Image compression and encryption scheme via satellite

Similar documents
DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Cryptography and Network Security

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

A comprehensive survey on various ETC techniques for secure Data transmission

Implementation of Full -Parallelism AES Encryption and Decryption

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

How To Encrypt With A 64 Bit Block Cipher

Implementation and Design of AES S-Box on FPGA

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Cryptography and Network Security Chapter 3

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Table of Contents. Bibliografische Informationen digitalisiert durch

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

The Advanced Encryption Standard: Four Years On

Evolution of Satellite Communication Systems

How To Encrypt Data With A Power Of N On A K Disk

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

SCAN-CA Based Image Security System

Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013

Image Compression through DCT and Huffman Coding Technique

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

encoding compression encryption

Cryptography and Network Security Block Cipher

Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay

Cyber Security Workshop Encryption Reference Manual

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska

A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION

Satellite Telemetry, Tracking and Control Subsystems

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

AES Power Attack Based on Induced Cache Miss and Countermeasure

Split Based Encryption in Secure File Transfer

An Application of Visual Cryptography To Financial Documents

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS

Safer data transmission using Steganography

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images

Properties of Secure Network Communication

Triple Security of Information Using Stegnography and Cryptography

A Study of New Trends in Blowfish Algorithm

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

CSCE 465 Computer & Network Security

The Advanced Encryption Standard (AES)

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

Hill s Cipher: Linear Algebra in Cryptography

Performance Analysis of medical Image Using Fractal Image Compression

EXAM questions for the course TTM Information Security May Part 1

Keywords Web Service, security, DES, cryptography.

Solutions to Problem Set 1

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

The Analysis of DVB-C signal in the Digital Television Cable Networks

IJESRT. [Padama, 2(5): May, 2013] ISSN:

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Using fractal compression scheme to embed a digital signature into an image

Introduction to Hill cipher

CS 758: Cryptography / Network Security

DIRECT TO HOME TELEVISION (DTH)

Chapter 23. Database Security. Security Issues. Database Security

Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES

Network Security Technology Network Management

A STUDY OF DES ALGORITHM WITH CELLULAR AUTOMATA

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Using Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94

Keywords: Double layered blowfish encryption, chaotic-map based pixel abstraction, image security, encryption, blowfish.

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM

Data Storage 3.1. Foundations of Computer Science Cengage Learning

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.

Security Evaluation of Robust Chaotic Block Cipher

A Novel Security Scheme for Secret Data using Cryptography and Steganography

Symmetric Key cryptosystem

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x

Lecture 2 Outline. EE 179, Lecture 2, Handout #3. Information representation. Communication system block diagrams. Analog versus digital systems

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Video compression: Performance of available codec software

Enhancing High-Speed Telecommunications Networks with FEC

Research on the UHF RFID Channel Coding Technology based on Simulink

Analysis of Compression Algorithms for Program Data

Multi-factor Authentication in Banking Sector

THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS

A NEW DNA BASED APPROACH OF GENERATING KEY- DEPENDENTMIXCOLUMNS TRANSFORMATION

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

ECE 842 Report Implementation of Elliptic Curve Cryptography

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A Novel Cryptographic Key Generation Method Using Image Features

Transcription:

