IMAGE ENCRYPTION & DECRYPTION – AI PROJECTS

BACKGROUND

Computer has become an essential device now a days. The main use of computer is to store data and send it from one location to other. The information that is shared must be transferred in a secured manner. To ensure secured transmission of information, data is encrypted to unreadable formats by an unauthorized person. Cryptography is the science of information security which has become a very critical aspect of modern computing systems towards secured data transmission and storage. The exchange of digital data in cryptography results in different algorithms that can be classified into two cryptographic mechanisms: symmetric key in which same key is used for encryption and decryption and asymmetric key in which different keys are used for encryption and decryption.

Images are broadly used in numerous processes. As a result, the safety of image data from unauthorized access is crucial at the hands of user. Image encryption plays a significant role in the field of information hiding. Image hiding or encryption methods and algorithms ranges from simple spatial domain methods to more complicated and reliable frequency domain. Image Encryption Using Rubik’s Cube Based Algorithm is the process to transform the image securely so that no unauthorized user can be able to decrypt the image. Image encryption have applications in many fields including the internet communication, transmission, medical imaging etc.

First, in order to scramble the pixels of gray-scale original image, the principle of Rubik’s cube is deployed which only changes the position of the pixels. Using two random secret keys, the bitwise XOR is applied into the rows and columns. These steps can be repeated until the number of iterations is not reached. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm.

PROBLEM DEFINITION

Information Security is the most common word uttered by any man, any device or any peripheral since past two centuries. Protection from malicious sources has become a part of the invention or the discovery cycle. Myriad methods of protection are used ranging from a simple authentication password to most complex Cryptography. The advancements of digital revolution were not achieved without drawbacks such as illegal copying and distribution of digital multimedia documents. In order to provide data security and protection, different encryption methods must be used.

PURPOSE

This is the proposal for the design and development of software named as “Secure Image Encryption Using Algorithm Based On Rubik’s Cube Principle”. It applies special mathematical algorithm and keys to transform digital image into chiper code before they are transmitted and decrypts using application of mathematical algorithms and keys to get back the original data from the chiper code. The goal is to provide authentication of users and integrity, accuracy and safety of data resources.

OBJECTIVE

The main objective of our project is to provide security of the image-based data with the help of suitable key and protect the image from illegal copying and distribution

LITERATURE REVIEW

Evolution of Image Encryption and Decryption

First, we want to review the history of image encryption and decryption and how it came to be a subject of interest. Here, we have listed the significant encryption and decryption techniques used in each era and how they have changed throughout human history.

Historical Cryptography

The earliest known text containing cryptography came from Egypt in the form of hieroglyphics. These texts were dated to be as old as 4000 years old. Nobody knows why Egyptian used such encryptions but scientists assume it was done so as to show that they can write a language that is of higher level than common people or to make it look formal similar to modern day legal documents. In Greece, in about 500 B.C., Spartans used Scytale which was a device to send or receive secret messages. The device was a cylinder in which a narrow strip of parchment was wound and the message was written length-wise. Once it was unwound the strip was unreadable and could only be read with the help of a similar cylinder.2500 years ago not many people could read or write so this technique was quite effective but nowadays it could easily be deciphered. 2000 years ago, the earliest use of cryptography was seen and used by Julius Caesar. He devised a technique to send secret messages as at that time messengers were captured by enemies who could steal the message. But, Caesar would shift the texts by a specific number so that only the person who new the cipher code could decipher the texts, giving Julius Caesar a huge advantage against his enemies. In the 1400’s, Leon Battista Alberti devised an encryption system using Cipher disk. This device allowed for many methods of substitution. In the 1500’s, following the work of Alberti, Blaise De Vigenere created a cipher which came to be known as Vigenere Cipher. In the late 1700’s, Thomas Jefferson devised a cipher system similar to the Vigenere cipher but with higher security. The encrypted message was present on the wheels and the ciphertext could have been any other plain text present in the wheel. Similar to Alberti, Jefferson never developed his encryption system. “During the early 1900’s, the United States Army reinvented Jefferson’s Wheel Cipher without any knowledge about Jefferson’s invention. Jefferson was over a hundred years before his time. 

Modern Cryptography

In the modern age of internet and technology data security is a huge field and an equally immense challenge as highly sensitive data are stored in the digital realm. Personal info such as bank information, social media accounts, etc. all are in threat from phishing, pharming and spyware. To counteract such threats many ingenious techniques have been developed including image encryption.

