BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES

2022;
: pp. 5-10
1
Lviv Politechnik National University, Department of Publishing Information Technologies
2
Lviv Polytechnic National University
3
Lviv Polytechnic National University

An image as a stochastic signal is one of the most common forms of information. Protecting images from unauthorized access and applying is a correspondingly urgent task. This causes the use of well-known classical encryption methods in the case of image encryption. But the image is a signal that possesses, in addition to typical informativeness, also visual informativeness. Informativeness for modern image processing methods makes it possible to ensure unauthorized access. Creating an attack on an encrypted image is possible in two ways: by traditional hacking of encryption methods, or by classical methods of visual image processing (filtering, highlighting contours, etc.). In this regard, one more requirement is put forward to encryption methods in the case of their application concerning images - this is the complete noise of the encrypted image. This is necessary so that the use of visual image processing methods becomes impossible. The RSA algorithm is one of the most widely known industrial standards for encrypting signals. Unlike symmetric encryption, in an open-key encryption scheme, it is impossible to calculate the decryption procedure, knowing the encryption procedure. Namely, the working time of the algorithm for calculating the decryption procedure is so great that it cannot be implemented on any modern computers, as well as on computers of the future. Such coding schemes are called asymmetric. Therefore, the urgent task is to implement the application of the RSA algorithm so that when encrypting an image: – the cryptographic stability of the RSA algorithm has not become worse; – the full image noise was achieved to prevent the use of visual image processing techniques. The algorithm of elements of the RSA algorithm, as the most resistant to unauthorized decryption of signals, and bitwise operations for a compatible combination during encryption and decryption of images is proposed by the authors. Encryption - decryption is performed without additional noise. The proposed algorithm is applied to images in which there are strictly extracted contours. Elements of the RSA algorithm are assigned to perform bitwise operations on the intensity values of pixels of a color image. The developed algorithm has higher cryptographic stability compared to the traditional RSA algorithm. The authors described the possibilities of using elements of the RSA algorithm in bitwise transformations when encrypting and decrypting images. The results of encryption simulation for cryptographic transformations of color images of a given dimension are presented. Modified models and algorithmic procedures of key formation processes of direct and inverse cryptographic transformations have been developed. They are reduced to elemental mathematical operations.

