You are on page 1of 5

International Journal of Computer Information Systems, Vol. 3, No.

6, 2011

Study of Image Security Using Matlab


Lokesh Pitamber Gagnani
Information Technology Department Shantilal Shah Engineering College Bhavnagar, India lokesh_jolly05@yahoo.co.in

Abstract With the fast progression of data exchange in


electronic way, information security is becoming more important in data storage and transmission. This is also prevalent due to rapid advances in technologies. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper I studied the various image security methods & analyzed some methods. Various techniques for Image Security are Watermarking, Server Side Encryption, Tracking. For this we used Matlab 7.0 R14 is used.

networks. Security of digital images, audio, and video has increasingly become an important issue. Encryption is used to transmit data in open networks with security. Each type of image has its own features, therefore different techniques can be adopted to protect the image from unauthorized access. The process of encryption scrambles data in such a way that the original information can only be restored using a corresponding decryption process and the correct key. Digital Watermarking describes methods and technologies that hide information, for example a number or text, in digital media, such as images, video or audio. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. The hiding process has to be such that the modifications of the media are imperceptible. For images this means that the modifications of the pixel values have to be invisible. Furthermore, the watermark must be either robust or fragile, depending on the application. By "robust" we mean the capability of the watermark to resist manipulations of the media, such as lossy compression (where compressing data and then decompressing it retrieves data that may well be different from the original, but is close enough to be useful in some way), scaling, and cropping, just to enumerate some. In some cases the watermark may need to be fragile. "Fragile" means that the watermark should not resist tampering, or would resist only up to a certain, predetermined extent. II. BACKGROUND

Keywords- Watermarking, Encryption, Matlab

I.

INTRODUCTION

With the development of multimedia technologies as well as wireless network communication, security problems become more important. However, most of the available encryption methods are designed for textual data. Methods that are good for textual data may not be suited for the image. Although the existing security/encryption methods for the image can achieve a satisfactory security effect, they all require that the bit-stream of the encrypted image is received correctly and completely. However, it is inevitable to lose packets during the transmission of the cipher-image over the unreliable wireless channels, especially in some networks suffered from electromagnetic, damage, congestion, or malicious attacks, such as that in emergency communication or military confrontation. So, these traditional methods have to restrict error propagation or recover lost packets and have to design additional hardware or software functions. These increased costs are particularly unfavorable in certain applications such as mobile communications wireless network or sensors network, where their resources are constrained. In fact, unlike the traditional textual encryption, for image encryption, it is not necessary to reconstruct the plain image exactly. In many applications, an understandable decryption result can also be acceptable. Encryption and decryption are common technique in cryptography behind secure communications. With fast advances in information technologies and network communications, more and more digital images, audio, and video are transmitted over the Internet or through wireless

A. Encryption Encryption is the process of transforming the information to ensure its security. With the huge growth of mobile networks and the latest advances in digital technologies, a huge amount of digital data is being exchanged over various types of networks. It is often true that a large part of this information is either confidential or private. As a result, different security techniques have been used to provide the required protection. Image encryption techniques try to convert an image to another one that is hard to understand. On the other hand, image decryption retrieves the original image from the encrypted one.

December Issue

Page 68 of 72

ISSN 2229 5208

Various methods used are: S-DES, DES, IDEA, RSA, Chaotic Maps, Arnold Transform, DCT, Logistic Maps, Ikeda Maps. However Traditional block ciphers like DES, IDEA and RSA are not suitable for practical image encryption for following reasons: they are not originally designed for image, and thus the internal features of the image has not been fully considered in these methods; they are weak and not efficient when the image size is very large; their encrypted adjacent pixels has high relativity and thus become vulnerable to statistical attacks. B. Watermarking The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. Digital watermarking is a method that has received a lot of attention in the past few years. A digital watermark can be described as a visible or preferably invisible identification code that is permanently embedded in the data . It means that it remains present within the data after any decryption process. A general definition can be given: !"Hiding of a secret message or information within an ordinary message and the extraction of it at its destination.!" Complementary to encryption, it allows some protection of the data after decryption. As we know, encryption procedure aims at protecting the image (or other kind of data) during its transmission. Once decrypted, the image is not protected anymore. By adding watermark, we add a certain degree of protection to the image (or to the information that it contains) even after the decryption process has taken place. The goal is to embed some information in the image without affecting its visual content. In the copyright protection context, watermarking is used to add a key in the multimedia data that authenticates the legal copyright holder and that cannot be manipulated or removed without impairing the data in a way that removes any commercial value . In visible digital watermarking, the information is visible in the picture or video. Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark. In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden in the signal). The watermark may be intended for widespread use and thus, is made easy to retrieve or, it may be a form of Steganography, where a party communicates a secret message embedded in the digital signal. In either case, as in visible watermarking, the objective is to attach ownership or other descriptive information to the signal in a way that is difficult to remove. It also is possible to use hidden embedded information as a means of covert communication between individuals.
Identify applicable sponsor/s here. (sponsors)

