RSA ALGORITHM ELEMENTS IN TERNARY AFFINE TRANSFORMATIONS IN ENCRYPTION-DECRYPTION OF IMAGES

2020;
: pp. 25-29
1
Lviv Politechnik National University, Department of Publishing Information Technologies
2
Lviv Politechnik National University, Department of Publishing Information Technologies
3
Lviv Polytechnic National University, Ukraine
4
Lviv Polytechnic National University, Ukraine

Regarding image encryption, a crucial task is to implement the application of such an RSA algorithm which will provide an opportunity:

– not to decay the cryptographic stability of the RSA algorithm;

– to ensure complete noisiness of an image to prevent the application of methods of visual image processing.

An algorithm for encryption-decryption of monochrome images using elements of the RSA algorithm as the most resistant to unauthorized signal decryption in ternary affine transformations is proposed. The developed algorithm is applied to images in which there are strictly delineated contours. Elements of the RSA algorithm are proposed to be used to construct the coefficients of ternary affine transformations. The proposed algorithm has higher cryptographic stability compared to the RSA algorithm. The ways of applying the elements of the RSA algorithm in affine transformations in encryption-decryption of images are described in this article.

The results of modeling the affine modified cipher for cryptographic transformations of black and white monochrome images of a given dimension are presented. Modified models and algorithmic procedures of key generation processes, direct and inverse cryptographic transformations, which are reduced to matrix element-by-element operations by module, are developed.

 

[1] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. RF. Triumf, 2003.

[2] B. Jane, Digital Image Processing. Springer–Verlag Berlin Heidelberg, 2005.

[3] B. Girod, “The information theoretical significance of spatial and temporal masking in video signals”, Proc. of the SPIE Symposium on Electronic Imaging.1989, vol. 1077. pp.178–187.

https://doi.org/10.1117/12.952716

[4] M. Rabbani, R. Joshi, “An overview of the JPEG2000 still image compression standard” , Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication,  vol.17, pp.3–48, 2002.

https://doi.org/10.1016/S0923-5965(01)00024-8

[5] S. X. Liao, M. Pawlak, “On image analysis by moments”, IEEE Transaction on Pattern Analysis and Machine Intelligence, no.3, pp.254–266, 1996.

https://doi.org/10.1109/34.485554

[6] E. Haacke, R. Brown, M. Thompson, R. Vencatesan, Magnetic Resonanse Imagin: Physical Principles and Sequence Design. John Wiley & Sons, 1999.

[7] J. Kajiya, The rendering equation, 1986.

https://doi.org/10.1145/15922.15902

[8] M. Sarfraz, Introductory Chapter: On Digital Image Processing. 2020.

https://doi.org/10.5772/intechopen.92060

[9] E. Samei, Donald J Peck, Projection X‐ray Imaging, Hendee's Physics of Medical Imaging. 2019.

https://doi.org/10.1002/9781118671016

[10] M. Vollmer, K‐P. Mollmann, Infrared Thermal Imaging. 2017.

https://doi.org/10.1002/9783527693306

[11] R. Gonzales, R. Woods. Digital image processing. Prentice Hall, Upper Saddle River, NJ, 2nd edn., 2002.

[12] R. Gonzalez,  R. Woods, Digital Image Processing. Publ. Pearson   Education,  Inc, Publishing as Prentice Hall, 2002.

[13] A. Kovalchuk, I. Izonin, C. Strauss,  M. Podavalkina, N. Lotoshynska,  N. Kustra, “Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems, CEUR Workshop Proceedings, no.2533, 2019, pp.139-150. 

[14] A. Kovalchuk, I. Izonin, M. Gregush, N. Lotoshyiiska, “An approach towards image encryption and decryption using quaternary fractional-linear operations”, Procedia Computer Science, no.160, pp.491– 496, 2019.

https://doi.org/10.1016/j.procs.2019.11.059

[15] A. Kovalchuk, N. Lotoshynska, “Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images”, in Proc. IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 2018, pp.542–544.  

https://doi.org/10.1109/DSMP.2018.8478471