Encryption of Gray Images using Scalable Codes

DOI : 10.17577/IJERTV3IS040485

Download Full-Text PDF Cite this Publication

Text Only Version

Encryption of Gray Images using Scalable Codes

Pooja Bhat Department of E&TC TSSMs BSCOER

Pune Maharashtra

P. K. Ajmera Department of E&TC TSSMs BSCOER Pune Maharashtra

Abstract In this paper we have used a method for encryption of images using scalable coding. In encryption, a pseudorandom number derived from a secret key is used to encrypt the original pixel values. In encoding block, encrypted data is decomposed into a down sampled sub image and several data sets with a multiple-resolution construction. Thus an encoder quantizes the sub image and calculates the Hadamard coefficients of each data set that will reduce the data amount. Then, this quantized sub image and Hadamard coefficients are regarded as a set of bitstreams. At the receiver end, while decryption of sub image will give the rough information of the original content, the quantized coefficients can be decrypted to regenerate the detailed content with an iteratively updating procedure. At the output we will first obtain a lossy version of image and images of higher resolution can be obtained when more and more bitstreams are received. PSNR of reconstructed images is calculated for all scales. When more number of decomposition levels are used to decompose encrypted data, PSNR performance is good.

Keywords–Bitstreams, Hadamard transform, Cryptography, Image compression, Image encryption, Signal Processing in the Encrypted Domain

achieved in [7]. The original gray level image is encrypted by pixel permutation in [8]. Then, the encrypted data are compressed by discarding the excessively rough and fine information of coefficients generated from orthogonal transform.

This paper proposes a method of scalable coding for encryption of gray images. Although lots of works have been done on scalable coding of unencrypted images [9], [10], the scalable coding of encrypted data has not yet been reported. In the encryption phase, the pixel values are completely altered so that an attacker cannot obtain any information of original image. Then, the encrypted data are decomposed into several parts, and each part is compressed as a bitstream. At the receiver side with the help of cryptographic key, the images of higher resolution can be reconstructed when more number of bitstreams is received.

Take input image

  1. BLOCK DIAGRAM

    I. INTRODUCTION

    In past few years, processing of encrypted signals has emerged as a new and challenging research topic [1]. Depending upon the holomorphic properties of a cryptosystem, the discrete Fourier transform and adaptive filtering [2], [3] can be implemented in the encrypted domain and a composite signal representation method can be used to reduce the size of encrypted data [4]. In case of joint encryption and data hiding, a part of significant data is encrypted for content protection, and the remaining data are used to carry buyerseller protocols, the fingerprint data are embedded into an encrypted version of digital multimedia to ensure that the seller cannot know the buyers watermarked version while the buyer cannot obtain the original product.

    Lots of work has been done on compressing encrypted images. When a sender encrypts an original image for privacy protection, a channel provider without the knowledge of a cryptographic key and original content may tend to reduce the data amount due to the limited channel resource. In [5], it has been proved that the performance of compressing encrypted data may be as good as that of compressing non encrypted data in theory. [6] presents several methods for lossless compression of encrypted gray. In most of the already employed schemes, the syndrome of channel code is exploited to generate the compressed data in a lossless manner. Several methods have been developed for lossy compressing encrypted images. Lossy compression of encrypted images is

    Image Encryption

    Encrypted Image Encoding

    Image Reconstruction

    1. Image Encryption

      The input to this block is uncompressed image with pixel values in the range [0 255] and pixel number as N=N1×N2 where N1 and N2 are number of rows and columns. Thus bit amount of input image is 8N. A pseudorandom bit sequence of 8N is generated to encrypt the input image. Encryption and decryption block has the same pseudorandom number generator (PRNG). An encrypted image is produced by a one- by-one addition modulo 256 as follows:

      (i,j)= mod[p(i,j)+e(i,j),256],

      1<i<N1, 1 j N2 (1)

      where p(i,j) represents the gray values of input image pixels at positions (i,j), e(i,j) represents the pseudorandom numbers generated by the PRNG within range [0, 255], and (i,j) represents the final encrypted pixel values. Clearly, the output of this stage i.e. encrypted pixel values (i,j) are pseudorandom numbers since e(i,j) values are pseudorandom numbers.

