Performance analysis of gray code number system in image security

*Akinbowale Nathaniel Babatunde  -  Department of Computer Science, College of Communication and Information Technology, Kwara State University, Nigeria
Ebunayo Rachael Jimoh  -  Department of Physical and Mathematical Sciences, Faculty of Science, Crown Hill University, Nigeria
Oladipupo Oshodi  -  Department of Computer Science, College of Communication and Information Technology, Kwara State University, Nigeria
Olujuwon Ayoseyi Alabi  -  Department of Computer Science, Abo Akademi University, Finland
Received: 16 Feb 2019; Revised: 20 Aug 2019; Accepted: 5 Sep 2019; Published: 31 Oct 2019; Available online: 3 Oct 2019.
Open Access Copyright (c) 2019 Jurnal Teknologi dan Sistem Komputer
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
Article Info
Section: Articles
Language: EN
Statistics: 206 71
The encryption of digital images has become essential since it is vulnerable to interception while being transmitted or stored. A new image encryption algorithm to address the security challenges of traditional image encryption algorithms is presented in this research. The proposed scheme transforms the pixel information of an original image by taking into consideration the pixel location such that two neighboring pixels are processed via two separate algorithms. The proposed scheme utilized the Gray code number system. The experimental results and comparison shows the encrypted images were different from the original images. Also, pixel histogram revealed that the distribution of the plain images and their decrypted images have the same pixel histogram distributions, which means that there is a high correlation between the original images and decrypted images. The scheme also offers strong resistance to statistical attacks.
Gray code number system; spatial domain; image encryption

Article Metrics:

  1. A. N. Babatunde, “Methodology for Image Cryptosystem Based on Gray Code Number System,” Computing and Information Systems Journal, vol. 23, no. 2, pp. 1-10, 2019.
  2. S. Alhassan, “Enhancement of security of digital image using the moduli sets,” thesis, University of Development Studies, Ghana, 2013.
  3. O. Oshodi, “Gray code number system based digital image cryptosystem,” thesis, College of Information and Communication Technology, Kwara State University, Nigeria, 2018.
  4. P. D. Oyinloye and K. A. Gbolagade, “An improved image scrambling algorithm using {2n -1, 2n, 2n +1},” Computing and Information Systems Journal, vol. 22, no. 3, pp. 1-7, 2018.
  5. S. Alhassan and K. A. Gbolagade, “Enhancement of security of digital image using the moduli set (2n-1, 2n, 2n-1),” International Journal of Advanced Research in Computer Engineering and Technology, vol. 2, no. 7, pp. 2223-2229, 2013.
  6. S. Alhassan, “Enhancement of security of digital image using the moduli sets,” thesis, University of Development Studies, Ghana, 2013.
  7. H. Darshana and S. Parinder, “A comprehensive survey of video encryption algorithms,” International Journal of Computer Applications, vol. 59, no. 1, pp. 14-19, 2012. doi: 10.5120/9512-3902
  8. W. Puech, Z. Erkin, M. Barni, S. Rane, and R. L. Lagendijk, “Emerging cryptographic challenges in image and video processing,” in 19th IEEE International Conference on Image Processing, Orlando, USA, Oct. 2012, pp. 2629-2632. doi: 10.1109/ICIP.2012.6467438
  9. V. Potdar and E. Chang, ”Disguising text cryptography using image cryptography,” in 4th International Network Conference, Plymouth, UK, Jul. 2004.
  10. A. N. Babatunde, R. G. Jimoh, and K. A. Gbolagade, “An algorithm for a residue number system based video encryption system,” Computer Science Series Journal, vol. 14, no. 2, pp. 136-147, 2016.
  11. A. Abdul-Barik, “Enhancement of the security and compression of the Lempel-Ziv-Welch’s algorithm using residue number system for efficient transmission via network communication channels,” thesis, University of Development Studies, Ghana, 2016.
