Neural_Network-Based_Stream_Image_Encryption (1)
Neural_Network-Based_Stream_Image_Encryption (1)
net/publication/259645958
CITATION READS
1 1,537
3 authors:
Mohammed Al-Jammas
Ninevah University
17 PUBLICATIONS 30 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mohammed Al-Jammas on 19 February 2014.
Karam M. Z. Othman
Electronic Technical Department
Al Dour Technical Institute,
Foundation of Tech. Education,
Tikrit, Iraq, [email protected]
2.0 The Modified Stream Image In Figure 1, each pixel is encrypted individually.
The RGB (red, green, blue) value of the pixel is
Encryption Technique
read and changed into 24-bit binary number (8-
bits each). The 24 bits image pixel is appended
The paper adopts an image encryption technique
with 8 bits and left shifted 10 times to form 32
proposed by Kaushik and et al (Lala and Sami,
primary ciphered pixel (Xi). The output of this
2009).. The algorithm is called Stream
stage is XORed with 32 bits secondary key (SKi)
Encryption Standard (SES). It is a symmetric
to form the intermediate ciphered pixel. The
stream cipher that encrypts each colored pixel
primary key is XORed with the intermediate
using the principle of stream cipher of random
ciphered pixel (Xi) to form Yi. Removing the
key and special functions as shown in Fig. 1.
initial 8 bits from the last output will give the 24
Since it is symmetric, the same key will be used
bits colored encrypted pixel. The previous
for both encryption and decryption with certain
operations are repeated for all digital image
caution in key transfer from the sending end to
pixels (512 * 348 pixels). The 32 random bits
the receiving end. Algorithm uses same key at
(SKi and PKi) are generated using Neural
both sending and receiving ends to resolve the
Network Pseudo Random Bits (NNPRB)
problem of key distribution. A modified version
generator. Details about the proposed NNPRB
of the SES algorithm is adopted in this paper to
will be given in next section.
further extend its ability to stand against brute
The encrypted pixel can be decrypted in the in
force attacks. This is because the SES encryption
reverse order of the encryption process described
key is altered many times during the encryption
earlier. This will ensure the symmetric
process. The modified version adopted here
encryption process. In the decryption process
keeps this feature and adds more to it in order to
shown in Figure 2, the encrypted 24 bits pixel at
make the problem of guessing the original
the output of the encryption process will be the
image, harder even if an attacker knows one
input for the decryption process. In figure 2, the
decryption key. Furthermore, the SES provides
same 24 bits is used but with the same seed
protection against high redundancy of color
integer to provide the synchronization required
images (Lala and Sami, 2009).This is very
to achieve the same generated random sequence
essential feature and need to be considered in
used in the encryption process primary key. This
any encryption algorithm and have been
step will be repeated 10 times as performed
maintained in the SES. The proposed algorithm
previously in the encryption process. The output
under investigation in this paper is a modified
from the last step is XORed with the 32 bits
version of the SES and that is why it is called
secondary key and right shifted 10 times to give
MSES. The MSES uses the architecture
the output Xi.
proposed by the SES with neural network
approach in key generation and slight
modification in key usage.
(212) is obtained. Figure. 4. shows the modified
stream Image encryption structure.
4000
Frequency 0 0 0
3000
Serial -1.9988 -1.9988 -1.9968
Poker 6.3875 4.3245 6.3875 2000
The results shown in Table 1, clearly verified the Figure 7. The histogram of R-layer of original
randomness satisfaction of all the generated Image
keys. This is because the generators passed the
randomness test recommend [Andrew et al, 1800
7000
6000
5000
4000
3000
2000
1000
1000
800
600
400
200
5000
4000
3000
Figure 13 Samples of intensity values of RGB
2000 original image
1000
1800
1600
1400
1200
1000
800
600
400
200