      = (5)

      where M is an integer that will be shared by encoder and decoder. Then, the data of b(i,j) are converted into a bitstream denoted by BG.

      For each data set , the encoder divides encrypted pixels in it into groups, each of which contains pixels =3N/ ). In this way, the pixels in the same group get scattered in the entire image. The encrypted pixels of the kth group are denoted as (1), (2) ( ) and perform the Hadamard transform in each group as given below:

      = H. (6)

      where H is a Hadamard matrix of order * made up of

      +1 or -1.

      For each coefficient , calculate

      = , 1k , 1 l

      (7)

      where = round ) (8) The encoder transmits the bitstreams with an order of

      {BG, , }. We cab discard later bitstreams in case of limited bandwidth

      Fig.1 Input Image and Encrypted image.

    2. Encoding of encrypted images

      Encrypted data is compressed as a set of bitstreams.

      Encoding procedure is explained in detail as follows:

      The encoder first decomposes the encrypted image into a number of subimages and data sets with a multiple-level resolution. The subimage at the (t+1)th level is produced by downsampling the subimage at the tth level is explained below:

      (i,j) = (2i,2j) t = 0,1,2 T-1 (2)

      where is the encrypted image and T is the number of decomposition levels.

      The encrypted pixels that belongs to but do not belong to form a data set as explained below:

      = (i,j)mod(i,2)=1 or mod(j,2)=1}

      t=0,1,,T-1 (3)

      The output of this block is reorganized as

      , , .. and .

      The encoder quantizes each value of subimage G(t) using a step as follows:

      b(i,j) = (4)

      Fig 2. Compressed Images

    3. Reconstruction of Image

      The receiver first reconstructs the lossy version of the image with the bitstreams and the secret key and the resolution of the reconstructed image can be increased depending on the number of bitstreams received. BG provides rough information of the original image that is it generates a lossy version of the image, is used to reconstruct the detailed content with an iteratively updating procedure. The image reconstruction procedure is as explained below:

      The decoder will first decrypt the bitstream BG to obtain the values of b(i,j) and decrypts them as a subimage i.e

      Fig 3. Reconstructed Image using

      }, }, , }, , , }

      (i,j)= mod [b(i,j). – e( . i, . j) , 256] + (9) where e . i, . j) are derived from the secret key.

      The bitstreams are decrypted to obtain image with a size of / / . First, upsample the subimage (i,j) to yield an / / image as follows:

      r(. i, . j) = (i,j) (10)

      and the values of other pixels are estimated according to the pixel values in (14) using abilinear interpolation method. Then, the interpolated pixels are reorganized as data sets with multiple-resolution construction. Denote the interpolated pixel values of the kth group at the tth level as (1), (2),

      . ( ) and their corresponding original pixel values as (1), (2), . ( ).

      The errors of interpolated values are

      = (l)- (11)

      The encrypted values of are defined as

      ( ) = + , 256] (12)

      where are pseudorandom numbers derived from the secret key and corresponding to . Then

      = – ( ) mod 256 (13)

      Denoting

      = H (14)

      We also define = – ( ) mod 256 (15) With the bitstreams , the values of can be

      retrieved, which provide the information of . Therefore, the receiver may use an iterative procedure to progressively

      improve the quality of the reconstructed image by updating the pixel values according . The detailed procedure is as follows.

      For each group (1), (2), . ( )], calculate ( ) and using 12 and 14.