International Journal of Computer Information Systems, Vol. 3, No. 6, 2011 C. Image Files The Image Files that can be used are: Color or Gray Images. Other formats include: JPEG (Joint Photographic Experts Group), JPEG 2000, PNG (Portable Network Graphics), GIF (Graphics Interchange Format), BMP file format. III. ARCHITECTURE

A. Encryption & Decryption For encryption and decryption a symmetric key model has been used. The architecture of image encryption and decryption model is described in Figure 1:

Figure 1: The Architecture of Image Encryption & Decryption Model.

In this I generated keys for encryption algorithm of image using random number. The encrypted gives colored dots which gives no clue of original image. Thus original image can be hidden for unauthorized access. The Encoded image can only be recovered from decryption algorithm and same key used for encryption. Since we use same key for encryption and decryption, it is called as Symmetric key algorithm. Here I have a GUI which gives the buttons: Select Image, Encrypt Image and Decrypt Image. Key is generated by the function Keygen. The image is encrypted by: EncImg = imageProcess (Img, key). The imageProcess function does the Bitwise XOR of Original Image and Key. B. Watermarking In Figure 2 a general watermarking scheme in order to give an idea of the different operations involved in the process.

December Issue

Page 69 of 72

ISSN 2229 5208

International Journal of Computer Information Systems, Vol. 3, No. 6, 2011

(a)

(b)

Figure 2: The Architecture of General Watermarking Scheme

IV.

EXPERIMENTAL RESULTS

A. Image Encryption and Decryption Select a 120X120 color image. From the GUI select the image by clicking the Select Image button. This is shown in figure 3(a). Now Press the Encrypt Image button as shown in figure 3(b). Final Decrypted Image is shown in figure 3(c). Here we have the encryption with the randomly generated key. (c) (d)

Figure 4 (a) Watermark Image (b) Original Image (c) Final Image with Watermark (d) Reconstructed Watermark

V.

CONCLUSION

(a)

(b)

(c)

Here we have the color image security which can be further expanded for multimedia data such Videos, animations, etc. However with the advances in multimedia technologies we need secure algorithms for confidential & private data. Also we conclude that Image Encryption is better in comparison to watermarking since we can get some idea of image/watermark in original image but the encrypted image gives no idea about the original image. VI. APPLICATIONS

Figure 3 (a) Original Image (b) Encrypted Image (c) Final Decrypted Image

Applications of Watermarking: 1. Fingerprinting: In order to trace the source of illegal copies the owner can embed different watermarking keys in the copies that are supplied to different customer. For the owner, embedding a unique serial number-like watermark is a good way to detect customers who break their licence agreement by copying the protected data and supplying it to a third party.

B. Image Watermarking Image Watermarking can also be considered as the security mechanism for images. Here we hide the picture into some arbitrary image using watermarking. The Watermark image is shown in Figure 4(a), the original image is shown in Figure 4(b). Figure 4(c) shows the final image with watermark. Figure 4(d) shows the Reconstructed Watermark. Here Color image is first converted to Gray Scale as seen in Figure 4 (b).

