Advanced
Gradual Encryption of Medical Image using Non-linear Cycle and 2D Cellular Automata Tr ansform
Gradual Encryption of Medical Image using Non-linear Cycle and 2D Cellular Automata Tr ansform
Journal of Korea Multimedia Society. 2014. Nov, 17(11): 1279-1285
Copyright © 2014, Korea Multimedia Society
  • Received : July 30, 2014
  • Accepted : October 29, 2014
  • Published : November 30, 2014
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Tae Hee Nam
Dept. of Biomedical Engineering, Dongju College
thnam@dongju.ac.kr

Abstract
In this paper, we propose on image encryption method which uses NC(Non-linear Cycle) and 2D CAT(Two-Dimensional Cellular Automata Transform) in sequence to encrypt medical images. In terms of the methodology, we use NC to generate a pseudo noise sequence equal to the size of the original image. We then conduct an XOR operation of the generated sequence with the original image to conduct level 1 NC encryption. Then we set the proper Gateway Values to generate the 2D CAT basis functions. We multiply the generated basis functions by the altered NC encryption image to conduct the 2nd level 2D CAT encryption. Finally, we verify that the proposed method is efficient and extremely safe by conducting an analysis of the key spatial and sensitivity analysis of pixels.
Keywords
1. INTRODUCTION
The rapid progress in information and communications technologies has facilitated the accessing of various information and this has in turn improved the quality of life of individuals. Especially notable is the fact that the progress of information and communications technology has allowed digital imagery contents to be circulated beyond the limitations of time and space, providing us with useful multimedia information. Recently, a ubiquitous environment has become the focus of attention so as to maximize the utilization of such digital imagery contents. However, a ubiquitous environment raises many serious issues in terms of information security. Important information can be stolen by theirs who many use it for fraudulent purposes, this along with other accompanying issues such as hacking or the breach of privacy and copyrights are becoming serious social issues [1 , 2] . With the protection of information becoming such a high social priority, many studies have proposed methods of image encryption in order to prevent information leaks and to protect information [3 - 11] . Ateniese proposed using Visual Cryptography to conduct encryption. Scharinger proposed encryption using the Kolmogorov flow map, Wong a method based on the chaotic standard map, and Chen proposed an image encryption method utilizing the 3D chaotic cat maps. Zhang also proposed a method of image encryption using chaotic maps, Pareek applied the of chaotic logistic map and Zhou applied the use of discretized chaotic maps [4 - 10] . The aforementioned method of Visual Cryptography breaks down the original image into pixel units to conduct encryption and therefore has the problem of being unable to conduct no loss recovery of the image [4] . Also, encryption methods using Maps are accompanied by problems such as the complexity of the stage of generating the Map [7] , the inability to conduct no loss recovery [9] , and the low level of encryption [5 , 6 , 8 - 10] . In this paper, we propose a new medical image encryption method using NC(Non-linear Cycle) and 2D CAT(Two-Dimensional Cellular Automata Transform) to overcome the problems of existing methods such as the complexity of the method, the problem with recovery, and the low level of encryption. In terms of the methodology, we first generate PN(pseudo noise) sequences in accordance with the size of the original image, and apply an XOR operation on said sequences and the original image to convert the image into a level 1 NC encrypted image. We then set gateway values to generate 2D CAT basis functions. The generated basis functions are multiplied to the NC converted image to conduct level 2 CAT encryption. Finally, experiments and stability analysis are conducted to compare the methods proposed herein with other papers in order to verify that the proposed method offers high levels of encryption.
2. PROPOSAL METHOD
This paper proposes an medical image encryption method using levels of NC and 2D CAT. The proposed method is conducted by first using NC to generate PN sequences and then using this to create a basis image. The XOR operation is applied to the generated basis image and the original image to create a level 1 NC encrypted image. Then, 2D CAT gateway values are used to convert the level 1 encrypted image into the final encrypted image. The flowchart of the proposed encryption process is depicted in Fig. 1 .
PPT Slide
Lager Image
Flowchart of proposed encryption method.
