SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -103
Random Chaotic Number Generation based Clustered Image
Encryption
Fadhil Hanoon Abbood
Computer Science Dept.
Education College.
Al-Mustansiriyah University
Rana Saad Mohammed
Computer Science Dept.
Education College.,
Al-Mustansiriyah University.
Intisar Abid Yousif
Computer Science Dept.
Education College.,
Al-Mustansiriyah University.
Abstract— Image encryption process is one of secure communication techniques to get confidentiality and authority
of reading data. Encryption techniques should be improved with technological progress to overcome the security
problems like the existence of penetration of the network. This paper develop an image encryption technique by
encrypt the clusters of image using the generated keys from propose a modified of standard map. In decryption
process, a recover image can be obtained by reverse the encryption process and utilize adding instead of clustering.
Exploratory results check and demonstrate that the proposed procedure is secure and quick.
Keywords— Image encryption, decryption, cluster, standard map.
I. INTRODUCTION
Image data must be remain protected with the rapid growth of information technology from illegal users over unsecured
channels of network. Image security is an application layer to get a safely transfer of the image data. Traditional
cryptosystems have a long time to encrypt the image data since the size of image is larger than text size. The main
methods to protect a data from unauthorized users are cryptography, steganography, and watermarking. Cryptography is
one of the main tools to provide security. It deals with the improvement of techniques for converting data forms between
intelligible and unintelligible. There are two main techniques of cryptography: private key cryptography and public key
cryptography. In the private key technique, the sender and receiver use a same secret key for encryption and decryption
processes. In the public key technique, they use different keys for encryption and decryption processes [1].
The existing algorithms can be divided into three categories: Permutation of position [2,3], transformation of value
[4,5], and the combination form [6,7]. An image encryption and compression using prediction error clustering technique
is study in [8,9].
This paper focuses on the improvement of private key image encryption algorithm. The proposed algorithm based on
preprocessing process that give clusters of image and modify a standard map. The organization of this paper is as follows:
proposed image encryption and decryption technique in the first section, Experimental analysis in the second section, and
conclusion in the third section.
II. PROPOSED IMAGE ENCRYPTION AND DECRYPTION TECHNIQUE
Fig. (1) and (2) show a block diagram of encryption and decryption respectively. A technique of image encryption is
based on image clustering as preprocessing and random standard map. A standard map in equation (1) is modified into
two sub equations to generate a series of keys as a tool for image clusters encryption using a technique in [10]. Standard
map can be as follow equations:
= + c sin mod 2π …….(1.a)
= + mod 2π ………(1.b)
A modified Standard map as key generation as in equation (2):
= ( + ( − )( 	+ 	c	sin	 		mod	2π)) 	 … (2.a)
= ( + ( − )( 	+		 		mod	2π)) 	 …. (2.b)
A modified Standard map as multiple key generation as in equation (3):
= ( +( - )(	 + k sin mod 2π))mod … (3.a)
= ( +( - )(	 + mod 2π))mod … (3.b)
Where i is number of clusters.
By using a test for random dynamics was proposed by Saida in [11] that use a Lambda measurement which is the
dominant Lyapunov Exponent. A Lambda of proposed equation is decreased that indicate increased the presence of
random dynamics compared with equation (1).
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -104
Image decryption technique uses reverse processes of image encryption and use adding process to recover an image.
Fig 1. Proposed image encryption block diagram