Article Image compression and encryption scheme via satellite Journal of Vibration and Control 2016, Vol. 22(13) 3118 3122! The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalspermissions.nav DOI: 10.1177/1077546314559295 jvc.sagepub.com Azkar Hussain Abstract Satellite communication systems are now designed according to an outdated Shannon information theory where all data is transmitted in meaningless bit streams. In this article, a novel noise free digital image communication via satellite has been developed. The proposed scheme is based on fractional compression and a new block cipher cryptosystem based on S 8 substitution boxes transformation. The fractal compression technique is selected to compress the aerial images due to its high compression capability. The fractal image compression of the input aerial image is the first stage in the encoding phase. The fractal compression technique divides the original image into two different block sizes called range and domain blocks. The best match between the range and domain blocks is known as the transformation mapping. All the transformation mappings are recorded as the output-compressed file of the input aerial image. Keywords Cryptosystem, fractal compression, satellite communication, S-box transformation 1. Introduction In 1962, the American telecommunications giant AT&T launched the world s first true communications satellite, called Telstar. Since then, countless communications satellites have been placed into the earth s orbit, and the technology being applied to them is forever growing in sophistication. The satellite itself is also known as the space segment, and is composed of three separate units, namely the fuel system, the satellite and telemetry controls, and the transponder. The satellite model is shown in Figure 1. The transponder includes the receiving antenna to pick-up signals from the ground station, a broadband receiver, an input multiplexer, and a frequency converter, which is used to reroute the received signals through a high-powered amplifier for downlink. The primary role of a satellite is to reflect electronic signals. In the case of a telecom satellite, the primary task is to receive signals from a ground station and send them down to another ground station located a considerable distance away from the first. This relay action can be two-way, as in the case of a long distance phone call. Another use of the satellite is when, as is the case with television broadcasts, the ground station s uplink is then downlinked over a wide region, so that it may be received by many different customers possessing compatible equipment. Still another use for satellites is observation, wherein the satellite is equipped with cameras or various sensors, and it merely downlinks any information it picks up from its vantage point. Fractal compression is a very good compression method for digital images, based on fractals. The method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. Fractal algorithms convert these parts into mathematical data called fractal codes which are used to recreate the encoded image. Therefore, fractal image compression offers some interesting features which makes it an interesting candidate image compression technique for aerial images such as: resolution-independent, fast decoding and good image quality at low bit-rates. The concept of fractal was introduced by Hutchinson (2001) as an alternative to the traditional Euclidean geometry, mainly dealing with shapes generated by nature. In the recent years, (Anees et al., 2013; 2014; Hussain, 2013; Hussain and Shah, 2013; Hussain et al., 2013a,b,c,d,e,f,g; 2014; Jamal et al., 2013; Shah et al., 2013; Hussain and Gondal, 2014) proposed very interesting encryption algorithms. Iterated function Department of Electrical Engineering, HITEC University, Taxila, Pakistan Received: 19 May 2014; accepted: 29 May 2014 Corresponding author: Azkar Hussain, Federal Urdu University Islamabad Islamabad, Pakistan. Email: azkarhussain3@gmail.com

Hussain 3119 decryption from Section 2. In Section 4, the security analyses are presented and Section 5 is about the conclusion of the proposed work. Figure 1. Satellite communication general model. system (IFS) has been used to generate and describe manmade fractal-like structures and natural images. Barnsley and Alan (2008) were the first to present the concept of fractal image compression using IFS. A fully automatic image compression algorithm for real-world gray-scale images called fractal block coding (FBC) was proposed by Jacquin (2010). Many important research results on this topic are collected in Fisher (2004). Sayood (2005) indicated that the main point of FBC is that it can capture and exploit a special kind of image redundancy: piecewise self-similarity in images, which is not used in traditional image coding techniques. In general, the natural images are not exactly self-similar thus some transformations are needed to reconstruct the image from transformed parts of itself. The fractal code of the image is actually the collection of these transformations, which are called fractal transformations. Since fewer bits of the fractal transformations can represent the original image, high compression ratios can be achieved. On the other hand, the fractal compressed image is encrypted by a S 8 advanced encryption scheme (SAES) as the second encoding stage of the proposed scheme. The advanced encryption standard (AES) belongs to the symmetric-key encryption techniques and works with linear transformation theory. The SAES algorithm is applied on the fractal transformations to achieve the required goal: secured compressed aerial images. The paper is organized as follows. In Section 2, the proposed encryption and decryption scheme is presented. Section 3 consists of the projected communication algorithm, which incorporates encryption and 2. Proposed communication system The encryption process relies on the use of nonlinear mapping subsystems to create confusion in the cipher text. The design of these nonlinear components is a challenging task and requires complex algebraic expression for their description. In an effort to increase the complexity of nonlinear mappings, several implementations exhibiting interesting properties are proposed in the literature. In particular, an affine-power-affine (APA) structure is designed for the AES, which improves the complexity of its algebraic expression by increasing the number of terms. Based on the characteristics of the APA structure, a new nonlinear component is proposed that uses the symmetric group permutation S 8 on the Galois field GF(2 8 ) elements and provides the possibility to incorporate 40320 unique instances. A rigorous analysis is presented in Hussain et al. (2012) to evaluate the properties of these new nonlinear components by applying nonlinearity analysis, linear approximation analysis, differential approximation analysis, bit independence criterion and a strict avalanche criterion. 2.1. Construction of S 8 Affine-power-affine S-boxes The S 8 APA S-boxes are constructed with the application of S 8 (symmetric group) permutation on the existing elements in binary form. The bytes are independently processed, and the transformation to the new S-box exhibits nonlinear properties. The resulting number of S-boxes is 40320 with different properties. The process of creating new S-boxes is shown in Hussain et al. (2012). The mathematical representation of the S 8 transformation process is given as: f : S 8 APAS box! S 8 APAS box: 2.2. Fractal image compression stage Fractal image compression exploits similarities within images. These similarities are described by a contractive transformation T of the image whose fixed point is close to the image itself. A transformation T is called contractive if the distance d between two arbitrary points X, Y is becoming smaller after applying T to them: d ðx, YÞ d ðtðxþ, TðYÞÞ

