Image cryptosystem with image key using integral disproportion

Viktor Avramenko, Mykyta Bondarenko

Abstract


The subject matter of this article is the process of securing visual data through encryption. The goal of this study is to develop a new approach for image encryption and decryption using an image as a key, where security and performance are comparable or superior to alternatives. The tasks to be solved are as follows: developing a symmetric image cryptosystem for both greyscale and colored images in any format that can use an arbitrary image as a security key; adapting the capabilities of integral disproportionality for image encryption. The encryption method applies an integral disproportion formula for each pair of pixels’ components for both the input image and the key image starting from the first one. The output is a ciphered object represented as an array of real numbers, with decryption being the inverse process. The result is a novel approach to image encryption, proposing a new cryptosystem in which an arbitrary image of varying size, format, or content serves as the encryption key. The proposed symmetric full-encryption cryptosystem is applicable to both greyscale and colored images in any format. The method employs a frequency-based approach that influences the values of pixels rather than their positions. In contrast to mainstream approaches in this area, the representation of a cipher is not an image but a binary array. The proposed algorithm is simple to implement. The proposed method appears to meet the required requirements in both security and performance. Conclusions. The scientific novelty of the results obtained is as follows: This research introduces a new image encryption method, which is unique in its application of integral disproportionality to alter pixel values, differing from traditional encryption methods. This provides a practical yet secure option to the existing encryption techniques.

Keywords


symmetric cryptosystem; image encryption; image decryption;, integral disproportionality

Full Text:

PDF

References


Madhu, S., & Hussain, M. A. Securing Medical Images by Image Encryption using Key Image. International Journal of Computer Applications, 2014, vol. 104, iss. 3, pp. 30-34. DOI: 10.5120/18184-9079.

Makarichev, V., Lukin, V., Illiashenko, O., & Kharchenko, V. Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems. Sensors, 2022, vol. 22, iss. 10, article no. 3751. DOI: 10.3390/s22103751.

Albahadily, H. K., Altaay, A. A. J., & Jabbar, I. A. Encryption of Military Maps Images Using Peter De Jong Chaotic Maps and Lightwaght Encryption. 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT), Baghdad, IEEE, 2022, pp. 137-142. DOI: 10.1109/CSCTIT56299.2022.10145728.

Madhu, S., Hussain, M. A., Leelavathy, N., & Sujatha, B. Development of Secure and Novel Methods of Image Encryption Using an Image as Key. Research Highlights in Mathematics and Computer Science Vol. 7, 2023, pp. 89-102. DOI: 10.9734/bpi/rhmcs/v7/4297E.

Archana, N., Manogna, S., Hussain, D. M. A., & Razia, D. S. Secure Sharing of Documents using Image Encryption and Key Image. International Journal of Recent Technology and Engineering (IJRTE), 2019, vol. 8, iss. 4, pp. 9415-9419. DOI: 10.35940/ijrte.D9724.118419.

Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. A Modified AES Based Algorithm for Image Encryption. International Journal on Computer Science and Engineering, 2007, vol. 1, iss. 1, pp. 745-750. DOI: 10.5281/zenodo.1334059.

Ye, G., Jiao, K., Huang, X., Goi, B., & Yap, W. An image encryption scheme based on public key cryptosystem and quantum logistic map. Scientific Reports, 2020, vol. 10, iss. 1, pp. 21044. DOI: 10.1038/s41598-020-78127-2.

Neamah, A. A., & Shukur, A. A. A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme. Symmetry, 2023, vol. 15, iss. 8, article no. 1511. DOI: 10.3390/sym15081511.

Li, M., Fang, X., & Ernest, A. A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition. Mathematics, 2023, vol. 11, iss. 15, article no. 3274. DOI: 10.3390/math11153274.

Hussain, A. Z., & Khodher, M. A. A. Medical image encryption using multi chaotic maps. TELKOMNIKA (Telecommunication Computing Electronics and Control), 2023, vol. 21, iss. 3, article no. 556. DOI: 10.12928/telkomnika.v21i3.24324.

Choi, U. S., Cho, S. J., & Kang, S. W. New Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata. Advances in Science, Technology and Engineering Systems Journal, 2020, vol. 5, iss. 2, pp. 104-110. DOI: 10.25046/aj050213.

Hryshchuk, R., & Hryshchuk, O. A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM. Cybersecurity: Education Science Technique, 2019, vol. 4, iss. 4, pp. 14-23. DOI: 10.28925/2663-4023.2019.4.1423. (In Ukrainian)/

Kari, A. P., Navin, A. H., Bidgoli, A. M., & Mirnia, M. A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 2021, vol. 80, iss. 2, pp. 2753-2772. DOI: 10.1007/s11042-020-09648-1.

Dawood, A., Thabit, Q., & Fahad, T. A Comprehensive Review of Color Image Encryption Technology. Basrah journal for engineering science, 2023, vol. 23, iss. 1, pp. 56-63. DOI: 10.33971/bjes.23.1.8.

Zhou, Y., Panetta, K., & Agaian, S. Image encryption using binary key-images. 2009 IEEE International Conference on Systems, Man and Cybernetics, San Antonio, IEEE, 2009, pp. 4569-4574. DOI: 10.1109/ICSMC.2009.5346780.

Zhou, Y., Cao, W., & Chen, C. L. P. Image encryption using binary bitplane. Signal Processing, 2014, vol. 100, pp. 197-207. DOI: 10.1016/j.sigpro.2014.01.020.

Somaraj, S., & AliHussain, M. An Image Encryption Technique Using Scan Based Approach and Image as Key. Advances in Intelligent Systems and Computing, 2017, vol. 507, pp. 645-653. DOI: 10.1007/978-981-10-2471-9_62.

Somaraj, S., & Hussain, M. A. A Novel Image Encryption Technique Using RGB Pixel Displacement for Color Images. 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, IEEE, 2016, pp. 275-279. DOI: 10.1109/IACC.2016.59.

Somaraj, S., & Hussain, M. A. Performance and Security Analysis for Image Encryption using Key Image. Indian Journal of Science and Technology, 2015, vol. 8, iss. 35, pp. 1-4. DOI: 10.17485/ijst/2015/v8i35/73141.

Avramenko, V., & Demianenko, V. Serial encryption using the functions of real variable. Radioelectronic and computer systems, 2021, no. 2, pp. 39-50. DOI: 10.32620/reks.2021.2.04.

Karpenko, A. P. Integral'nye kharakteristiki neproportsional'nosti chislovykh funktsii i ikh primenenie v diagnostike [Integral characteristics of disproportionality of numerical functions and their application in diagnostics]. Visnyk Sums'koho derzhavnoho universytetu – Newsletter of Sumy State University, 2000, vol. 16, pp. 20-25. Available at: https://essuir.sumdu.edu.ua/bitstream-download/123456789/10931/1/4_Karpenko.pdf (accessed Jan. 3, 2024) (In Russian).

Avramenko, V., Bondarenko, M. Using the Sum of Real Type Functions to Encrypt Messages. CEUR Workshop Proceedings, 2021, vol. 3200, pp. 10-17.




DOI: https://doi.org/10.32620/reks.2024.2.12

Refbacks

  • There are currently no refbacks.