Performance Analysis of Gray Code Number System in Image Security

*Akinbowale Nathaniel Babatunde -  Department of Computer Science, College of Communication and Information Technology, Kwara State University, Nigeria
Ebunayo Rachael Jimoh -  Department of Physical and Mathematical Sciences, Faculty of Science, Crown Hill University, Nigeria
Oladipupo Oshodi -  Department of Computer Science, College of Communication and Information Technology, Kwara State University, Nigeria
Olujuwon Ayoseyi Alabi -  Department of Computer Science, Abo Akademi University, Finland
Received: 16 Feb 2019; Revised: 20 Aug 2019; Accepted: 5 Sep 2019; Published: 31 Oct 2019; Available online: 3 Oct 2019.
Open Access Copyright (c) 2019 Jurnal Teknologi dan Sistem Komputer
Citation Format:
Article Info
Section: Articles
Language: EN
Statistics: 35

Abstract
Owing to the rapid developments in multimedia technology, the encryption of digital images has become essential since it is vulnerable to interception while being transmitted or stored. A new image encryption algorithm to address the security challenges of traditional image encryption algorithms is presented in this research. The proposed scheme transforms the pixel information of an original image by taking into consideration the pixel location such that two neighboring pixels are transformed via two separate algorithms. The proposed scheme utilizes gray code number system and was implemented using Java programming language. The experimental results and comparison shows the encrypted images were different from the original images. Also, pixel histogram revealed that the distribution of the plain images and their decrypted images have the same pixel histogram distributions which means that there is a high correlation between the original images and decrypted images. The scheme also offers strong resistance to statistical attacks.
Keywords
Gray-code number system; spatial domain; Image encryption

Article Metrics:

  1. Babatunde, A. N., Methodology for Image Cryptosystem Based on Gray Code Number System, Computing and Information Systems Journal”, School of Engineering and Computing, University of the West of Scotland, 23(2), 1-10, 2019.
  2. Alhassan, S., “Enhancement of security of digital image using the moduli sets” Thesis submitted to the Department of Mathematics, Faculty o Mathematical Sciences, University of Development Studies, Ghana, 2013.
  3. Oshodi, O., “Gray code number system based digital image cryptosystem”, Thesis submitted to the Department of Computer Science, College of Information and Communication Technology, Kwara State University, Malete, Kwara State, Nigeria, 2018.
  4. Oyinloye, P.D, & Gbolagade, K.A., “An improved Image Scrambling Algorithm Using {2n -1, 2n, 2n +1}”, Computing and Information Systems Journal, School of Engineering and Computing, University of the West of Scotland, 22(3), 1-7, 2018.
  5. Alhassan, S., and Gbolagade, K. A., “Enhancement of security of digital image using the moduli set (2n-1, 2n, 2n-1)”, International Journal of Advanced Research in Computer Engineering and Technology (IJACET), 2(7), 2223-2229, 2013.
  6. Alhassan, S., “Enhancement of security of digital image using the moduli sets”, Thesis submitted to the department of mathematics, Faculty of Mathematical Sciences , University of Development Studies , Ghana ,2013.
  7. Darshana, H. and Parinder, S., “A comprehensive survey of video encryption algorithms”, International Journal of Computer Applications, 59 (1), 14-19, 2012.
  8. Puech, W., Erkin, Z., Barni, M., Rane, S., and Lagendijk, R. L., “Emerging cryptographic challenges in image and video processing”, Journal of Institute of Electrical and Electronics Engineers, 2012.
  9. Potdar, V. and Chang, E.,” Disguising text cryptography using image cryptography”, International Network Conference in Plymouth, UK, 6 - 9 July, 2004.
  10. A. Mitra, Y.V.R. Subba and S.R.M Prasanna, “A New Image Encryption Approach using Combinational Permutation Techniques”, International Journal of Electrical and Computer Engineering, 1(2), 2006.
  11. B. A. Weyori, P. N. Amponsah and P.K. Yeboah, “Modeling a Secured Digital Image Encryption Scheme Using a Three Moduli Set”, Global Journal of Computer Science and Technology Interdisciplinary, 12 (10), 2012.
  12. D. Chattopadhyay, M.K. Mandal and D. Nandi, “Symmetric key Chaotic Image Encryption using Circle Map”, Indian Journal of Science and Technology, 4 (5), 593-599, 2011.