Fig. 2. Proposed image decryption block diagram
This paper takes “baboon image” and “peppers image” samples as example. See fig. (3) and (4) respectively.
fig. 3. Sample 1 and its histograms
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -105
fig. 4. Sample 2 and its histograms
In the following sections show the steps of proposed technique:
 Preprocessing step
Input: An original color image with size n x n x 3.
Output: Clusters of image each with size qxqx3.
1. Read a color image with size n x n x 3 (e.g. 256x256x3).
2. Split the original image into (m) clusters (e.g. 5 clusters). See fig. (5).
 Encryption algorithm
Input: Clusters of image each with size qxqx3.
Key agreement: n, a, b, k
Output: An encryption image with size qxqx3.
1. Convert each cluster into 1D with size L such that L=n*n*3 (e.g L=256*256*3=196608).
2. Use proposed multiple key generations as eq. (3) to generate and each with size L and where i
=1…m and (e.g a=10, b=50, k=10).
3. Permute the color positions of each cluster by sorting the generated random series .
4. Concatenate these permuted clusters to get 1D array (A) with size P such that P= L * m (e.g. 196608 * 5=
983040).
5. Suppose j= 2,…, m and check if j*j = m , then compute q= n*j. Else if j*j > m , then
 Compute q= n*j (e.g. q= 256*3=768).
 Padding (A) with zero to get a new 1D array with size Q such that Q=q*q*3(e.g.Q=768*768*3=1769472).
6. Use proposed key generation as eq. (2) to generate and each with size Q.
7. XORing between 1D (A) and round of values. And then permuted by sorting to get a new 1D array (B)
with size Q.
8. Convert 1D array (B) into 2D array as encryption image with size qxqx3 (e.g 768x768x3).
 Decryption Algorithm
Input: An encryption image with size qxqx3.
Key agreement: n, a, b, k
Output: A recover color image with size n x n x 3.
1. Convert 2D encryption image into 1D (B’) with size Q’ such that Q’=q*q*3(e.g. Q’=768*768*3=1769472).
2. Use proposed key generation as eq. (2) to generate and each with size Q’.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -106
3. Inverse the permutation of B’ using to sort the index (1… Q’). And then XOR the result with round to
get a recover 1D array (A’) with size Q’.
4. Compute m’ such that (m’= Q’/ (n*n*3)) is number of clusters as 1D array each with size L’ such that (L’=Q’/
m’). e.g. m’= 1769472/(256*256*3)= 9 and L’= 1769472/9=196608.
5. Use multiple key generations as eq. (3) to generate and each with size L’ and where i=1…m’. And the
secret parameters a, b, and k must are similar to a parameters at the sender side (e.g a=10, b=50, k=10).
6. Inverse the permutation of each 1D array of recover cluster using to sort the index (1… L’).
7. Reshape each 1D array of a sorted recover cluster into 2D each with size nxnx3 (e.g. 256x256x3).
8. Adding between these recover 2D of clusters to get a recover image with size nxnx3.
IV. EXPERIMENTAL ANALYSIS
This paper uses 7 analysis measurements between clusters and its permutation, and also between original image and its
recover. Tables (1) and (2) show the experimental results of sample 1 and sample 2 respectively.
Fig. 5. Sample 1 clusters and its permutations
TABLE 1
MEASUREMENTS RESULT OF SAMPLE 1
MeanSquare
Error
PeakSignalto
NoiseRatio
MNormalized
Cross-
Correlation
Average
Difference
Structural
Content
Maximum
Difference
Normalized
AbsoluteError
Cluster0
&PCluster0
6.6607e+03 9.8956 0.2167 1.6202 1.8719 235 1.5203
Cluster1
&PCluster1
4.1651e+03 11.9346 0.2743 -
19.4314
0.6393 181 2.6720
Cluster2
&PCluster2
3.6135e+03 12.5515 0.2504 1.4649 1.8150 151 1.4471
Cluster3
&PCluster3
7.4634e+03 9.4014 0.1959 -0.8359 1.6779 240 1.6318
Cluster4
&PCluster4
963.8319 18.2908 0.1666 0.5398 1.9772 103 1.6081
Original &
Recover
0.8894 48.6397 1.0001 -0.0081 0.9998 0 6.2969e-05
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -107
Fig. 6. Sample 2 clusters and its permutations
TABLE 2
MEASUREMENTS RESULT OF SAMPLE 2
MeanSquare
Error
PeakSignalto
NoiseRatio
MNormalized
Cross-
Correlation