December Issue

Page 70 of 72

ISSN 2229 5208

International Journal of Computer Information Systems, Vol. 3, No. 6, 2011 2. Indexing: 8. Medical Safety: Watermarking offers a wide range of new capabilities to multimedia applications. It allows the indexing of video mail by permitting the insertion of comments in video content as well as the indexing of movies or news items by making available the utilization of markers that can be exploited in search engines. As the number of images and video contents online increases a lot faster than the capabilities of todays search engine, it is important to plan ahead for new ways to allow quick access to multimedia data and watermarking is certainly a promising way to do so. 3. Copyright Protection & Owner identification: To protect its intellectual property, the data owner can embed a watermark representing copyright information of his data. This application can be a really helpful tool in settling copyright disputes in court. It is probably the most widely spread use of digital images watermarking and it is also the application we have worked on in the present project. 4. Broadcast monitoring: In order to help the automated identification of broadcasted programs, original watermarks can be inserted in any type of data to be widely broadcasted on a network. It could assure that advertisers received the airtime they have paid for or make certain that musicians property is not rebroadcast by pirate stations (or at least, if so, that it can be detected). Telemedicine is becoming popular in the specialties of radiology, pathology, critical care and psychiatry, where data is in the form of image. It is required to ensure confidentiality and security for transmitting certain image-based data over the Internet. The aim of security management is to provide authentication of users and integrity, accuracy & safety of data resources. ACKNOWLEDGMENT 5. Copy protection: The watermarked information can directly control digital recording device. The embedded key can represent a copypermission bit stream that is detected by the recording device which then decide if the copying procedure should go on (allowed) or not (prohibited). 6. Data Authentication: Fragile watermarks are used to detect any corruption of an image or any other type of data. If the watermark is detected, the data is genuine, if not, the data has been corrupted and cannot be considered. 7. Data Hiding (Covert Communications): The transmission of private data is probably one of the earliest applications of watermarking. As one would probably have already understood, it consists of implanting a strategic message into an innocuous one in a way that would prevent any unauthorized person to detect it. Here I would thank Prof Preeti Dave working as Asst Prof at SSEC for guiding in my work. Also would like to thank Prof. Mehul Parikh for helping me to complete this work. At last thankful to Prof. Parmar sir without whom I could take this initiative. REFERENCES
[1] [2] [3] [4] [5] [6] I J Cox , M L Miller and J A Bloom , Watermarking Applications and their Properties. A H Paquet , R K Ward , Wavelet Based Digital Watermarking. G Voyatzis and I Pitas, The Use Of Watermarks in the Protection of Digital Multimedia Products. H Y Lo , S Topiwala and J Wang , Wavelet Based Steganography and Watermarking. Vallabha VH, Cranes Software International Limited, Multiresolution Watermarking for Digital Images. Xiaogang Jia, "Image Encryption using the Ikeda map", 2010 International Conference on Intelligent Computing and Cognitive Informatics P. P. Dang and P. M. Chau, "Image encryption for secure Internet multimedia applications," Consumer Electronics, IEEE Transactions on, vol. 46, pp. 395-403, 2000.

Embedding the date and patients name in medical images could increase the confidentiality of medical information as well as the security. From the applications mentioned above, one can divide watermarks in two distinct types: Robust, for the first five applications and Fragile for the last three. Applications of Encryption/Decryption: 1. Virtual Community: The Internet has facilitated the development of a worldwide Virtual Community free from the constraints of time and geography. Due to the Internet there is no distance between a person located in one place and experts around the globe. Through electronic mail / voice mail / video mail it is possible to solicit the opinion of experts. 2. Telemedicine:

[7]

December Issue

Page 71 of 72

ISSN 2229 5208

International Journal of Computer Information Systems, Vol. 3, No. 6, 2011


[8] Sandeep Bhowmik and Sriyankar Acharyya, "Image Cryptography: The Genetic Algorithm Approach", IEEE Transcations on, pp. 223-227, 2011. Yuanmei Wang and Tao Li, "Study on Image Encryption Algorithm Based on Arnold Transformation and Chaotic System", IEEE Transcations on, pp. 449-451,2010. Ma Ding, Fan Jing, "Digital Image Encryption Algorithm Based on Improved Arnold Transform", IEEE Transactions on, pp. 174-176, 2010. Dr. D. M. Shah, IMAGE ENCRYPTION & DECRYPTION MODEL. Anil K. Jain: "Fundamentals Of Digital Image Processing", PHI, 1997. ZHANG Yun-peng, ZHAI Zheng-jun, LIU Wei, "Digital Image Encryption Algorithm Based on Chaosan & Improved DES", IEEE Transactions on, pp. 474-479, 2009. AUTHORS PROFILE

[9]

[10] [11] [12] [13]

Mr. Lokesh Pitamber Gagnani is undergoing Postgraduation from Gujarat Technological University, Gujarat in Information Technology field. He completed his Bachelors in I.T. from Saurashtra University in 2007. He has been a student at GFSU, Gandhinagar. His interest areas include Image Processing, Mobile Communication, Database Systems, Cryptography & Network Security, etc.

December Issue

Page 72 of 72

ISSN 2229 5208

You might also like