  13. G. Peterson, “Arnold’s Cat Map”, 2003-04-10], http://online.redwoods.cc.ca.us/instruct/darnold/maw/catmap.htm, 1997.
  14. K. Struss, “A Chaotic Image Encryption”, In Spring, Mathematics Senior Seminar, Vol. 4901, 2009.
  15. K. Shaw, “Arnold’s Cat Map”, March 2006.
  16. C. Kuo-Liang and C. Lung-Chun, “Large encrypting binary images with higher security”, Pattern Recognition letters 19(43), section 4,pp. 461-468, 1998.
  17. S. Li-Ping, Q.G. Zheng, Hong-Jiang and H. Xing-Chen, “2D Triangular Mappings and Their Applications in Scrambling Rectangle Image”, Information Technology Journal, 7: 40-47, 2008.
  18. Z. Linhua, L. Xiaofeng and W. Xuebing, “An image encryption approach based on chaotic maps”, Chaos, Solitons and Fractals 24 (2004), 759–765, 2005.
  19. S. Mazleena, I. Subariah and F.I. Ismail, “Image Encryption Algorithm Based On Chaotic Mapping”, Jurnal Teknologi, 39(D) Dis. 2003: 1–12, 2003.
  20. M. Minati, M. Priyadarsini, M.C. Adhikary. and K. Sunit, “Image Encryption Using Fibonacci-Lucas Transformation”,
  21. Babatunde, A. N., Jimoh, R. G and Gbolagade, K. A., “An Algorithm for a Residue Number System Based Video Encryption System”, Computer Science Series Journal 14(2), 136-147, 2016.
  22. Abdul-Barik, A., “Enhancement of the security and compression of the Lempel-Ziv-Welch’s algorithm using residue number system for efficient transmission via network communication channels”, Thesis submitted to the Department of Mathematics, Faculty of Mathematical Sciences, University of Development Studies, Ghana, 2016.
  23. Yadav, S. S., Singh, Y., and Sriwas, S. K, “Gray code (n, k, p) based pixel substitution and affine transform based gray code bit plane permutation technique for secure image encryption”, ARPN Journal of Engineering and Applied Sciences, 12(11), 2017 International Journal on Cryptography and Information Security (IJCIS), 2(3), 2012.
  24. Yadav, S. S., Singh, Y., and Sriwas, S. K, “Hybrid Image Encryption Technique to Improve the Security Level by using (n, k, p) Gray Code and XOR Operation”, Indian Journal of Science and Technology, 10(20), 2017.
  25. S. Al-Maadeed, A. Al-Ali and T. Addalla, “A New Chaos-Based Image-Encrytion and Compression Algorithm”. Journal of Electrical and Computer Engineering, Vol. 2012, Article ID 179693, 11 pages, 2012.
  26. Y. Jie, “Algorithm of Image Information Hiding Based on New Anti-Arnold Tranform and Blending in DCT”, Department of Communication and Information Engineering, Nanjing Institute of Technology, Nanjing, China.
  27. S. Li-Ping, Q.G. Zheng, Hong-Jiang and H. Xing-Chen, “2D Triangular Mappings and Their Applications in Scrambling Rectangle Image”, Information Technology Journal, 7: 40-47, 2008
  28. https://en.wikipedia.org/wiki/Gray_code
  29. Zhou, Y., Panetta, K., Agaian, S., and Chen, P. C., “(n, k, p)-Gray Code for Image Systems”, IEEE Transactions On Cybernetics, 42(2), 515-529, 2013.
  30. Ahmad, A., and Bait-Shiginah, F., “A Nonconventional Approach To Generating Efficient Binary Gray Code Sequences”, IEEE Potentials, 31(3), 16-19, 2012.
  31. Nasir, I., Ying, W., and Jianmin, J, “A new robust watermarking scheme for color image in spatial domain” 3rd Internation IEEE Conference, SITIS, 942–947, 2007.
  32. Tseng , H. W., and Chang, C. C., “Anti-pseudo-gray coding for VQ encoded images over noisy channels”, IEEE Commun. Lett., 11(5), 443-445, 2007.
  33. Chen, W. S., Chih, K. H., Shih, S. W., and Hsieh, C. M., “Personal identification technique based on human IRIS recognition with wavelet transform”, IEEE ICASSP, 2, 949-952, 2005.