- 2.1 NC
NC is a Non-linear shift register which has the structure of a LFSR(Linear Feedback Shift Register) with an added NOT operator, and the input bit of which is non-linear compared to its former state. This method can be used for encryption since it will have a long cycle if the feedback function is efficiently selected. By using NC we can conduct XOR and NOT operations of binary plaintext and binary secret keys to each bit to generate the ciphertext, and in terms of decryption we can generate a stream cipher system that applies XOR and NOT operations to each bit of the secret key to each bit of the ciphertext to acquire the plaintext. As this method only applies XOR and NOT operators to each bit, there is no expansion of errors and the method is faster and simpler compared to block cipher algorithms. Also, NC has stronger defenses against known plaintext attacks compared to LFSR, as well as an enhanced cycle [11] .
The structure of the NC proposed by this paper is shown in Fig. 2 . The NC structure is composed of 8 bit and Non-linear feedback circuit XOR and NOT operators. The Non-linear feedback function f is given in equation (1) and F is the complemented vector and represents the NOT operator.
PPT Slide
Lager Image
PPT Slide
Lager Image
Proposed NC structure.
The generation of the NC basis image utilizes equation (1). The generated NC basis image is shown in Fig. 3 .
PPT Slide
Lager Image
NC basis image.
- 2.2 2D CAT
The basic form of CAT is the 1D CA(One-Dimensional Cellular Automata) in which all cells are arranged in a linear manner and form a 3-neighborhood structure [11] . Equation (2) is a state transition function where f is a local transition function which has combination logic and an arrangement state of 2 3 different neighborhoods. CA has 2 23 = 256 state transition function.
PPT Slide
Lager Image
2D basis functions generate 2D basis functions Aijkl in 2D CA space a aijt ( i , j , t = 0,1,2,..., N -1). The 2D basis functions are created using the 1D basis functions Aik as shown in equation (3).
PPT Slide
Lager Image
The generation of 2D basis functions equations use the gateway values laid out in table 1 . Gateway values are values used to generate 2D CAT basis functions, and are generated using the Wolfram Rule, the Number of Cells per Neighborhood, the Initial Configuration, the Boundary Configuration, and Basis Function Type etc.
Gateway Values
PPT Slide
Lager Image
Gateway Values
The state transition function equation of cells generated by the gateway values in table 1 are as in equation(4).
PPT Slide
Lager Image
In equation (4), when r = 1 and t + 1, the condition is 0 ≤ Wj ≤ 2. αj is composed of combinations of neighborhood cell states. This is the 1D 3-neighborhood structure. Therefore, m=3 and W 23 = W 8 . Here, the states of the cells are defined as a 0k , a 1k , a 2k where t ( t = k ) is time. aik refers to the state of the cell number i when t = k . The 2D CAT basis functions generated by the gateway values of table 1 are shown in Fig. 4 .
PPT Slide
Lager Image
2D Aijkl dual-coefficient basis functions.
A 00kl is the block at the extreme upper left corner. The top row represents 0 ≤ j ≺ 8; i = 0. The left column is j = 0;0 ≤ i ≺ 8. A ij00 is the upper left corner of each block. The white rectangular dots represent 1(addition) while the block dots are -1(subtraction). When 2D image space consists of n × n cells and f is the function defined in the spatial domain i , j , the 2D CAT equation of fij is as in equation (5) [12 , 13] .
PPT Slide
Lager Image
ckl is the 2D CAT coefficient. Equation (6) is used to encrypt the image.
PPT Slide
Lager Image
The steps to getting the 2D CAT basis functions are shown in Fig. 5 .
PPT Slide
Lager Image
2D basis functions generation process.
3. EXPERIMENT AND EVALUATION
To evaluate the performance of this encryption method, 8 bit gray level medical images were used. The NC and 2D CAT proposed by this paper were each applied to the original image and the ensuing changes were studied. In order to study the various changes of these images, 50 medical images were used in the experimentation and some are shown in Fig. 6 .
PPT Slide
Lager Image
Experimental medical images.
In terms of the time required to conduct encryption and decryption, the proposed method was faster and simpler than the algorithms using maps [6 - 10] as encryption is conducted by bit stream units. For the purposes of this paper, experimentation was conducted using Matlab on a computer with an Intel(R) Core(TM) i5-2400 CPU @3.10GHZ, 2G of memory, and running on Windows 7. As a result, the average encryption and decryption time was 0.5~1 seconds. The evaluation proposed in this chapter comparatively analyzed the three methods of using NC, 2D CAT, and using both NC and 2D CAT in a 2 level method. The histogram and PSNR(Peak Signal to Noise Ratio) values were used as the standards of evaluation.