[1] Michael Vollmer, Klaus-Peter Mollmann, Fundamentals of Infrared Thermal Imaging. Infrared Thermal Imaging, 10.1002 9783527693306, 2017. https://www.wiley.com/ enus/Infrared+Thermal+Imaging:+Fundamentals,+Resear ch+and+Applications,+2nd+Edition-p-9783527413515
https://doi.org/10.1002/9783527693306
[2] B. Usmonov, O. Evsutin, A. Iskhakov, A. Shelupanov, A. Iskhakova, R. Meshcheryakov, "The cybersecurity in development of IoT embedded technologies", in Proc. International Conference on Information Science and Communications Technologies (ICISCT) IEEE, 2017, pp. 1-4. DOI: 10.1109/ICISCT.2017.8188589
https://doi.org/10.1109/ICISCT.2017.8188589
[3] D. Wagh, H. Fadewar, & G. Shinde, "Biometric Finger Vein Recognition Methods for Authentication", Computing in Engineering and Technology, pp. 45-53, 2020. DOI: 10.1007/978-981-32-9515-5-5
https://doi.org/10.1007/978-981-32-9515-5_5
[4] P. Chanukya, T. Thivakaran, "Multimodal biometric cryptosystem for human authentication using fingerprint and ear", Multimedia Tools and Applications, 79(1-2), pp. 659-673, 2020. DOI: 10.1007/s11042-019-08123-w
https://doi.org/10.1007/s11042-019-08123-w
[5] L.Valechha, H. Valecha, V. Ahuja, T. Chawla, & S. Sengupta, "Orisyncrasy - An Ear Biometrics on the Fly Using Gabor Filter", In Advances in Data Sciences, Security and Applications, pp. 457-466, 2020. DOI: 10.1007/978-981-15-0372-6-37
https://doi.org/10.1007/978-981-15-0372-6_37
[6] J. Yang, L. Liu, T. Jiang, Y. Fan, "A modified Gabor filter design method for fingerprint image enhancement", Pattern Recognition Letters, 24(12), pp. 1805- 1817, 2003. DOI: 10.1016/S0167-8655(03)00005-9.
https://doi.org/10.1016/S0167-8655(03)00005-9
[7] Majid Rabbani, Rajan Joshi. "An overview of the JPEG2000 still image compression standard", Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication, no. 17, vol. 1, pp. 3- 48, 2002. https://scirp.org/reference/referencespapers. aspx?referenceid=727652
https://doi.org/10.1016/S0923-5965(01)00024-8
[8] A. Kovalchuk, I. Izonin, C. Strauss, M. Podavalkina, N. Lotoshynska, N. Kustra. "Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems", CEUR Workshop Proceedings, vol. 2533, 2019, pp. 139-150. https://doi.org/10.23939/ istcmtm2020.04.025
[9] A. Kovalchuk, I. Izonin, Gregush Ml, M., N. Lotoshyiiska, "An approach towards image encryption and decryption using quaternary fractional-linear operations", Procedia Computer Science, vol. 160, 2019, pp. 491-496. Conference Paper (Open Access), DOI : 10.1016 /j.procs. 2019.11.059
https://doi.org/10.1016/j.procs.2019.11.059
[10] S. X. Liao and M. Pawlak, "On image analysis by moments", IEEE Transaction on Pattern Analysis and Machine Intelligence, 18, no. 3, pp. 254-266. https://ieeexplore.ieee.org/document/485554
https://doi.org/10.1109/34.485554
[11] [E. M. Haacke, R.W. Brown, M.R. Thompson and R. Venkatesan, Magnetic Resonance Imagin: Physical Principles and Sequence Design. John Wiley & Sons, New York, 1999. https://www.wiley.com/ensg/Magnetic+ Resonance+Imaging:+Physical+Principles+and+Sequence +Design,+2nd+Edition-p-9780471720850
[12] J. T. Kajiya, The rendering equation. Computer Graphics, vol. 20, is. 4, 143-150, 1986. https://dl.acm.org/ doi/10.1145/15886.15902
https://doi.org/10.1145/15886.15902
[13] [ M. Sarfraz. Introductory Chapter: On Digital Image Processing, 2020. DOI: 10.5772 intechopen.92060, https://www.intechopen.com/chapters/71817
https://doi.org/10.5772/intechopen.92060
[14] Ehsan Samei, Donald J Peck, Projection X‐ray Imaging, Hendee's Physics of Medical Imaging, 10.1002 9781118671016, 217-242, 2019. https:// onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6
https://doi.org/10.1002/9781118671016.ch6
[15] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Triumf, 2003. https://www. amazon.com/Applied-Cryptography-ProtocolsAlgorithms-Source/dp
[16] [B. Jane. Digital Image Processing. Springer-Verlag Berlin Heidelberg, 2005. https://www.amazon.com/ Digital-Image-Processing-AlgorithmsApplications/dp/3540592989
[17] R. C. Gonzales and R.E. Woods, Digital image processing, Prentice Hall, Upper Saddle River. 2002. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/ http://sdeuoc.ac.in/sites/default/files/sde_videos/Digital% 20Image%20Processing%203rd%20ed.%20- %20R.%20Gonzalez%2C%20R.%20Woods-ilovepdfcompressed.pdf
[18] I. Tsmots, O. Riznyk, V. Rabyk, Y. Kynash, N. Kustra, M. Logoid, Implementation of FPGA-Based Barker'sLike Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) "Lecture Notes in Computational Intelligence and Decision Making", ISDMCI 2019, Advances in Intelligent Systems and Computing, vol. 1020. Springer, Cham, 2020. DOI: 10.1007/978-3-030-26474-1_15
https://doi.org/10.1007/978-3-030-26474-1_15
[19] Rafael C. Gonzalez, Richard E. Woods, "Digital Image Processing", published by Pearson Education, Inc, Publishing as Prentice Hall. 2002. http://sdeuoc.ac.in /sites/default /files/sde_videos /Digital%20Image%20 Processing%203rd%20ed.%20- %20R.%20Gonzalez%2C%20R.%20Woods-love pdfcompressed.pdf
[20] B. Girod, "The information theoretical significance of spatial and temporal masking in video signals", Proc. of the SPIE Symposium on Electronic Imaging, vol. 1077, 1989, pp.178-187. https://typeset.io/papers/the-information-theoretical-significance-of-sp....