      1. Calculate

    = mod . + ( ) , 256] (16)

    = (17)

    are the differences between the values consistent with the corresponding and ( ). Then, considering as an estimate

    of , modify the pixel values of each group as follows:

    = + (18)

    and enforce the modified pixel values into [0, 255] as follows: = (19)

    In this iterative procedure, the decrypted pixels (i,j) gives an initial estimation of other pixels, the values of in bitstreams provide more detailed information of image

    to produce the final reconstructed result with satisfactory

    quality. In Step 2, by estimating according to , the pixel values are modified to lower the reconstruction value

    of actual may be more than 128 due to the error

    accumulation in a group, so that in (17) may be not close to .

  2. EXPERIMENTAL EVALUATION

    PSNR

    M

    16

    18

    22

    24

    26

    30

    (DB)

    for

    512*51

    35.39

    36.19

    36.66

    36.86

    37.

    37.4

    respect ive Image Size

    2

    84

    34

    48

    50

    173

    2

    471

    256*25

    6

    33.09

    94

    33.61

    32

    33.77

    32

    34.08

    68

    34.

    268

    34.5

    077

    9

    128*12

    31.44

    32.53

    32.81

    33.25

    33.

    33.2

    8

    52

    27

    60

    76

    183

    224

    1

    64*64

    38.02

    39.22

    40.40

    40.87

    41.

    41.7

    71

    77

    00

    36

    161

    291

    4

    Test image of size 512*512 is taken as input image and is decomposed into 3 scales (T=3) and M is varied from 16, 18, 22, 24, 26, 30. PSNR of reconstructed images are calculated. As the value of M is increased, PSNR is improved.

  3. CONCLUSION

This paper has presented a method for encryption & reconstruction of images using scalable codes. The encryption is achieved by modulo-256 addition of original input image with pseudorandom numbers. Then decomposition of encrypted image is done and is divided into sub image and data sets with a multiple-resolution construction. The quantization of subimage and the Hadamard coefficients of each data set is done to effectively reduce the data amount. The quantized subimage and Hadamard coefficients are considered as a set of bit streams. At the receiver side, the sub image is decrypted to produce a lossy version of image; the quantized data of Hadamard coefficients provide more detailed information for image reconstruction. Since the bit streams are generated with a multiple-resolution construction, when more bit streams are received the resolution of reconstructed image can be improved with iterative updating procedure.

  1. M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and

    K. Ramchandran, On compressing encrypted data, IEEE Trans. Signal Process., vol. 52, no. 10, pp. 29923006, Oct. 2004.

  2. R. Lazzeretti and M. Barni, Lossless compression of encrypted greylevel and color images, in Proc. 16th EUSIPCO, Lausanne, Switzerland, Aug. 2008 [Online]. Available: http://www.eurasip.org/Proceedings/ Eusipco/Eusipco2008/papers/1569105134.pdf

  3. A. Kumar and A. Makur, Lossy compression of encrypted image by compressing sensing technique, in Proc. IEEE TENCON, 2009, pp. 16.

  4. X. Zhang, Lossy compression and iterative reconstruction for encrypted image, IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 5358, Mar. 2011.

  5. A. Bilgin, P. J. Sementilli, F. Sheng, and M. W. Marcellin, Scalable image coding using reversible integerwavelet transforms, IEEE Trans. Image Process., vol. 9, no. 11, pp. 19721977, Nov. 2000.

  6. D. Taubman, High performance scalable image compression with EBCOT, IEEE Trans. Image Process., vol. 9, no. 7, pp. 11581170, Jul. 2000.

REFERENCES

  1. Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing, EURASIP J. Inf. Security, vol. 2007, pp. 1 20, Jan. 2007.

  2. T. Bianchi, A. Piva, and M. Barni, On the implementation of the discrete Fourier transform in the encrypted domain, IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 8697, Mar. 2009.

  3. J. R. Troncoso-Pastoriza and F. Pérez-González, Secure adaptive filtering, IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 469485, Jun. 2011.

  4. T. Bianchi, A. Piva, and M. Barni, Composite signal representation for fast and storage-efficient processing of encrypted signals, IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180187, Mar. 2010.

Leave a Reply