PPT Slide
Lager Image
In equation (7), 255 is the maximum value of pixels indicating 8 bit noise or brightness, and is expressed as dB . Also, MSE is the error square average, with the i and j values representing the width and height of the image, respectively, and calculates the variance of the same location of two image data of the same size. The image subjected to experimentation and the histogram are shown in Fig. 7 .
PPT Slide
Lager Image
Original medical image and its Histogram.
First is the stream encryption method using NC a cipher system that has periodic characteristics. In terms of the methodology, periodic sequences are generated to generate a basis image as shown in Fig. 3 . The generated basis image and original image are subjected to a XOR operation to acquire the NC applied encrypted image. Fig. 8 shows the results of XOR operating the NC basis image with the original image.
PPT Slide
Lager Image
Encrypted medical image and Histogram by NC.
Next, the encryption method using 2D CAT generates the 2D CAT basis functions shown in Fig. 4 and multiplies it to the original image to encrypt the image. Fig. 9 shows the results of applying 2D CAT to the original image.
PPT Slide
Lager Image
Encrypted medical image and Histogram by 2D CAT.
Finally, the image acquired by applying NC and 2D CAT in sequence to the original image is shown in Fig. 10 .
PPT Slide
Lager Image
Encrypted medical image and Histogram by NC and 2D CAT.
To comparatively analyze the performance of each method, the histogram and PSNR values were used to study how the pixels of the images were distributed. If we take a look at the histogram first we see that the methods using NC and 2D CAT individually have irregular cycles and high pixel densities(refer to Fig. 8 , Fig. 9 ). However, in the method applying NC and 2D CAT in sequence, a relatively more even histogram develops compared to the previously mentioned methods and the pixel density is also low, signifying that the level of encryption is high(refer to Fig. 10 ). Also, the PSNR value, which measures the distortion of images, was quite low at 23 dB with the method applying both methods in sequence, signifying that the image distortation was great, as seen in Fig. 10 . Also, by applying this method to 50 images with irregular pixel cycles, we found that the PSNR value was even. When the PSNR<35 dB , we can visually confirm the distortion of the image.
In conclusion we confirmed through the PSNR values and histogram that the encrypted message had even pixels with no recognizable correlation with the original image when using NC and 2D CAT together in sequence(refer to Fig. 11 ). Therefore, using the NC and 2D CAT methods in sequence leads to higher levels of encryption and a stronger defense against external attacks. When decrypting, we use equation (5) to conduct inverse CAT, as the 2D CAT basis functions Aijkl are orthogonal. Then, we apply the XOR operator to the NC converted image to recover the original image without any loss.
PPT Slide
Lager Image
Original medical images, NC converted images, Encrypted images by NC and 2D CAT, Histogram.
4. STABILITY ANALYSIS
- 4.1 Key spatial analysis
The conditions laid out by this paper are 8-cell, 2-state, and 5-neighborhoods. Therefore, 2D CA is defined in equation (8).
PPT Slide
Lager Image
Here, T is time, K is number of cell state, m is cell number, M and N refer to the space of cell. Therefore 2D CA generates N 2 T = K km+3(N+M)+2T = 2 96 (2 25+3(8+8)+2×8 ) keys. This is a greatly improved result compared to those of image encryption methods using normal CA keys. Also, NC is a stream encryption method with 1D periodic sequences, and has 2 8+8 (2 W+H ) different sequences. Here, W and H refer to the width and height of the image. Therefore the encryption method proposed by this paper is capable of generating 2 16+96 = 2 112 keys, thus offering sufficient protection.
- 4.2 Key sensitivity analysis
xi and yi in equations (9) refer to the value of the neighborhood pixels and N refer to the numbers of total pixels.
PPT Slide
Lager Image
The result in proposed method and Pareek [9] of each key sensitivity is shown in table 2 . In this paper, signifies a higher alteration rate in key sensitivity compared to Pareek [9] .