Some of the previous image encryption methods developed include chaotic systems, pixel position permutation and value transformation. Huang, C.K., Nien, H.H proposed a novel pixel shuffling method which used chaotic systems to generate chaotic sequences as encryption codes [2]. Chen, G., Mao, Y., Chui, C.K. generalize a two-dimensional cat map to a 3D one for a real-time secure symmetric scheme [3]. Guo et al. proposed a color image encryption method using discrete fractional random transforms (DFRNT) and Arnold transform (AT) in which DFRNT encrypts the intensity component while AT encrypts hue and saturation components [4]. Zhu et al. proposed a permutation method to confuse and diffuse the gray-scale image at the bit level, which changes the position of the pixel and modifies its value also using the Arnold cat map to permute the bits and the logistic map to further encrypt the permuted image [5]. Wang, Y., Wong, K.-W., Liao, X., Chen, G. in their research paper proposed image encryption algorithm combining permutation and diffusion where the original image is partitioned into blocks and then spatiotemporal chaos is applied to shuffle the block and generate pseudorandom sequence [6].

FUNCTIONAL REQUIREMENTS

Our system of Image Encryption application functional requires

  • The application is able to ask user to input keys ‘kr’ and ‘kc’ for decryption process to take place.
  • The application is able to send the keys through email provided by users after encryption.
  • The process of both encryption and decryption is incredibly fast.
  • The image file size is not significantly affected to prevent doubt for unauthorized user.
  • The image is transmitted according to user preference safely after being encrypted.

SOFTWARE REQUIREMENTS

Here we specify the types of software that is used within the system.

1 Photoshop

2 Python 3.7

3 SQLite

4 Atom IDE

5 Microsoft Windows 10 OS

RESULT AND ANALYSIS

We have design and implement a system which provide dedicated to highly secure data storage for different governmental and non- governmental sector. To implement this system, we have used encryption algorithm based on Rubik’s cube principle that encrypted the image into unexpected rough pixel format and generate the key for future decryption and send the generated key into respected email id of an individual’s / organization. After the completion of this project, the obtained output is shown as shown in figure below:

REFERENCES

1. Cryptology, History (http://www.faqs.org/espionage/Cou-De/Cryptology- History)

2. C. K. Huang, H. H. Nien, S. K. Changchien, and H. W. Shieh, “Image encryption with chaotic random codes by grey relational grade and Taguchi method,” Optics Communications, vol. 280, no. 2, pp. 300–310, 2004.

3. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2014.

4. Q. Guo, Z. Liu, and S. Liu, “Color image encryption by using Arnold and discrete fractional random transforms in IHS space,” Optics and Lasers in Engineering, vol. 48, no. 12, pp. 1174–1181, 2010.

5. Z.-L. Zhu, W. Zhang, K.-W. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011.

6. Y. Wang, K. W. Wong, X. Liao, and G. Chen, “A new chaos-based fast image encryption algorithm,” Applied Soft Computing Journal, vol. 11, no. 1, pp. 514–522, 2011.

7. “An Improved Secure Image Encryption Algorithm Based on Rubik’s Cube Principle and Digital Chaotic Cipher”, Adrian-Viorel Diaconu and Khaled Loukhaoukha, Mathematical Problems in Engineering, Volume 2013, Article ID 848392, 10 pages

(http://dx.doi.org/10.1155/2013/848392)

This page is contributed by NK & his team . If you like AIHUB and would like to contribute, you can also write an article & mail your article to itsaihub@gmail.com . See your articles appearing on AI HUB platform and help other AI Enthusiast.

9 Comments on “IMAGE ENCRYPTION & DECRYPTION – AI PROJECTS”

  1. Simply desire to say your article is as astounding.
    The clearness to your put up is just cool and
    that i can assume you are an expert on this subject. Fine with your permission let me to snatch
    your RSS feed to stay updated with drawing close post. Thank you
    1,000,000 and please carry on the rewarding work.

  2. Youг apprоach is very special cоmpared to otheг people I’ve
    read info from. Thаnks a lot for posting when уou’ve got the oppοrtunity, sᥙppose I am just going to take notes
    from this.

Leave a Reply

Your email address will not be published. Required fields are marked *