Average
Difference
Structural
Content
Maximum
Difference
Normalized
Absolute
Error
Cluster0
&PCluster0
2.7507e+03 13.7364 0.1064 2.4257 2.4321 181 1.6443
Cluster1
&PCluster1
1.1246e+03 17.6210 0.0775 0.8819 2.2604 204 1.7413
Cluster2
&PCluster2
3.9018e+03 12.2181 0.0671 0.5641 2.1928 236 1.8264
Cluster3
&PCluster3
110.0240 27.7159 0.0824 -0.1556 0.8806 204 1.9268
Cluster4
&PCluster4
631.7205 20.1256 0.1021 -0.3624 1.1012 204 1.8759
Cluster5
&PCluster5
4.4143e+03 11.6822 0.1295 3.1517 2.3559 204 1.6076
Cluster6
&PCluster6
5.8999e+03 10.4224 0.1349 3.6626 2.2995 211 1.5987
Cluster7
&PCluster7
2.7339e+03 13.7629 0.2209 -0.5712 1.1938 204 1.6245
Original &
Recover
2.1904 44.7256 1.0001 -0.0220 0.9996 0 1.8350e-04
In the following Table (4) show an encryption and decryption speed results of Sample 1 and Sample2 respectively
using processor Intel(R) Core(TM) i7-3537U CPU @ 2.00GHz 2.50 GHz.
TABLE 4
ENCRYPTION AND DECRYPTION SPEED RESULTS OF SAMPLE 1 & SAMPLE2
Sample 1
No. cluster= 5
Sample 2
No. cluster= 8
Encryption
speed
3.3978 Sec. 3.9046 Sec.
Decryption
speed
4.2337 Sec. 4.2020 Sec.
V. CONCLUSIONS
A proposed system is used to design a technique of image encryption based on image clustering as preprocessing and
random standard map. From experimental results show the proposed method has encryption speed and secure. It gives a
different size of encrypted image compared with original image size. This cause confuses the attacker who tries getting
information about an original image. Decryption process has adding process at last step rather than re-clustering
technique. From this point the receiver cannot decrypt image unless he knows the right series of key for each image
cluster to recover an original image.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -108
REFERENCES
[1]. N. K. Pareek. “Design and Analysis of A Novel Digital Image Encryption”. International Journal of Network
Security & Its Applications (IJNSA), Vol.4, No.2, March 2012.
[2].J. W. Yoon and H. Kim, “An image encryption scheme with a pseudorandom permutation based on chaotic maps”,
Communication in Nonlinear Science and Numerical Simulation, Vol. 15, No. 12, 2010. pp. 3998-4006.
[3].C. K. Nayak, A. K. Acharya and S. Das, “Image encryption using an enhanced block based transformation algorithm”,
International Journal of Research and Review in Computer Science, Vol. 2, No. 2, (2011) . pp. 275-279.
[4].I. A. Ismail, M. Amin and H. Diab, “A digital image encryption algorithm based a composition of two chaotic logistic
map”, International Journal of Network Security, Vol. 11, No. 1, (2010) , pp. 1-10.
[5].D. Chen and Y. Chang, “A novel image encryption algorithm based on logistic maps”, Advances in Information
Science and Service Sciences, Vol. 3, No. 7, (2011) .pp. 364-372.
[6].S. P. Indrakanti and P.S. Avadhani, “Permutation based image encryption technique”, International Journal of
Computer Applications, Vol. 28, No. 8, (2011) . pp. 45-47.
[7].V. Patidar, N.K. Pareek, G. Purohit and K.K. Sud, “A robust and secure chaotic standard map based pseudorandom
permutation-substitution scheme for image encryption”, Optics Communications, Vol. 284, (2011). pp. 4331-4339.
[8]. J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang, “Designing an Efficient Image Encryption-Then-Compression System via
Prediction Error Clustering and Random Permutation”. IEEE transactions on information forensics and security, vol.
9, no. 1, January 2014, pp. 39-50.
[9]. H. P. Kaur, R. Kaur, “REVIEW: Improve Image Encryption-Then-Compression System using Prediction Error
Clustering with HAAR Wavelet Transform”, International Journal of Research Development & Innovation (IJRDI).
Vol. 1, Issue 6, August 2015, pp. 254-257.
[10]. S. B. Sadkhan and R. S. Mohammed, “Proposed random unified chaotic map as PRBG for voice encryption in
wireless communication”, Procedia Computer Science journal (2015) ELSEVIER pp. 314-323.
[11]. A. BenSa¨ıda, “A practical test for noisy chaotic dynamics”, ELSEVIER, 2015.

