Selective colour image encryption using Hénon chaotic system with a keyless substitution cipher

Main Article Content

Ashish Kumar
NS Raghava

Abstract

Security is a continuous process of protecting the resources of a computer system from hackers or attackers. Multimedia comes in the form of text, image, audio and video, and all are very important modes of communication that gives users more ways to express their feelings. In traditional cryptography, encipherment and decipherment take more processing time to secure bulky data with a high order of complexity in data storage, as well as in the transmission of multimedia-oriented applications. Therefore, selective encryption reduces computational costs, overhead and size of data in the encipherment process, which is always advantageous for all the parties involved in communication. In this paper, we propose a region-based selective image encryption to secure information in an efficient manner to achieve reduced encryption time. Secrecy of unnecessary information within an image is not required for both the ends in communication. Here, security summarised as aggregated chaos-based coding with most significant bit diffusion and recentness keyless substitution cipher at the pixel level on the ROI image obtained by a hybrid region growing method. This technique significantly reduces the storage space and transmission costs. Experimental results confirm it is a more secure and fast encryption method for large sized images.

Article Details

How to Cite
Kumar, A., & Raghava, N. . (2020). Selective colour image encryption using Hénon chaotic system with a keyless substitution cipher. Engineering and Applied Science Research, 47(1), 66–76. Retrieved from https://ph01.tci-thaijo.org/index.php/easr/article/view/200978
Section
ORIGINAL RESEARCH

References

Le Gall D. MPEG: A video compression standard for multimedia applications. Comm ACM. 1991;34(4):46-58.

Katzenbeisser S, Petitcolas F. Information hiding. London: Artech house; 2016.

Vardhana, M, Arunkumar N, Abdulhay E, Vishnuprasad PV. Iot based real time trafic control using cloud computing. Cluster Comput. 2018;(S1):1-10.

Susan S, Verma OP, Swarup J. Object segmentation by an automatic edge constrained region growing technique. 2012 Fourth International Conference on Computational Intelligence and Communication Networks (CICN); 2012 Nov 3-5; Mathura, India. USA: IEEE; 2012. p. 378-81.

Ou Y, Sur C, Rhee KH. Region-based selective encryption for medical imaging. International Workshop on Frontiers in Algorithmics; 2007 Aug 1-3; Lanzhou, China. Berlin: Springer; 2007. p. 62-73.

Mahmood AB, Dony RD. Segmentation based encryption method for medical images. 6th International Conference on Internet Technology and Secured Transactions; 2011 Dec 11-14; Abu Dhabi, United Arab Emirates. USA: IEEE; 2011. p. 596-601.

Liu JL. Efficient selective encryption for JPEG 2000 images using private initial table. Pattern Recogn. 2006;39(8):1509-17.

Ravishankar KC, Venkateshmurthy MG. Region based selective image encryption. 2006 International Conference on Computing & Informatics; 2006 Jun 6-8; Kuala Lumpur, Malaysia. USA: IEEE; 2006. p. 1-6.

Kittler J. A locally sensitive method for cluster analysis. Pattern Recogn. 1976;8(1):23-33.

Verma OP, Hanmandlu M, Susan S, Kulkarni M, Jain PK. A simple single seeded region growing algorithm for color image segmentation using adaptive thresholding. 2011 International Conference on Communication Systems and Network Technologies; 2011 Jun 3-5; Jammu, India. USA: IEEE; 2011. p. 500-3.

Agarwal S, Awan A, Roth D. UIUC image database for car detection. 2002 [cited 2007 Mar 1 ]. Available from: https://cogcomp.seas.upenn.edu/Data/Car/

Kumar A, Raghava N. A novel group-based cryptosystem based on electromagnetic rotor machine. Indian J Sci Res. 2017;16(2):131-6.

Lin RM, Ng TY. Secure image encryption based on an ideal new nonlinear discrete dynamical system. Math Probl Eng. 2018;2018:1-12.

Raghava NS, Kumar A, Deep A, Chahal A. Improved LSB method for image steganography using Henon chaotic map. J Inform Secur Appl. 2014;1(1):34-42.

Jeyamala C, GopiGanesh S, Raman GS. An image encryption scheme based on one time pads-A chaotic approach. 2010 Second International conference on Computing, Communication and Networking Technologies; 2010 Jul 29-31; Karur, India. USA: IEEE; 2010. p. 1-6.

Belazi A, El-Latif AAA, Rhouma R, Belghith S. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. 2015 International Wireless Communications and Mobile Computing Conference (IWCMC); 2015 Aug 24-28; Dubrovnik, Croatia. USA: IEEE; 2015. p. 606-10.

Somaraj S, Hussain MA. Performance and security analysis for image encryption using key image. Indian J Sci and Tech. 2015;8(35):1-4.

Brahimi Z, Bessalah H, Tarabet A, Kholladi MK. A new selective encryption technique of JPEG2000 codestream for medical images transmission. 5th International Multi-Conference on Systems, Signals and Devices; 2008 Jul 20-22; Amman, Jordan. USA: IEEE; 2008. p. 1-4.

Mehta G, Dutta MK, Travieso-González CM, Kim PS. Edge based selective encryption scheme for biometric data using chaotic theory. 2014 International Conference on Contemporary Computing and Informatics (IC3I); 2014 Nov 27-29; Mysore, India. USA: IEEE; 2014. p. 383-6.

Belazi A, Abd El-Latif AA, Rhouma R, Belghith S. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. 2015 International Wireless Communications and Mobile Computing Conference (IWCMC); 2015 Aug 24-28; Dubrovnik, Croatia. USA: IEEE; 2015. p. 606-10.

Ayoup AM, Hussein AH, Attia MAA. Efficient selective image encryption. Multimed Tool Appl. 2016;75:17171-86.

Ou, Y, Sur C, Rhee KH. Region-based selective encryption for medical imaging. International Workshop on Frontiers in Algorithmics; 2007 Aug 1-3; Lanzhou, China. Berlin: Springer; 2007. p. 62-73.

Khashan OA, Zin AM, Sundararajan EA. Performance study of selective encryption in comparison to full encryption for still visual images. J Zhejiang Univ Sci C. 2014;15:435-44.

Sankaradass V, Murali P, Tholkapiyan M. Region of Interest (ROI) based image encryption with sine map and lorenz system. In: Pandian D, Fernando X, Baig Z, Shi F, editors. International Conference on ISMAC in Computational Vision and Bio-Engineering; 2018 May 16-17; Palladam, India. Berlin: Springer; 2018. p. 493-502.

Xiao D, Fu Q, Xiang T, Zhang Y. Chaotic image encryption of regions of interest. Int J Bifurcat Chaos. 2016;26(11):Article no. 1650193.