  12. Y. Zhou, K. Panetta, S. Agaian, and P. C. Chen, “(n, k, p)-Gray Code for Image Systems,” IEEE Transactions on Cybernetics, vol. 42, no. 2, pp. 515-529, 2013. doi: 10.1109/TSMCB.2012. 2210706
  13. A. Ahmad and F. Bait-Shiginah, “A nonconventional approach to generating efficient binary gray code sequences,” IEEE Potentials, vol. 31, no. 3, pp. 16-19, 2012. doi: 10.1109/MPOT. 2011.2178193
  14. I. Nasir, W. Ying, and J. Jianmin, “A new robust watermarking scheme for color image in spatial domain,” in 3rd International IEEE Conference Signal-Image Technologies and Internet-Based System, Shanghai, China, Dec. 2007, pp. 942–947. doi: 10.1109/SITIS.2007.67
  15. H. W. Tseng and C. C. Chang, “Anti-pseudo-gray coding for VQ encoded images over noisy channels,” IEEE Communication Letters, vol. 11, no. 5, pp. 443-445, 2007. doi: 10.1109/LCOMM. 2007.070074
  16. W. S. Chen, K. H. Chih, S. W. Shih, and C. M. Hsieh, “Personal identification technique based on human IRIS recognition with wavelet transform,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, USA, Mar. 2005, pp. 949-952. doi: 10.1109/ ICASSP.2005.1415563
  17. S. Erturk, “Locally refined Gray-coded bit-plane matching for block motion estimation,” in 3rd International Symposium on Image and Signal Processing and Analysis, Rome, Italy, Sept. 2003, pp. 128–133. doi: 10.1109/ISPA.2003.1296881
  18. W. Ding, W. Yan, and D. Qi, “Digital image scrambling,” Progress in Natural Science, vol. 11, no. 6, pp. 454-460, 2001.
  19. S. J. Ko, S. H. Lee, S. W. Jeon, and E. S. Kang, “Fast digital image stabilizer based on Gray-coded bit-plane matching,” IEEE Transactions on Consumer Electronics, vol. 45, no. 3, pp. 598–603, 1999. doi: 10.1109/30.793546
  20. J. Ludman, “Gray code generation for MPSK signals,” IEEE Transmission Communication, vol. 29, no. 10, pp. 1519–1522, 1981. doi: 10.1109/TCOM.19
  21. M. B. Younes and J. Aman, “An image encryption approach using a combination of permutation technique followed by encryption,” International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 191-197, 2008.
  22. T. Gao and Z. Chen, “Image encryption based on a new total shuffling algorithm,” Chaos, Solitons & Fractals, vol. 38, no. 1, pp. 213-220, 2008. doi: 10.1016/j.chaos.2006.11.009
  23. Y. Shen, G. Zhang, X. Li, and Q. Liu, “An improved image encryption method based on total shuffling scheme,” in Advances in Computer Science and Information Engineering, Springer- Verlag, 2012, pp. 643-650.
  24. R. -G. Zhou, Y. J. Sun, and P. Fan, “Quantum image Gray-code and bit-plane scrambling,” Quantum Information Processing, vol. 14, pp. 1717-1734, 2015.
  25. T. Sivakumar and R. Venkatesan, “A new image encryption method based on knight’s travel path and true random number,” Journal of Information Science and Engineering, vol. 32, pp. 133-152, 2016.
  26. N. K. Pareek, “Knight’s tour application in digital image encryption,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 9, pp. 208-213, 2015.
  27. K. Gupta, R. Gupta, R. Agrawal, and S. Khan, “An ethical approach of block based image encryption using chaotic map,” International Journal of Security and Its Applications, vol. 9, no. 9, pp. 105-122, 2015. doi: 10.14257/ijsia.2015.9.9.10
  28. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926-934, 2006. doi: 10.1016/j.imavis.2006.02.021
  29. H. T. Panduranga and S. K. Naveen, “A novel image encryption approach using B2g And G2b code conversion technique,” International Journal on Computer Engineering and Information Technology, vol. 1, no. 1, 2009.
  30. K. Brindha, R. Sharma, and S/ Saini, “Use of symmetric algorithm for image encryption,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 5, pp. 4401- 4407, 2014.
  31. A.B.Y. Mohammad, and J. Aman, “Image encryption using block-based transformation algorithm,” IAENG International Journal of Computer Science, vol. 35, no. 1, 2008.
  32. A. Musheer and A.M. Shamsher, “A new algorithm of encryption and decryption of images using chaotic mapping,” International Journal on Computer Science and Engineering, vol. 2, no. 1, pp. 46-50, 2009.
  33. A. S. Rathore, K. Patidar, and G. S. Chandel, “A review on recent trends in image encryption techniques,” International Journal of Engineering Technology and Applied Science, vol. 2, no. 5, 2016.
  34. W. Auyporn, and S. Vongpradhip, “A robust image encryption method based on bit plane decomposition and multiple chaotic maps,” International Journal of Signal Processing System, vol. 3, no. 1, pp. 8-13, 2015.