More Related Content

PDF
T01022103108
PDF
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
PPTX
Multi graph encoder
PPT
Fuzzy c means clustering protocol for wireless sensor networks
PDF
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
PDF
Implementation of ECC and ECDSA for Image Security
PDF
Lecture 3 image sampling and quantization
PDF
Efficient Technique for Image Stenography Based on coordinates of pixels
T01022103108
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
Multi graph encoder
Fuzzy c means clustering protocol for wireless sensor networks
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Implementation of ECC and ECDSA for Image Security
Lecture 3 image sampling and quantization
Efficient Technique for Image Stenography Based on coordinates of pixels

What's hot (18)

PPTX
Fuzzy c means manual work
PPTX
Digit recognizer by convolutional neural network
PDF
Digital Image Processing: Digital Image Fundamentals
PDF
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
PDF
PDF
Fuzzy c means_realestate_application
PDF
Efficient & Secure Data Hiding Using Secret Reference Matrix
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
PDF
Assignment 1
PDF
机器学习Adaboost
PDF
Modified weighted embedding method for image steganography
PDF
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
PDF
Visual Cryptography using Image Thresholding
PDF
Rn d presentation_gurulingannk
PDF
A flexible method to create wave file features
PDF
Support Vector Machines (SVM)
 
PDF
A fast search algorithm for large
Fuzzy c means manual work
Digit recognizer by convolutional neural network
Digital Image Processing: Digital Image Fundamentals
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Fuzzy c means_realestate_application
Efficient & Secure Data Hiding Using Secret Reference Matrix
International Journal of Computational Engineering Research(IJCER)
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Assignment 1
机器学习Adaboost
Modified weighted embedding method for image steganography
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
Visual Cryptography using Image Thresholding
Rn d presentation_gurulingannk
A flexible method to create wave file features
Support Vector Machines (SVM)
 
A fast search algorithm for large
Ad

Viewers also liked (8)

DOCX
AUS Portfolio 2016
PDF
BylsmaColbyNPSThesis_ICTAuthRegimes
PPTX
Practica10
PPTX
Week 8
PDF
Scope and Challenges in Sailfish OS: A brief overview
PDF
Edward Anderson - scholarship - The Brief and Bloody Resurrection of Mme. LEs...
PPTX
Yunchao he icot2015
PPS
Thiensusong
AUS Portfolio 2016
BylsmaColbyNPSThesis_ICTAuthRegimes
Practica10
Week 8
Scope and Challenges in Sailfish OS: A brief overview
Edward Anderson - scholarship - The Brief and Bloody Resurrection of Mme. LEs...
Yunchao he icot2015
Thiensusong
Ad

Similar to Random Chaotic Number Generation based Clustered Image Encryption (20)

PDF
New Approach of Preprocessing For Numeral Recognition
PDF
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
PDF
50120130405004 2
PDF
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
PDF
11.secure compressed image transmission using self organizing feature maps
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
K-means Clustering Method for the Analysis of Log Data
PDF
3D Object Classification Using Deep Learning and Phase-only Digital Holography
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
E046012533
PDF
Efficient Approach for Content Based Image Retrieval Using Multiple SVM in YA...
PDF
EFFICIENT APPROACH FOR CONTENT BASED IMAGE RETRIEVAL USING MULTIPLE SVM IN YA...
PDF
Performance Analysis of CRT for Image Encryption
PDF
Greyscale image authentication and repairing
PDF
Greyscale image authentication and repairing
PDF
Secured data hiding by using extended visual cryptography
PDF
Secured data hiding by using extended visual
PDF
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
New Approach of Preprocessing For Numeral Recognition
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
50120130405004 2
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
11.secure compressed image transmission using self organizing feature maps
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
K-means Clustering Method for the Analysis of Log Data
3D Object Classification Using Deep Learning and Phase-only Digital Holography
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
E046012533
Efficient Approach for Content Based Image Retrieval Using Multiple SVM in YA...
EFFICIENT APPROACH FOR CONTENT BASED IMAGE RETRIEVAL USING MULTIPLE SVM IN YA...
Performance Analysis of CRT for Image Encryption
Greyscale image authentication and repairing
Greyscale image authentication and repairing
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...

