Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems

Image protection and organizing the associated processes is based on the assumption that an image is a stochastic signal. This results in the transition of the classic encryption methods into the image perspective. However the image is some specific signal that, in addition to the typical informativeness (informative data), also involves visual informativeness. The visual informativeness implies additional and new challenges for the issue of protection. As it involves the highly sophisticated modern image processing techniques, this informativeness enables unauthorized access. In fact, the organization of the attack on an encrypted image is possible in two ways: through the traditional hacking of encryption methods or through the methods of visual image processing (filtering methods, contour separation, etc.). Although the methods mentioned above do not fully reproduce the encrypted image, they can provide an opportunity to obtain some information from the image. In this regard, the encryption methods, when used in images, have another task the complete noise of the encrypted image. This is required to avoid the use of visual imaging techniques. The paper describes the use of RSA algorithm elements in fractal quadratic transformations and fractal transform systems for encrypting / decrypting grayscale images. The values of pixel intensities in the matrix of such images are known to be in the range from 0 to 255. Noise functions in both methods were linear.

[1]  Iryna Yurchak,et al.  Composing method of anti-interference codes based on non-equidistant structures , 2017, 2017 XIIIth International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH).

[2]  Anatoliy Kovalchuk,et al.  Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images , 2018, 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP).

[3]  Anatoliy Kovalchuk,et al.  An Efficient Image Encryption Scheme using Projective Transformations , 2019, EUSPN/ICTH.

[4]  D. D. Peleshko,et al.  The use of disjunctive covering of images to increase strength of the RSA algorithm , 2011, Perspective Technologies and Methods in MEMS Design.

[5]  Mohamad Rushdan Md. Said,et al.  Efficiency Analysis for Public Key Systems Based on Fractal Functions , 2011 .

[6]  Natalia Kryvinska,et al.  "Memoxo" - Browser-Based Prototype for the Audio/Video Messages Recording , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[7]  Mariya Nazarkevych,et al.  Methods of protection document formed from latent element located by fractals , 2015, 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT).

[8]  Natalia Kryvinska,et al.  Enterprise network maintaining mobility - architectural model of services delivery , 2011, Int. J. Pervasive Comput. Commun..

[9]  Elmo Benedetto,et al.  An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding , 2015 .

[10]  Oleg Riznyk,et al.  A synthesis of barker sequences is by means of numerical bundles , 2017, 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM).

[11]  Octavio José Salcedo Parra,et al.  Encryption through the use of fractals , 2017 .

[13]  Riznyk Oleg,et al.  Information technologies of optimization of structures of the systems are on the basis of combinatorics methods , 2017, 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).

[14]  Mariya Nazarkevych,et al.  Detection of regularities in the parameters of the ateb­gabor method for biometric image filtration , 2019, Eastern-European Journal of Enterprise Technologies.

[15]  Mariya Nazarkevych,et al.  Complexity Evaluation of the Ateb-Gabor Filtration Algorithm in Biometric Security Systems , 2019, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON).

[16]  Shafali Agarwal,et al.  Image Encryption Techniques Using Fractal Function:A Review , 2017 .

[17]  Jitendra Malik,et al.  Contour detection and image segmentation , 2009 .