  35. A. Nag et al., “Image encryption using affine transform and xor operation,” in International Conference on Signal Processing, Communication, Computing and Networking Technologies, Thuckafay, India, Jul. 2011, pp. 309-312. doi: 10.1109/ICSCCN.2011.6024565
  36. A. Goel and N. Chandra, “A technique for image encryption with combination of pixel rearrangement scheme based on sorting group-wise of RGB values and explosive inter-pixel displacement,” International Journal of Image, Graphics and Signal Processing, vol. 4, no. 2, pp. 16-22, 2012. doi: 10.5815/ijigsp.2012.02.03
  37. P. K. Naskar and A. Chaudhuri, “A secure symmetric image encryption based on bit-wise operation,” International Journal of Image, Graphics and Signal Processing, vol. 6, no. 2, pp. 30-38, 2014. doi: 10.5815/ijigsp.2014.02.04
  38. P. S. Ghode, P. P. Patil, V. Nayyar, and S. Moghe, “A keyless approach to lossless image encryption,” International Journal of Advanced Research in Science, vol. 4, no. 5, pp. 1459- 1467, 2014.
  39. R. Liu, “New binary image encryption algorithm based on combination of confusion and diffusion,” Journal of Chemical and Pharmaceutical Research, vol. 6, no. 7, pp. 621-629, 2014.
  40. A. Singh and N. Dhanda, “DIP using image encryption and xor operation affine transform,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 17, no. 2, pp. 07-15, 2015.
  41. A. Mitra, Y.V.R. Subba and S.R.M Prasanna, “A new image encryption approach using combinational permutation techniques,” International Journal of Electrical and Computer Engineering, vol. 1, no. 2, pp. 127-131, 2006.
  42. B. A. Weyori, P. N. Amponsah, and P.K. Yeboah, “Modeling a secured digital image encryption scheme using a three moduli set,” Global Journal of Computer Science and Technology Interdisciplinary, vol. 12, no. 10, 2012.
  43. D. Chattopadhyay, M.K. Mandal and D. Nandi, “Symmetric key chaotic image encryption using circle map,” Indian Journal of Science and Technology, vol. 4, no. 5, pp. 593-599, 2011.
  44. K. Struss, “A chaotic image encryption,” in Mathematics Senior Seminar, University Minnesota, USA, 2009, pp. 1-19.
  45. K. -L. Chung and L. -C. Chang, “Large encrypting binary images with higher security,” Pattern Recognition Letters, vol. 19, no. 43, section 4, pp. 461-468, 1998. doi: 10.1016/S0167-8655(98)00017-8
  46. S. Li-Ping, Q. G. Zheng, H. Hong-Jiang, and H. Xing-Chen, “2D triangular mappings and their applications in scrambling rectangle image,” Information Technology Journal, vol. 7, no. 1, pp. 40-47, 2008. doi: 10.3923/itj.2008.40.47
  47. Z. Linhua, L. Xiaofeng, and W. Xuebing, “An image encryption approach based on chaotic maps,” Chaos, Solitons and Fractals, vol. 24, no. 3, pp. 759–765, 2005. doi: 10.1016/j.chaos. 2004.09.035
  48. M. Salleh, S. Ibrahim, and I. F. Isnin, “Image encryption algorithm based on chaotic mapping,” Jurnal Teknologi, vol. 39, no. 1, pp. 1-12, 2003. doi: 10.11113/jt.v39.458
  49. M. Mishra, P. Mishra, M.C. Adhikary, and S. Kumar, “Image encryption using fibonacci-lucas transformation,” International Journal on Cryptography and Information Security (IJCIS), vol.2, no. 3, pp. 131-141, 2012.
  50. S. S. Yadav, Y. Singh, and S. K. Sriwas, “Gray code (n, k, p) based pixel substitution and affine transform based gray code bit plane permutation technique for secure image encryption,” ARPN Journal of Engineering and Applied Sciences, vol. 12, no. 11, pp. 3500-3508, 2017.
  51. S. S. Yadav, Y. Singh, and S. K. Sriwas, “Hybrid image encryption technique to improve the security level by using (n, k, p) gray code and xor operation,” Indian Journal of Science and Technology, vol. 10, no. 20, pp. 1-9, 2017. doi: 10.17485/ijst/2017/v10i20/113180
  52. S. Al-Maadeed, A. Al-Ali, and T. Addalla, “A new chaos-based image-encrytion and compression algorithm,” Journal of Electrical and Computer Engineering, vol. 2012, pp. 1-11, 2012. doi: 10.1155/2012/179693
  53. J. Yang, “Algorithm of image information hiding based on new anti-arnold tranform and blending in DCT,” in IEEE 12th International Conference on Communication Technology, Nanjing, China, Nov. 2010, pp. 312-315. doi: 10.1109/ICCT.2010. 5689227