More from AM Publications (20)

PDF
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
PDF
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
PDF
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
PDF
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
PDF
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
PDF
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
PDF
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
PDF
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
PDF
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PDF
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PDF
INTELLIGENT BLIND STICK
PDF
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
PDF
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
PDF
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
PDF
OPTICAL CHARACTER RECOGNITION USING RBFNN
PDF
DETECTION OF MOVING OBJECT
PDF
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PDF
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PDF
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
PDF
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
INTELLIGENT BLIND STICK
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
OPTICAL CHARACTER RECOGNITION USING RBFNN
DETECTION OF MOVING OBJECT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Artificial Intelligence
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Safety Seminar civil to be ensured for safe working.
PPT
Mechanical Engineering MATERIALS Selection
PDF
Well-logging-methods_new................
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
Digital Logic Computer Design lecture notes
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
additive manufacturing of ss316l using mig welding
Operating System & Kernel Study Guide-1 - converted.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Internet of Things (IOT) - A guide to understanding
Current and future trends in Computer Vision.pptx
Artificial Intelligence
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Safety Seminar civil to be ensured for safe working.
Mechanical Engineering MATERIALS Selection
Well-logging-methods_new................
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
Digital Logic Computer Design lecture notes
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Random Chaotic Number Generation based Clustered Image Encryption