3120 Journal of Vibration and Control 22(13) Figure 2. One round of image encryption. Figure 3. One round of image encryption. The image transformation consists of block transformations, which approximate smaller parts of the image by larger ones using contractive affine transforms (Cormode et al., 2011). The smaller parts are called ranges and the larger ones are domains. Each range forms a partition of the image while the total ranges (range-pool) represent the whole image. 2.3. Proposed encryption and decryption scheme The encryption scheme is a modified version of the AES. In this algorithm changes are induced in the byte sub-step of AES by introducing S 8 8*8 APA S-boxes of Section 2.1, to improve the statistical analysis of the encrypted image. The method is explained in Figure 2. The process begins with the add round key step, after that byte sub transformation is applied together Figure 4. Generalized flow chart of proposed technique. with an application of 40320 S 8 APA on plaintext data. The byte sub-step is necessary to induce confusion in the data. Now this data will pass from the shift row and mixed column step to induce diffusion in the data, because according to Shannon theory the confusion

Hussain 3121 Table 1. Value of UACI and NPCR for ciphered Baboon image. Position 1 256 512 32767 32768 64769 65281 65536 UACI 0.3261 0.3261 0.3264 0.3259 0.3253 0.3261 0.3255 0.3262 NPCR 0.9866 0.9881 0.9864 0.9873 0.9899 0.9893 0.9899 0.9868 UACI: unified average changing intensity; NPCR: number of pixels change rate. and diffusion steps are necessary to encrypt and image. The basic mechanism of all steps such as byte sub, shift row, mixed column and add round key, are the same as in the AES, so here S 8 APA S-boxes are introduced in the byte sub-step. Now for the decryption process the author will move in reverse order to get the plaintext image of the decryption scheme which is explained in Figure 3. 2.4. Proposed algorithm The proposed algorithm consists of the following steps: Step 1. Consider plaintext image. Step 2. Apply fractional compression on plaintext image. Step 3. In this stage, apply the encryption scheme which is proposed in Section 2.3. Step 4. A cipher text image will be obtained from which insecure lines of communication from the satellite can be sent to the ground. Now for the decryption process the author will move in the reverse order and will get the original image. The scheme is explained in Figure 4. 2.5. Sensitivity analysis The average density between two images can be measured by unified average changing intensity (UACI) (Shatheesh et al., 2012). Two plain images differ in that they are different in only one pixel which can be encrypted and combined to obtain cipher images CA and CB. In this case UACI can be represented as: UACI ¼ 1 M N XMN i¼1 jca i cb i j 255 In the above mentioned equation ca i and cb i are the ith pixels of the cipher image. If an eight-bit is taken, the value of UACI comes out to be 0.3446. For experimenting purposes a set of eight different pixels have been chosen, yet one at a time, changing their value slightly by one. As shown in Table 1, all values of UACI in the second row are very close to ideal value. NPCR (Zhou and Liao, 2012), is a relatively better indicator of sensitivity of the algorithm corresponding to image encryption i.e. the change in the pixels of the cipher image if one of the pixels from the plain image is changed. The NPCR can be calculated by: NPCR ¼ # ica i 6¼ cb i M N For an ideal image encryption algorithm, NPCR is usually expected to turn out as 1 2 8 (about 0.9961). During experimentation, around eight unique pixels are randomly chosen in each plain image and slightly altered their value. In Table 1, the values of NPCR are presented in the third row, all of which are close to 0.9961. 3. Conclusions There is, therefore, a good image encryption algorithm as shown in Table 1. The value of NPCR and UACI analysis of the proposed algorithm are very close to the optimal value. Furthermore, this algorithm provides an extra confusion due to chaotic substitution box transformation. This algorithm directly hits the S-P network idea of Shannon due to the permutation and substitution operation. Funding This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors. References Anees A, Khan WA, Gondal MA and Hussain I (2013) Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption. Z. Naturforsch Journal of Physical Sciences 68a: 567 572. Anees A, Siddiqui AM, Ahmed J and Hussain I (2014) A technique for digital steganography using chaotic maps. Nonlinear Dynamics 75: 807 816. Barnsley M and Alan D (2008) A better way to compress images Byte. Cormode G, Paterson M, Sahinalp SC and Vishkin U (2011) Communication complexity of document exchange. In Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA, Jan. 23 25, pp. 197 206. Fisher Y (2004) Fractal Image Compression - Theory and Application. New York: Springer-Verlag.