  34. Erturk, S., Locally refined Gray-coded bit-plane matching for block motion estimation. 3rd ISPA, 1, 128–133, 2003.
  35. Ding, W., Yan, W., and Qi, D., “Digital image scrambling”, Progr. Nat. Sci., 11(6), 454-460, 2001.
  36. Ko, S. J., Lee, S. H., Jeon, S. W., and Kang, E. S., “Fast digital image stabilizer based on Gray-coded bit-plane matching”, IEEE Trans. Consum.Electron., 45(3), 598–603, 1999.
  37. Ludman, J., “Gray code generation for MPSK signals”, IEEE Transmission Communication, 29(10), 1519–1522, 1981.
  38. Zhou, R.-G., Sun , Y.J., and Fan, P, “Quantum image Gray-code and bit-plane scrambling”, Quantum Inf Process, 1717 – 1734, 2015.
  39. Sivakumar, T., and Venkatesan, R., “A New Image Encryption Method Based on Knight’s Travel Path and True Random Number”, Journal of Information Science and Engineering 32, 133-152, 2016.
  40. Pareek, N. K., “Knight‟s Tour Application in Digital Image Encryption”, International Journal of Advanced Research in Computer Science and Software Engineering, 5(9), 208-213, 2015.
  41. Younes, M. B., and Aman, J, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption”, IJCSNS International Journal of Computer Science and Network Security, 8, 2008.
  42. Gao, T., and Chen, Z, “Image encryption based on a new total shuffling algorithm”, Chaos, Solitons & Fractals, Elsevier, 38(1), 213-220, 2008.
  43. Shen, Y., Zhang, G., Li, X., and Liu, Q, “An Improved Image Encryption Method Based on Total Shuffling Scheme”, Advances in CSIE, Springer- Verlag, 2(AISC-169), 643-650, 2012.
  44. Gupta, K., Gupta, R., Agrawal, R., and Khan, S., “An Ethical Approach of Block Based Image Encryption Using Chaotic Map”, International Journal of Security and Its Applications, 9(9), 105-122, 2015.
  45. Pareek, N. K., Patidar, V., and Sud, K. K, “Image encryption using chaotic logistic map”, Image and Vision Computing, 24, 926-934, 2006.
  46. Panduranga, H. T., and Naveen, S. K, “A Novel Image Encryption Approach Using B2g And G2b Code Conversion Technique”, International Journal on Computer Engineering and Information Technology, 1(1), 2009.
  47. Brindha, k., Sharma, R., and Saini, S., “Use of Symmetric Algorithm for Image Encryption”, International Journal of Innovative Research in Computer and Communication Engineering, 2(5), 4401- 4407, 2014.
  48. A.B.Y. Mohammad and J. Aman, “Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 35(1), 2008.
  49. A. Musheer and A.M. Shamsher, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal on Computer Science and Engineering, 2 (1), 46-50, 2009.
  50. Rathore, A. S., Patidar, K., and Chandel, G. S., “A Review on Recent Trends in Image Encryption Techniques”, International Journal of Engineering Technology and Applied Science, 2(5), 2016.
  51. Auyporn, W., and Vongpradhip, S., “A Robust Image Encryption Method Based on Bit Plane Decomposition and Multiple Chaotic Maps”, Department of Computer Engineering, Faculty of Engineering, Chulalongkorn University, Bangkok, Thailand, 2015.
  52. Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Partha , S. D., and Sarkar, P., “Image Encryption Using Affine Transform and XOR Operation”, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011.
  53. Goel, A., and Chandra, N., “A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based on Sorting Group-Wise of RGB Values and Explosive Inter-Pixel Displacement”, International Journal of Image, Graphics and Signal Processing, 2, 16-22, 2012.
  54. Naskar, P. K., and Chaudhuri, A., “A Secure Symmetric Image Encryption Based on Bit-wise Operation”, International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(2), 30-38, 2014.
  55. Ghode, P. S., Patil, P. P., Nayyar, V., and Moghe, S., “A Keyless approach to Lossless Image Encryption”, International Journal of Advanced Research in Science, 4(5), 1459- 1467, 2014.
  56. Liu, R., “New binary image encryption algorithm based on combination of confusion and diffusion”, Journal of Chemical and Pharmaceutical Research, 6(7), 621-629, 2014.
  57. Singh, A., and Dhanda, N, “DIP Using Image Encryption and XOR Operation Affine Transform”, IOSR Journal of Computer Engineering (IOSR-JCE), 17(2), 07-15, 2015.