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -103 Random Chaotic Number Generation based Clustered Image Encryption Fadhil Hanoon Abbood Computer Science Dept. Education College. Al-Mustansiriyah University Rana Saad Mohammed Computer Science Dept. Education College., Al-Mustansiriyah University. Intisar Abid Yousif Computer Science Dept. Education College., Al-Mustansiriyah University. Abstract— Image encryption process is one of secure communication techniques to get confidentiality and authority of reading data. Encryption techniques should be improved with technological progress to overcome the security problems like the existence of penetration of the network. This paper develop an image encryption technique by encrypt the clusters of image using the generated keys from propose a modified of standard map. In decryption process, a recover image can be obtained by reverse the encryption process and utilize adding instead of clustering. Exploratory results check and demonstrate that the proposed procedure is secure and quick. Keywords— Image encryption, decryption, cluster, standard map. I. INTRODUCTION Image data must be remain protected with the rapid growth of information technology from illegal users over unsecured channels of network. Image security is an application layer to get a safely transfer of the image data. Traditional cryptosystems have a long time to encrypt the image data since the size of image is larger than text size. The main methods to protect a data from unauthorized users are cryptography, steganography, and watermarking. Cryptography is one of the main tools to provide security. It deals with the improvement of techniques for converting data forms between intelligible and unintelligible. There are two main techniques of cryptography: private key cryptography and public key cryptography. In the private key technique, the sender and receiver use a same secret key for encryption and decryption processes. In the public key technique, they use different keys for encryption and decryption processes [1]. The existing algorithms can be divided into three categories: Permutation of position [2,3], transformation of value [4,5], and the combination form [6,7]. An image encryption and compression using prediction error clustering technique is study in [8,9]. This paper focuses on the improvement of private key image encryption algorithm. The proposed algorithm based on preprocessing process that give clusters of image and modify a standard map. The organization of this paper is as follows: proposed image encryption and decryption technique in the first section, Experimental analysis in the second section, and conclusion in the third section. II. PROPOSED IMAGE ENCRYPTION AND DECRYPTION TECHNIQUE Fig. (1) and (2) show a block diagram of encryption and decryption respectively. A technique of image encryption is based on image clustering as preprocessing and random standard map. A standard map in equation (1) is modified into two sub equations to generate a series of keys as a tool for image clusters encryption using a technique in [10]. Standard map can be as follow equations: = + c sin mod 2π …….(1.a) = + mod 2π ………(1.b) A modified Standard map as key generation as in equation (2): = ( + ( − )( + c sin mod 2π)) … (2.a) = ( + ( − )( + mod 2π)) …. (2.b) A modified Standard map as multiple key generation as in equation (3): = ( +( - )( + k sin mod 2π))mod … (3.a) = ( +( - )( + mod 2π))mod … (3.b) Where i is number of clusters. By using a test for random dynamics was proposed by Saida in [11] that use a Lambda measurement which is the dominant Lyapunov Exponent. A Lambda of proposed equation is decreased that indicate increased the presence of random dynamics compared with equation (1).
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -104 Image decryption technique uses reverse processes of image encryption and use adding process to recover an image. Fig 1. Proposed image encryption block diagram Fig. 2. Proposed image decryption block diagram This paper takes “baboon image” and “peppers image” samples as example. See fig. (3) and (4) respectively. fig. 3. Sample 1 and its histograms
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -105 fig. 4. Sample 2 and its histograms In the following sections show the steps of proposed technique:  Preprocessing step Input: An original color image with size n x n x 3. Output: Clusters of image each with size qxqx3. 1. Read a color image with size n x n x 3 (e.g. 256x256x3). 2. Split the original image into (m) clusters (e.g. 5 clusters). See fig. (5).  Encryption algorithm Input: Clusters of image each with size qxqx3. Key agreement: n, a, b, k Output: An encryption image with size qxqx3. 1. Convert each cluster into 1D with size L such that L=n*n*3 (e.g L=256*256*3=196608). 2. Use proposed multiple key generations as eq. (3) to generate and each with size L and where i =1…m and (e.g a=10, b=50, k=10). 3. Permute the color positions of each cluster by sorting the generated random series . 4. Concatenate these permuted clusters to get 1D array (A) with size P such that P= L * m (e.g. 196608 * 5= 983040). 5. Suppose j= 2,…, m and check if j*j = m , then compute q= n*j. Else if j*j > m , then  Compute q= n*j (e.g. q= 256*3=768).  Padding (A) with zero to get a new 1D array with size Q such that Q=q*q*3(e.g.Q=768*768*3=1769472). 6. Use proposed key generation as eq. (2) to generate and each with size Q. 7. XORing between 1D (A) and round of values. And then permuted by sorting to get a new 1D array (B) with size Q. 8. Convert 1D array (B) into 2D array as encryption image with size qxqx3 (e.g 768x768x3).  Decryption Algorithm Input: An encryption image with size qxqx3. Key agreement: n, a, b, k Output: A recover color image with size n x n x 3. 1. Convert 2D encryption image into 1D (B’) with size Q’ such that Q’=q*q*3(e.g. Q’=768*768*3=1769472). 