skip to main content

Performance analysis of gray code number system in image security

1Department of Computer Science, College of Communication and Information Technology, Kwara State University, Nigeria

2Department of Physical and Mathematical Sciences, Faculty of Science, Crown Hill University, Nigeria

3Department of Computer Science, Abo Akademi University, Finland

Received: 16 Feb 2019; Revised: 20 Aug 2019; Accepted: 5 Sep 2019; Available online: 3 Oct 2019; Published: 31 Oct 2019.
Open Access Copyright (c) 2019 Jurnal Teknologi dan Sistem Komputer
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
The encryption of digital images has become essential since it is vulnerable to interception while being transmitted or stored. A new image encryption algorithm to address the security challenges of traditional image encryption algorithms is presented in this research. The proposed scheme transforms the pixel information of an original image by taking into consideration the pixel location such that two neighboring pixels are processed via two separate algorithms. The proposed scheme utilized the Gray code number system. The experimental results and comparison shows the encrypted images were different from the original images. Also, pixel histogram revealed that the distribution of the plain images and their decrypted images have the same pixel histogram distributions, which means that there is a high correlation between the original images and decrypted images. The scheme also offers strong resistance to statistical attacks.
Keywords: Gray code number system; spatial domain; image encryption
Funding: Kwara State University, Nigeria; Crown Hill University, Nigeria; Abo Akademi University, Finland

Article Metrics:

  1. A. N. Babatunde, “Methodology for Image Cryptosystem Based on Gray Code Number System,” Computing and Information Systems Journal, vol. 23, no. 2, pp. 1-10, 2019
  2. S. Alhassan, “Enhancement of security of digital image using the moduli sets,” thesis, University of Development Studies, Ghana, 2013
  3. O. Oshodi, “Gray code number system based digital image cryptosystem,” thesis, College of Information and Communication Technology, Kwara State University, Nigeria, 2018
  4. P. D. Oyinloye and K. A. Gbolagade, “An improved image scrambling algorithm using {2n -1, 2n, 2n +1},” Computing and Information Systems Journal, vol. 22, no. 3, pp. 1-7, 2018
  5. S. Alhassan and K. A. Gbolagade, “Enhancement of security of digital image using the moduli set (2n-1, 2n, 2n-1),” International Journal of Advanced Research in Computer Engineering and Technology, vol. 2, no. 7, pp. 2223-2229, 2013
  6. S. Alhassan, “Enhancement of security of digital image using the moduli sets,” thesis, University of Development Studies, Ghana, 2013
  7. H. Darshana and S. Parinder, “A comprehensive survey of video encryption algorithms,” International Journal of Computer Applications, vol. 59, no. 1, pp. 14-19, 2012. doi: 10.5120/9512-3902
  8. W. Puech, Z. Erkin, M. Barni, S. Rane, and R. L. Lagendijk, “Emerging cryptographic challenges in image and video processing,” in 19th IEEE International Conference on Image Processing, Orlando, USA, Oct. 2012, pp. 2629-2632. doi: 10.1109/ICIP.2012.6467438
  9. V. Potdar and E. Chang, ”Disguising text cryptography using image cryptography,” in 4th International Network Conference, Plymouth, UK, Jul. 2004
  10. A. N. Babatunde, R. G. Jimoh, and K. A. Gbolagade, “An algorithm for a residue number system based video encryption system,” Computer Science Series Journal, vol. 14, no. 2, pp. 136-147, 2016
  11. A. Abdul-Barik, “Enhancement of the security and compression of the Lempel-Ziv-Welch’s algorithm using residue number system for efficient transmission via network communication channels,” thesis, University of Development Studies, Ghana, 2016
  12. Y. Zhou, K. Panetta, S. Agaian, and P. C. Chen, “(n, k, p)-Gray Code for Image Systems,” IEEE Transactions on Cybernetics, vol. 42, no. 2, pp. 515-529, 2013. doi: 10.1109/TSMCB.2012.2210706
  13. A. Ahmad and F. Bait-Shiginah, “A nonconventional approach to generating efficient binary gray code sequences,” IEEE Potentials, vol. 31, no. 3, pp. 16-19, 2012. doi: 10.1109/MPOT.2011.2178193
  14. I. Nasir, W. Ying, and J. Jianmin, “A new robust watermarking scheme for color image in spatial domain,” in 3rd International IEEE Conference Signal-Image Technologies and Internet-Based System, Shanghai, China, Dec. 2007, pp. 942–947. doi: 10.1109/SITIS.2007.67
  15. H. W. Tseng and C. C. Chang, “Anti-pseudo-gray coding for VQ encoded images over noisy channels,” IEEE Communication Letters, vol. 11, no. 5, pp. 443-445, 2007. doi: 10.1109/LCOMM.2007.070074
  16. W. S. Chen, K. H. Chih, S. W. Shih, and C. M. Hsieh, “Personal identification technique based on human IRIS recognition with wavelet transform,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, USA, Mar. 2005, pp. 949-952. doi: 10.1109/ICASSP.2005.1415563
  17. S. Erturk, “Locally refined Gray-coded bit-plane matching for block motion estimation,” in 3rd International Symposium on Image and Signal Processing and Analysis, Rome, Italy, Sept. 2003, pp. 128–133. doi: 10.1109/ISPA.2003.1296881
  18. W. Ding, W. Yan, and D. Qi, “Digital image scrambling,” Progress in Natural Science, vol. 11, no. 6, pp. 454-460, 2001
  19. S. J. Ko, S. H. Lee, S. W. Jeon, and E. S. Kang, “Fast digital image stabilizer based on Gray-coded bit-plane matching,” IEEE Transactions on Consumer Electronics, vol. 45, no. 3, pp. 598–603, 1999. doi: 10.1109/30.793546
  20. J. Ludman, “Gray code generation for MPSK signals,” IEEE Transmission Communication, vol. 29, no. 10, pp. 1519–1522, 1981. doi: 10.1109/TCOM.1981.1094886
  21. M. B. Younes and J. Aman, “An image encryption approach using a combination of permutation technique followed by encryption,” International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 191-197, 2008
  22. T. Gao and Z. Chen, “Image encryption based on a new total shuffling algorithm,” Chaos, Solitons & Fractals, vol. 38, no. 1, pp. 213-220, 2008. doi: 10.1016/j.chaos.2006.11.009
  23. Y. Shen, G. Zhang, X. Li, and Q. Liu, “An improved image encryption method based on total shuffling scheme,” in Advances in Computer Science and Information Engineering, Springer- Verlag, 2012, pp. 643-650
  24. R. -G. Zhou, Y. J. Sun, and P. Fan, “Quantum image Gray-code and bit-plane scrambling,” Quantum Information Processing, vol. 14, pp. 1717-1734, 2015
  25. T. Sivakumar and R. Venkatesan, “A new image encryption method based on knight’s travel path and true random number,” Journal of Information Science and Engineering, vol. 32, pp. 133-152, 2016
  26. N. K. Pareek, “Knight’s tour application in digital image encryption,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 9, pp. 208-213, 2015
  27. K. Gupta, R. Gupta, R. Agrawal, and S. Khan, “An ethical approach of block based image encryption using chaotic map,” International Journal of Security and Its Applications, vol. 9, no. 9, pp. 105-122, 2015. doi: 10.14257/ijsia.2015.9.9.10
  28. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926-934, 2006. doi: 10.1016/j.imavis.2006.02.021
  29. H. T. Panduranga and S. K. Naveen, “A novel image encryption approach using B2g And G2b code conversion technique,” International Journal on Computer Engineering and Information Technology, vol. 1, no. 1, 2009