3122 Journal of Vibration and Control 22(13) Hussain I (2013) A novel approach of audio watermarking based on S-box transformation. Mathematical and Computer Modelling 57: 963 969. Hussain I and Gondal MA (2014) An extended image encryption using chaotic coupled map and S-box transformation. Nonlinear Dynamics DOI: 10.1007/s11071-013-1214-z. Hussain I and Shah T (2013) Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics 74: 869 904. Hussain I, Azam NA and Shah T (2014) Stego optical encryption based on chaotic S-box transformation. Optics & Laser Technology 61: 50 56. Hussain I, Shah T and Gondal MA (2013a) Application of S- box and chaotic map for image encryption. Mathematical and Computer Modelling 57: 2576 2579. Hussain I, Shah T and Gondal MA (2013b) A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing & Application 23: 97 104. Hussain I, Shah T and Mahmood H (2013c) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Computing & Application 22: 1085 1093. Hussain I, Shah T, Gondal MA and Mahmood H (2012) S8 affine-power-affine S-boxes and their applications. Neural Computing & Application 21: S377 S383. Hussain I, Shah T, Gondal MA and Mahmood H (2013d) A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence. Nonlinear Dynamics 73: 633 637. Hussain I, Shah T, Gondal MA and Mahmood H (2013e) Efficient method for designing chaotic S-boxes based on generalized Baker s map and TDERC chaotic sequence. Nonlinear Dynamics 74: 271 275. Hussain I, Shah T, Gondal MA and Mahmood H (2013f) A novel image encryption algorithm based on chaotic maps and GF(2^8) exponent transformation. Nonlinear Dynamics 72: 399 406. Hussain I, Shah T, Gondal MA and Mahmood H (2013g) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dynamics 71: 133 140. Hutchinson J (2001) Fractals and self-similarity. Indiana University Mathematics Journal. Jacquin AE (2010) Image coding based on a fractal theory of iterated contractive image transformations. IEEE Transaction on Image Processing Vol. 1, no. 1. Jamal SS, Shah T and Hussain I (2013) An efficient scheme for digital watermarking using chaotic map. Nonlinear Dynamics 73: 1469 1474. Sayood K (2005) Introduction to Data Compression, 3rd edn. San Francisco, CA: Morgan Kaufmann, pp. 560 569. Shah T, Qamar A and Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a Galois ring. Z. Naturforsch Journal of Physical Sciences 68a: 479 482. Shatheesh S, Devaraj I and Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69: 1995 2007. Zhou Q and Liao X (2012) Collision-based Fexible image encryption algorithm. Journal of System and Software 85: 400 407.