2. Use proposed key generation as eq. (2) to generate and each with size Q’.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -106 3. Inverse the permutation of B’ using to sort the index (1… Q’). And then XOR the result with round to get a recover 1D array (A’) with size Q’. 4. Compute m’ such that (m’= Q’/ (n*n*3)) is number of clusters as 1D array each with size L’ such that (L’=Q’/ m’). e.g. m’= 1769472/(256*256*3)= 9 and L’= 1769472/9=196608. 5. Use multiple key generations as eq. (3) to generate and each with size L’ and where i=1…m’. And the secret parameters a, b, and k must are similar to a parameters at the sender side (e.g a=10, b=50, k=10). 6. Inverse the permutation of each 1D array of recover cluster using to sort the index (1… L’). 7. Reshape each 1D array of a sorted recover cluster into 2D each with size nxnx3 (e.g. 256x256x3). 8. Adding between these recover 2D of clusters to get a recover image with size nxnx3. IV. EXPERIMENTAL ANALYSIS This paper uses 7 analysis measurements between clusters and its permutation, and also between original image and its recover. Tables (1) and (2) show the experimental results of sample 1 and sample 2 respectively. Fig. 5. Sample 1 clusters and its permutations TABLE 1 MEASUREMENTS RESULT OF SAMPLE 1 MeanSquare Error PeakSignalto NoiseRatio MNormalized Cross- Correlation Average Difference Structural Content Maximum Difference Normalized AbsoluteError Cluster0 &PCluster0 6.6607e+03 9.8956 0.2167 1.6202 1.8719 235 1.5203 Cluster1 &PCluster1 4.1651e+03 11.9346 0.2743 - 19.4314 0.6393 181 2.6720 Cluster2 &PCluster2 3.6135e+03 12.5515 0.2504 1.4649 1.8150 151 1.4471 Cluster3 &PCluster3 7.4634e+03 9.4014 0.1959 -0.8359 1.6779 240 1.6318 Cluster4 &PCluster4 963.8319 18.2908 0.1666 0.5398 1.9772 103 1.6081 Original & Recover 0.8894 48.6397 1.0001 -0.0081 0.9998 0 6.2969e-05
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -107 Fig. 6. Sample 2 clusters and its permutations TABLE 2 MEASUREMENTS RESULT OF SAMPLE 2 MeanSquare Error PeakSignalto NoiseRatio MNormalized Cross- Correlation Average Difference Structural Content Maximum Difference Normalized Absolute Error Cluster0 &PCluster0 2.7507e+03 13.7364 0.1064 2.4257 2.4321 181 1.6443 Cluster1 &PCluster1 1.1246e+03 17.6210 0.0775 0.8819 2.2604 204 1.7413 Cluster2 &PCluster2 3.9018e+03 12.2181 0.0671 0.5641 2.1928 236 1.8264 Cluster3 &PCluster3 110.0240 27.7159 0.0824 -0.1556 0.8806 204 1.9268 Cluster4 &PCluster4 631.7205 20.1256 0.1021 -0.3624 1.1012 204 1.8759 Cluster5 &PCluster5 4.4143e+03 11.6822 0.1295 3.1517 2.3559 204 1.6076 Cluster6 &PCluster6 5.8999e+03 10.4224 0.1349 3.6626 2.2995 211 1.5987 Cluster7 &PCluster7 2.7339e+03 13.7629 0.2209 -0.5712 1.1938 204 1.6245 Original & Recover 2.1904 44.7256 1.0001 -0.0220 0.9996 0 1.8350e-04 In the following Table (4) show an encryption and decryption speed results of Sample 1 and Sample2 respectively using processor Intel(R) Core(TM) i7-3537U CPU @ 2.00GHz 2.50 GHz. TABLE 4 ENCRYPTION AND DECRYPTION SPEED RESULTS OF SAMPLE 1 & SAMPLE2 Sample 1 No. cluster= 5 Sample 2 No. cluster= 8 Encryption speed 3.3978 Sec. 3.9046 Sec. Decryption speed 4.2337 Sec. 4.2020 Sec. V. CONCLUSIONS A proposed system is used to design a technique of image encryption based on image clustering as preprocessing and random standard map. From experimental results show the proposed method has encryption speed and secure. It gives a different size of encrypted image compared with original image size. This cause confuses the attacker who tries getting information about an original image. Decryption process has adding process at last step rather than re-clustering technique. From this point the receiver cannot decrypt image unless he knows the right series of key for each image cluster to recover an original image.
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -108 REFERENCES [1]. N. K. Pareek. “Design and Analysis of A Novel Digital Image Encryption”. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012. [2].J. W. Yoon and H. Kim, “An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Communication in Nonlinear Science and Numerical Simulation, Vol. 15, No. 12, 2010. pp. 3998-4006. [3].C. K. Nayak, A. K. Acharya and S. Das, “Image encryption using an enhanced block based transformation algorithm”, International Journal of Research and Review in Computer Science, Vol. 2, No. 2, (2011) . pp. 275-279. [4].I. A. Ismail, M. Amin and H. Diab, “A digital image encryption algorithm based a composition of two chaotic logistic map”, International Journal of Network Security, Vol. 11, No. 1, (2010) , pp. 1-10. [5].D. Chen and Y. Chang, “A novel image encryption algorithm based on logistic maps”, Advances in Information Science and Service Sciences, Vol. 3, No. 7, (2011) .pp. 364-372. [6].S. P. Indrakanti and P.S. Avadhani, “Permutation based image encryption technique”, International Journal of Computer Applications, Vol. 28, No. 8, (2011) . pp. 45-47. [7].V. Patidar, N.K. Pareek, G. Purohit and K.K. Sud, “A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption”, Optics Communications, Vol. 284, (2011). pp. 4331-4339. [8]. J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”. IEEE transactions on information forensics and security, vol. 9, no. 1, January 2014, pp. 39-50. [9]. H. P. Kaur, R. Kaur, “REVIEW: Improve Image Encryption-Then-Compression System using Prediction Error Clustering with HAAR Wavelet Transform”, International Journal of Research Development & Innovation (IJRDI). Vol. 1, Issue 6, August 2015, pp. 254-257. [10]. S. B. Sadkhan and R. S. Mohammed, “Proposed random unified chaotic map as PRBG for voice encryption in wireless communication”, Procedia Computer Science journal (2015) ELSEVIER pp. 314-323. [11]. A. BenSa¨ıda, “A practical test for noisy chaotic dynamics”, ELSEVIER, 2015.