  30. K. Brindha, R. Sharma, and S/ Saini, “Use of symmetric algorithm for image encryption,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 5, pp. 4401- 4407, 2014
  31. A.B.Y. Mohammad, and J. Aman, “Image encryption using block-based transformation algorithm,” IAENG International Journal of Computer Science, vol. 35, no. 1, 2008
  32. A. Musheer and A.M. Shamsher, “A new algorithm of encryption and decryption of images using chaotic mapping,” International Journal on Computer Science and Engineering, vol. 2, no. 1, pp. 46-50, 2009
  33. A. S. Rathore, K. Patidar, and G. S. Chandel, “A review on recent trends in image encryption techniques,” International Journal of Engineering Technology and Applied Science, vol. 2, no. 5, 2016
  34. W. Auyporn, and S. Vongpradhip, “A robust image encryption method based on bit plane decomposition and multiple chaotic maps,” International Journal of Signal Processing System, vol. 3, no. 1, pp. 8-13, 2015
  35. A. Nag et al., “Image encryption using affine transform and xor operation,” in International Conference on Signal Processing, Communication, Computing and Networking Technologies, Thuckafay, India, Jul. 2011, pp. 309-312. doi: 10.1109/ICSCCN.2011.6024565
  36. A. Goel and N. Chandra, “A technique for image encryption with combination of pixel rearrangement scheme based on sorting group-wise of RGB values and explosive inter-pixel displacement,” International Journal of Image, Graphics and Signal Processing, vol. 4, no. 2, pp. 16-22, 2012. doi: 10.5815/ijigsp.2012.02.03
  37. P. K. Naskar and A. Chaudhuri, “A secure symmetric image encryption based on bit-wise operation,” International Journal of Image, Graphics and Signal Processing, vol. 6, no. 2, pp. 30-38, 2014. doi: 10.5815/ijigsp.2014.02.04
  38. P. S. Ghode, P. P. Patil, V. Nayyar, and S. Moghe, “A keyless approach to lossless image encryption,” International Journal of Advanced Research in Science, vol. 4, no. 5, pp. 1459- 1467, 2014
  39. R. Liu, “New binary image encryption algorithm based on combination of confusion and diffusion,” Journal of Chemical and Pharmaceutical Research, vol. 6, no. 7, pp. 621-629, 2014
  40. A. Singh and N. Dhanda, “DIP using image encryption and xor operation affine transform,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 17, no. 2, pp. 07-15, 2015
  41. A. Mitra, Y.V.R. Subba and S.R.M Prasanna, “A new image encryption approach using combinational permutation techniques,” International Journal of Electrical and Computer Engineering, vol. 1, no. 2, pp. 127-131, 2006
  42. B. A. Weyori, P. N. Amponsah, and P.K. Yeboah, “Modeling a secured digital image encryption scheme using a three moduli set,” Global Journal of Computer Science and Technology Interdisciplinary, vol. 12, no. 10, 2012
  43. D. Chattopadhyay, M.K. Mandal and D. Nandi, “Symmetric key chaotic image encryption using circle map,” Indian Journal of Science and Technology, vol. 4, no. 5, pp. 593-599, 2011
  44. K. Struss, “A chaotic image encryption,” in Mathematics Senior Seminar, University Minnesota, USA, 2009, pp. 1-19
  45. K. -L. Chung and L. -C. Chang, “Large encrypting binary images with higher security,” Pattern Recognition Letters, vol. 19, no. 43, section 4, pp. 461-468, 1998. doi: 10.1016/S0167-8655(98)00017-8
  46. S. Li-Ping, Q. G. Zheng, H. Hong-Jiang, and H. Xing-Chen, “2D triangular mappings and their applications in scrambling rectangle image,” Information Technology Journal, vol. 7, no. 1, pp. 40-47, 2008. doi: 10.3923/itj.2008.40.47
  47. Z. Linhua, L. Xiaofeng, and W. Xuebing, “An image encryption approach based on chaotic maps,” Chaos, Solitons and Fractals, vol. 24, no. 3, pp. 759–765, 2005. doi: 10.1016/j.chaos.2004.09.035
  48. M. Salleh, S. Ibrahim, and I. F. Isnin, “Image encryption algorithm based on chaotic mapping,” Jurnal Teknologi, vol. 39, no. 1, pp. 1-12, 2003. doi: 10.11113/jt.v39.458
  49. M. Mishra, P. Mishra, M.C. Adhikary, and S. Kumar, “Image encryption using fibonacci-lucas transformation,” International Journal on Cryptography and Information Security (IJCIS), vol.2, no. 3, pp. 131-141, 2012
  50. S. S. Yadav, Y. Singh, and S. K. Sriwas, “Gray code (n, k, p) based pixel substitution and affine transform based gray code bit plane permutation technique for secure image encryption,” ARPN Journal of Engineering and Applied Sciences, vol. 12, no. 11, pp. 3500-3508, 2017
  51. S. S. Yadav, Y. Singh, and S. K. Sriwas, “Hybrid image encryption technique to improve the security level by using (n, k, p) gray code and xor operation,” Indian Journal of Science and Technology, vol. 10, no. 20, pp. 1-9, 2017. doi: 10.17485/ijst/2017/v10i20/113180
  52. S. Al-Maadeed, A. Al-Ali, and T. Addalla, “A new chaos-based image-encrytion and compression algorithm,” Journal of Electrical and Computer Engineering, vol. 2012, pp. 1-11, 2012. doi: 10.1155/2012/179693
  53. J. Yang, “Algorithm of image information hiding based on new anti-arnold tranform and blending in DCT,” in IEEE 12th International Conference on Communication Technology, Nanjing, China, Nov. 2010, pp. 312-315. doi: 10.1109/ICCT.2010.5689227

Last update:

  1. Enhanced image security using residue number system and new Arnold transform

    Akinbowale Nathaniel Babatunde, Afeez Adeshina Oke, Abdulkareem Ayopo Oloyede, Aisha Oiza Bello. Jurnal Teknologi dan Sistem Komputer, 9 (4), 2021. doi: 10.14710/jtsiskom.2021.14038

Last update: 2024-06-23 17:34:42

No citation recorded.