20
Design of an Image Cryptosystem using Singular Value Decomposition Aseem Kumar Patel and Arup Kumar Pal Department of Computer Science and Engineering Bhubaneswar Institute of Technology Bhubaneswar-752054, Orissa, India

Image Crtptosystem-Mtech Thesis

Embed Size (px)

Citation preview

Page 1: Image Crtptosystem-Mtech Thesis

Design of an Image

Cryptosystem using Singular

Value Decomposition

Aseem Kumar Patel and Arup Kumar Pal

Department of Computer Science and Engineering

Bhubaneswar Institute of Technology

Bhubaneswar-752054, Orissa, India

Page 2: Image Crtptosystem-Mtech Thesis

Coverage of the Presentation

Introduction

Fundamentals of Image Compression,SVD and Secure Communication.

The proposed image cryptosystem (basedon SVD)

Experimental Results

Security Analysis

Conclusions

Page 3: Image Crtptosystem-Mtech Thesis

Introduction

Image Cryptosystem is useful to transmit importantimage through public channel.

It consists of mainly two parts Compression – Reducing network traffic

Encryption – Making data secret or confidential.

SVD is an efficient tool for image compression andsame has been used in our work.

Secure transmission of SVD compressed image usingcryptography techniques.

Page 4: Image Crtptosystem-Mtech Thesis

Image Compression Image Compression exploits various types of redundancies

present in the real images.

Two key factors are: Compression ratio

Tolerance in the quality degradation

Lossless compression Perfect reconstruction from compressed data (text documents,

medical images etc.)

Lossy compression Perfect reconstruction is not possible (is not essential) and we can

afford the partial loss in the image data as long as it is withintolerance.

4

Page 5: Image Crtptosystem-Mtech Thesis

Singular Value Decomposition (SVD)

Given any mn matrix M, algorithm to findmatrices U, D and V such that

Where U and V are column-orthogonal matrix and D is a diagonalmatrix.

Image Compression: Discard the trailinginsignificant singular values and keep the firstr (where r < k) singular values

5

Tm n m k k k n kM U D V

Tm n m r r r n rM U D V

Page 6: Image Crtptosystem-Mtech Thesis

Secure Communication

6

Encryption Key(K) Decryption Key(K)

Plain textCipher text

(Open Channel)

Enemy or

Adversary

Alice Encryption Decryption Bob

Plain text

Eve

Page 7: Image Crtptosystem-Mtech Thesis

7

The Proposed

Technique(Encoding)

Page 8: Image Crtptosystem-Mtech Thesis

Encoding

8

SVD

XOR

Key Formation

Page 9: Image Crtptosystem-Mtech Thesis

Proposed Algorithmic Steps for EncodingBeginStep 1: Decompose input secret image into three matrices U, D and

V respectively.Step 2: Select first r number of column vectors from each

decomposed matrix and discard rest of the column vectors.Step 3: Use truncated matrix, Vr obtained from Step 2 to generate a

key matrix.Step 4: Perform XOR operation between the produced key matrix

and the truncated matrix, Ur obtained from step 2.End

Page 10: Image Crtptosystem-Mtech Thesis

Decoding

10

XOR

Key Formation

T

r r rU D V

Page 11: Image Crtptosystem-Mtech Thesis

Algorithmic Steps (Decoding)

BeginStep 1: Generate a key matrix from the matrix Vr

using a secret PNS.Step 2: Perform XOR operation between the

produced key matrix and the matrix, EUr.Step 3: Reconstruct the image using the following

equationEnd

T

r r rU D V

Page 12: Image Crtptosystem-Mtech Thesis

12

Experimental Results

(b) Pepper Image(a) Lena Image

Original Test Images

Page 13: Image Crtptosystem-Mtech Thesis

Contd..(Experimental Results on Test Image Lena)

Decrypted ImageEncrypted image

Page 14: Image Crtptosystem-Mtech Thesis

Contd..(Experimental Results on Test Image Pepper)

Decrypted ImageEncrypted image

Page 15: Image Crtptosystem-Mtech Thesis

Security Analysis

The security of any encryption algorithm is measured bythe size of the key space.

In the proposed cryptosystem the secrecy depends on theselection of secret PNS.

In our experiment we have taken a PNS of length 65536.

The PNS guessing in our scheme is practically infeasiblebecause there will be one optimal PNS out of totalpossible 65536! PNSs.

Page 16: Image Crtptosystem-Mtech Thesis

Conclusions

In the proposed scheme, SVD is applied onthe secret image for compression andsubsequently the compressed files are partiallyencrypted for ensuring confidentiality.The proposed scheme reduces overallcomputation cost for encryption of the secretimage.The proposed scheme has been simulatedusing MATLAB and the satisfactory results havebeen found.

Page 17: Image Crtptosystem-Mtech Thesis

References1. William Stallings, “Cryptography and Network Security: Principles and Practices”,

Pearson Education, Inc., Fourth Edition (2007).

2. M.S. Hwang, C. C. Chang and T. S. Chen, “A new encryption algorithm for image

cryptosystems”, The Journal of Systems and Software, vol 58. pp. 83–91 (2001).

3. A. K. Pal, G. P. Biswas and S. Mukhopadhyay, “Designing of High-Speed Image

Cryptosystem Using VQ Generated Codebook and Index Table”, 2010

International Conference on Recent Trends in Information, Telecommunication and

Computing. pp. 39-43 (2010).

4. H. K. Chang and J. L. Liu, “A linear quadtree compression scheme for image

encryption”, Signal Processing: Image Communication. pp. 279-290 (1997).

5. L. Chuanfeng and Z. Qiangfu, “Integration of data compression and cryptography:

Another way to increase the information security”, 21st International Conference

on Advanced Information Networking and Applications Workshops (AINAW’07)

(2007).

6. H. K. Azman and Z. Zurinahni, “Enhance performance of secure image using

wavelet compression”, World Academy of Science, Engineering and Technology

(2005).

Page 18: Image Crtptosystem-Mtech Thesis

7. A. Greso, R. M. Gray, “Vector Quantization and Signal Compression”, Kluwer

Academic Publishers, Boston, MA (1991).

8. I.T. Jolliffe, “Principal Component Analysis”, Springer, second edition (2002).

9. Marc Antonini, Michel Barlaud, Pierre Mathieu and Ingrid Daubechies, “Image

coding using wavelet transform”, IEEE Transactions on Image Processing, Vol. 1

no. 2, pp 205–220, (1992).

10.Dan Kalman, “A singularly valuable decomposition”, The College Mathematics

Journal, Vol. 27 no. 1, pp 2–23, (1998).

11.J. F. Yang and C. L. Lu, “Combined techniques of singular value decomposition

and vector quantization for image coding”, IEEE Transactions on Image

Processing, vol.4, no.8, p.1141-1146, Aug. (1995).

12.C. S. McGoldrick, W. J. Dowling and A. Bury, “Image coding using the singular

value decomposition and vector quantization” Fifth International Conference on

Image Processing and its Applications, p.296-300. IEE, (1995).

13.P. Waldemar and T. A. Ramstad, “Hybrid KLT-SVD image compression”, 1997

IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.

4, pp. 2713-2716, (1997).

Contd..

Page 19: Image Crtptosystem-Mtech Thesis
Page 20: Image Crtptosystem-Mtech Thesis