Symmetric Image Encryption using Scrambling Technique Based on Matrix Reodering Coding

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-62 Number-1
Year of Publication : 2018
Authors : Mamy Alain Rakotomalala, Falimanana Randimbindrainibe, Sitraka R.Rakotondramanana
  10.14445/22312803/IJCTT-V62P108

MLA

MLA Style: Mamy Alain Rakotomalala, Falimanana Randimbindrainibe, Sitraka R.Rakotondramanana "Symmetric Image Encryption using Scrambling Technique Based on Matrix Reodering Coding" International Journal of Engineering Trends and Technology 62.1 (2018): 58-70.

APA Style: Mamy Alain Rakotomalala, Falimanana Randimbindrainibe, Sitraka R.Rakotondramanana (2018). Symmetric Image Encryption using Scrambling Technique Based on Matrix Reodering Coding. International Journal of Engineering Trends and Technology, 62(1), 58-70.

Abstract
For having performance of image security, the good option is using combination between the ciphering and steganography. The ciphering protect the information to the person with bad intention and the steganography facilitate the transmission of the secret key. The scrambling technique could a candidate of the ciphering algorithm. The zigzag pattern has 8 variant and could be used for it. For that, we invent a new algorithm based on key coding the scrambling technique based on matrix reordering. For the first approach, we use scrambling methods separately with all component RGB and 15bits of key repartitioning like this : 3bits for the repetitively order t of scrambling color, 3bits for the colors scrambling, 3bits for the pixel scrambling techniques of Red, 3bits for the pixel scramblingtechniques of Green, 3bits for the pixel scrambling techniques of Blue. After the simulation on Matlab, the result confirm that it has a good performance on correlation, PSNR, UACI, NPCR and histogram but one bit error doesn’t modify so much the deciphering image comparing the original image. To avoid this, we prefer to use scrambling methods at all the component of the image and use 9bits of key like : repartitioning like this: 3bits of repetitively order of scrambling, 3bits of scrambling color for all component of image, 3bits of scrambling pixels techniques. The two approaches for the ciphering, steganography and deciphering are simulated, evaluated, and interpreted in this article.

Reference
[1] BhaskarMondal, Neel Biswas, TarniMandal, “A Comparative study on Cryptographic Image Scrambling”, Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering pp. 261–268, Conference Paper June 2017.
[2] QI Dongxu, ZOU Jiancheng, HAN Xiaoyou. “A new class of scrambling transformation and its application in the image information covering “, Journal of Science in China (Series E), 2000, 43(3)… 304 - 312.
[3] J.C.Zou and R.K.Ward, “Introducing Two New Image Scrambling Methods”, Proc. Of IEEE Pac. Rim Conf. on Comm., Comp. and Sig. Proc., pp. 708-711, 2003.
[4] Mamy Alain Rakotomalala, Tahina E. Rakotondraina and Sitraka R. Rakotondramanana, “Contribution for Improvement of Image Scrambling Technique Based on Zigzag Matrix Reodering”;International Journal of Computer Trends and Technology (IJCTT) – Volume 61 Number 1 - July 2018
[5] PunitaKumari and Kalpana Jain, “Digital Image Encryption Technique Using Block Based Scrambling and Substitution”, Global Journal of Computer Science and Technology, Vol.1, USA (2017)
[6] KokSheik Wong, Kiyoshi Tanaka, “SCALABLE IMAGE SCRAMBLING METHOD USING UNIFIED CONSTRUCTIVE PERMUTATION FUNCTION ON DIAGONAL BLOCKS”, 28th Picture Coding Symposium, Japan 8-10 (12) (2012)
[7] Ahmet C¸ agrıBagbaba, BernaOrs, “Hardware Implementation of Novel Image Compression-Encryption System on a FPGA”, Istanbul Technical University, Turkey (2013)
[8] CHADY EL MOUCARY, “A Novel Blind Digital Watermarking Technique for Stegano-Encrypting Information Using Nine-AC-Coefficient Prediction Algorithm with an Innovative Security Strategy”, WSEAS Transactions on Signal Processing, Vol.5, Issue.11, Libanese (06) (2009)
[9] J.M.Rodriguesa, W. Puecha and A.G. Borsb, “A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher”, University of Montpellier, France (2002)
[10] S.S.Maniccama, N.G. Bourbakis, “Image and video encryption using SCAN patterns”, The Journal of the Pattern Recognition Society, Greece 18 (8) (2003)
[11] Shalin J Patel, “Image Encryption and Compression using Scan Patterns”, International Journal for Scientific Research & Development (IJSRD), Vol. 3, Issue 03,Kalol (2015)
[12] FaramarzSadeghi, FatemehZarisfiKermani, and MarjanKuchaki Rafsanjani, “Optimizing Image Steganography by Combining the GA and ICA”, the ISC International Journal of Information Security, Vol.7, No.1, Iran (1) (2015) 47-58
[13] ReemaDhiman, Butta Singh, “IMAGE ENCRYPTION TECHNIQUES: A LITERATURE REVIEW”, International Journal of Advanced Research in Computer Science (IJARCS), Vol.8, No.7, India (7-8) (2017)
[14] ChengqingLia, DongdongLina, JinhuLub, “Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits”, IEEE Multimedia, China 6 (8) (2017)
[15] Sabah Fadhel, MohdShafry, Omar Farook, “Chaos Image Encryption Methods: A Survey Study”, Bulletin of Electrical Engineering and Informatics, Vol.6, No.1, Malaysia (3) 2017 99-104
[16] FarzanaKabir, JasmeetKaur, “Color Image Encryption for Secure Transfer over Internet: A survey”, International Research Journal of Engineering and Technology (IRJET), Vol.4, India (10) 2017
[17] S.El Assad, M. Farajallah and C. Vladeanu, “Fast and Secure Chaos-based Cryptosystem for Images”, International Journal of Bifurcation and Chaos (IJBC), (2) (2016)
[18] SangitaVishwakarma, Mrs. ShahanaQureshi, “TECHNIQUES OF VISUAL CRYPTOGRAPHY SCHEMES: A REVIEW”, Journal of Emerging Technologies and Innovative Research (JETIR), Vol. 4, (4) (2017)
[19] C.Muramatsu, S. Higuchi, T. Morita and H. Fujita, “Similarity estimation for reference image retrieval in mammograms using convolutional neural network”, Texas 27 (2) (2018)
[20] A.Cheddad, J. Condell, K. Curran et P. McKevitt, “Digital image steganography: Survey and analysis of current methods”, Signal Processing 90, pages 727–752. (2010).
[21] S.Kouider,.« Insertion adaptative en stéganographie application aux images numériques dans le domaine spatial », Université de Montpellier, 2013.
[22] J.A.Mazumde, et K. Hemachandran, « Study of Image steganography using LSB,DFT and DWT», International Journal of Computers & Technology, 2013.
[23] R.Rakotomalala, “Analyse de corrélation, Étude des dépendances - Variables quantitatives Version 1.1”, Support Université Lumière Lyon 2, 27 (12) (2017)
[24] Z.Wang, A.C. Bovik , H.R. Seikh, et E.P. Simon celli, «Image quality assessment: from visibility to structural similarity», IEEE Transaciations on Image Processing, volume 13, 2004.
[25] Junqin Zhao, WeichuangGuo, Ruisong Ye, “A Chaos-based Image Encryption Scheme”, International Journal of Computer Trends and Technology (IJCTT) – volume 15 number 4 – Sep 2014 Using Permutation-Substitution Architecture

Keywords
Ciphering, scrambling, Steganography, Zigzag, Key.