Sensitivity analysis for the cipher to key and proposed image
PPT Slide
Lager Image
Sensitivity analysis for the cipher to key and proposed image
5. CONCLUSION
This paper proposes a method of applying NC and 2D CAT in sequence to conduct medical image encryption. In terms of the methodology, we first generate PN(pseudo noise) sequences in accordance with the size of the original image to create a basis image. Then we apply an XOR operation on said sequences and the original image to convert the image into a level 1 NC encrypted image. We then multiply the 2D CAT basis functions to the NC converted image to acquire the final encrypted result. By applying two levels of encryption as such, we can enhance the level of protection. The paper also analyzed key space and other points of stability to comparatively analyze the performance of the proposed method with that of other methods. As a result of the comparative analysis, we concluded that the proposed method resulted in higher levels of encryptions than existing methods. This study is significant in that it provides a basis for creating various encryption algorithms, as altering the structure of NC is relatively simple, and different algorithms can be created by simply changing the initial values of the 2D CAT basis functions. In future studies, analyzing the properties of 2D CAT basis functions to apply the method in various fields and studies developing high efficiency image encryption methods should be actively conducted.
BIO
Tae-Hee Nam
He received the Ph.D. degree from the department of electronics engineering, Pukyong National University, Republic of Korea in 2010. Since march 1993, he has been a professor, department of biomedical engineering, Dongju College, Republic of Korea. His current research interests are in medical image processing and analysis.
References
Shin J.W. , Sook Y. , Yoo H.M. , Park D.S. 2010 “A Novel Digital Image Protection using Cellular Automata Transform," The Korean Institute of Communications and Information Sciences 35 (8) 689 - 696
Lim H.M. , Lee S.H. , Kim B.G. 2011 “Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on/off-line Learner Tracking System,” Journal of Korea Multimedia Society 14 (1) 24 - 32    DOI : 10.9717/kmms.2011.14.1.024
Sur C. , Park Y.H. , Rhee K.H. 2011 “A Multireceiver Certificateless Encryption Scheme and Its Application,” Journal of Korea Multimedia Society 14 (6) 775 - 784    DOI : 10.9717/kmms.2011.14.6.775
Ateniese G. , Blundo C. , Santis A. 2001 “Extended Schemes for Visual Cryptography," Theoretical Computer Science 250 (1-2) 143 - 161    DOI : 10.1016/S0304-3975(99)00127-9
Giesl J. , Vlcek K. 2009 “Image Encryption based on Strange Attractor,” ICGST-GVIP Journal 9 (2) 154 - 162
Wong K.W. , Kwok S.H. , Law W.S. 2008 “A Fast Image Encryption Scheme based on Chaotic Standard Map,” Physics Letters A 372 (15) 2645 - 2652    DOI : 10.1016/j.physleta.2007.12.026
Chen G. , Mao Y. , Chui C. 2004 “Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps,” Chaos, Solitons & Fractals 21 (3) 749 - 761    DOI : 10.1016/j.chaos.2003.12.022
Zhang L. , Liao X. , Wang X. 2005 "An Image Encryption Approach based on Chaotic Maps," Chaos, Solitons and Fractals 24 (3) 759 - 765    DOI : 10.1016/j.chaos.2004.09.035
Pareek N.K. , Patidar V. , Sud K.K. 2006 "Image Encryption using Chaotic Logistic Map," Image and Vision Computing 24 (9) 926 - 934    DOI : 10.1016/j.imavis.2006.02.021
Zhou Q. , Wong K.W. , Liao X. , Xiang T. , Hu Y. 2008 "Parallel Image Encryption Algorithm based on Discretized Chaotic Map," Chaos, Solitons and Fractals 38 (4) 1081 - 1092    DOI : 10.1016/j.chaos.2007.01.034
Nam T.H. , Kim S.T. , Cho S.J. 2009 "Image Encryption using Non-linear FSR and Complemented MLCA," Proceeding of 2009 International Conference of Maritime Information and Communication Sciences 2 (1) 168 - 171
Lafe O. 2000 Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling Kluwer Academic Publishers Norwell MA, USA
Kim H.K. , Nam T.H. , Cho S.J. , Kim S.T. 2011 “A Novel Image Encryption using Complemented MLCA based on NBCA and 2D CAT,” The Korean Institute of Communications and Information Sciences 36 (6) 361 - 367    DOI : 10.7840/KICS.2011.36C.6.361