH LPDJH GHFU\SWHG FRUUHFWO\XVLQJWKHIUDFWLRQDORUGHU

1052

 )LJE 06(REWDLQHGE\DSSO\LQJWKHWKLUGDOJRULWKPRQWKH YHJHWDEOHLPDJH   )RUWKHIRXUWKFDVHLPDJHLVHQFU\SWHGE\ILUVWFRQYHUWLQJ WKH FRORUHG LPDJH LQ WR DL QGH[HG LPDJH WKHQ HQFU\SWLQJ LW XVLQJ WKH IRXUWK DOJRULWKP LH DSSO\ )UDFWLRQDO )RXULHU WUDQVIRUPRQLW DSSOLHGRQILJH ZHZLOOWDNHLQSXWLPDJH DV WKH WKLUG TXDGUDQW RI D LQSXW î SL[HOV LPDJH WKH LPDJHLVVXEMHFWHGWRWKHDOJRULWKPDQGIROORZLQJUHVXOWVKDYH EHHQVWXGLHG 

    D  E  F   )LJ D  VKRZV WKH VHFRQG TXDGUDQW FRORUHG LPDJH E  VKRZV WKH JUH\VFDOH LPDJH RI LW F  VKRZV WKH HQFU\SWHG LPDJHZLWKWKHIUDFWLRQDORUGHURI 

2014 IEEE International Advance Computing Conference (IACC)

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ȕ   ȕ     5()(5(1&(6



  )LJE 06(REWDLQHGE\DSSO\LQJWKHIRXUWKDOJRULWKPRQ WKHYHJHWDEOHLPDJH   7DEOH,(QFU\SWLRQDQG'HFU\SWLRQWLPHWDNHQE\HDFKRIWKH $OJRULWKPV  1DPHRIWKHDOJRULWKP 7LPH 7DNHQ VHF   7LPH WDNHQ E\ ILUVW DOJRULWKP   &RORUHGWR5*%FRPSRQHQWV   7LPH WDNHQ E\ VHFRQG DOJRULWKP  FRORUHG WR JUH\VFDOH DQG WKHQ   DSSO\)57   7LPH WDNHQ E\ WKLUG DOJRULWKP  FRORUHG WR JUH\VFDOH DQG WKHQ DSSO\IRXUUDQGRPSKDVHPDVNVLQ IUDFWLRQDO)RXULHU'RPDLQ   7LPH WDNHQ E\ IRXUWK DOJRULWKP  FRORUHG WR LQGH[HG DQG WKHQ DSSO\LQJ)57  

>@35HIUHLJHUDQG%-DYLGL³2SWLFDOLPDJH(QFU\SWLRQEDVHGRQWKH ,QSXWSODQHDQG)RXULHUSODQHUDQGRPHQFRGLQJ´2SW/HWW    >@3&0RJHQVHQ-*OXFNVWDG³3KDVHRQO\RSWLFDO(QFU\SWLRQV\VWHP ZLWKSRODULVDWLRQHQFRGLQJ´2SW&RPPXQ   >@@5.:DQJ,$:DWVRQ³5DQGRP3KDVHHQFRGLQJIRURSWLFDOVHFXULW\´ 2SWHQJJ   >@(7DMDKXHUFH20DWRED6&9DUUDOO%-DYLGL´2SWRHOHFWURQLF LQIRUPDWLRQHQFU\SWLRQZLWKSKDVHVKLIWLQJLQWHUIHURPHWU\´2SW    >@1.1LVFKDO--RVHSK.6LQJK´6HFXULQJLQIRUPDWLRQXVLQJXVLQJ )UDFWLRQDO)RXULHU7UDQVIRUPLQGLJLWDOKRORJUDSK\´2SW&RPPXQ    >@1.1LVFKDO--RVHSKDQG.6LQJK³RSWLFDOHQFU\SWLRQXVLQJFDVFDGHG H[WHQGHGIUDFWLRQDO)RXULHUWUDQVIRUP´2SW0HPRU\1HXUDO1HW    >@*8QQLNULVKDQDQ--RVHSKDQG.6LQJK³2SWLFDOHQFU\SWLRQE\GRXEOH UDQGRPSKDVHHQFRGLQJLQWKHIUDFWLRQDO)RXULHUGRPDLQ´2SW/HWW    >@*8QQLNULVKDQDQ.6LQJK³'RXEOHUDQGRPIUDFWLRQDO)RXULHUHQFRGLQJ IRURSWLFDOVHFXULW\´RSW(QJJ   >@0DGKXVXGDQ-RVKL&KDQGUDVKHNKDU.HKDU6LQJK³&RORULPDJH HQFU\SWLRQDQGGHFU\SWLRQXVLQJ)UDFWLRQDO)RXULHUWUDQVIRUP´2SWLFV &RPPXQLFDWLRQV   >@64=KDQJ0$.DULP´&RORULPDJHHQFU\SWLRQXVLQJGRXEOHUDQGRP SKDVHHQFRGLQJ´0LFURZDYH2SW7HFKQRO/HWW   >@+02]DNWDV==DOHYVN\DQG0$.XWD\³7KH)UDFWLRQDO)RXULHU WUDQVIRUPZLWKDSSOLFDWLRQVLQRSWLFVDQG6LJQDO3URFHVVLQJ´ -RKQ:LOH\ VRQV&KLFKHVWHU 

2014 IEEE International Advance Computing Conference (IACC)

1053

Suggest Documents