: pp. 5-10
Національний університет "Львівська політехніка", кафедра інформаційних технологій видавничої справи
Lviv Polytechnic National University
Національний університет “Львівська політехніка”

An image as a stochastic signal is one of the most common forms of information. Protecting images from unauthorized access and applying is a correspondingly urgent task. This causes the use of well-known classical encryption methods in the case of image encryption. But the image is a signal that possesses, in addition to typical informativeness, also visual informativeness. Informativeness for modern image processing methods makes it possible to ensure unauthorized access. Creating an attack on an encrypted image is possible in two ways: by traditional hacking of encryption methods, or by classical methods of visual image processing (filtering, highlighting contours, etc.). In this regard, one more requirement is put forward to encryption methods in the case of their application concerning images - this is the complete noise of the encrypted image. This is necessary so that the use of visual image processing methods becomes impossible. The RSA algorithm is one of the most widely known industrial standards for encrypting signals. Unlike symmetric encryption, in an open-key encryption scheme, it is impossible to calculate the decryption procedure, knowing the encryption procedure. Namely, the working time of the algorithm for calculating the decryption procedure is so great that it cannot be implemented on any modern computers, as well as on computers of the future. Such coding schemes are called asymmetric. Therefore, the urgent task is to implement the application of the RSA algorithm so that when encrypting an image: – the cryptographic stability of the RSA algorithm has not become worse; – the full image noise was achieved to prevent the use of visual image processing techniques. The algorithm of elements of the RSA algorithm, as the most resistant to unauthorized decryption of signals, and bitwise operations for a compatible combination during encryption and decryption of images is proposed by the authors. Encryption - decryption is performed without additional noise. The proposed algorithm is applied to images in which there are strictly extracted contours. Elements of the RSA algorithm are assigned to perform bitwise operations on the intensity values of pixels of a color image. The developed algorithm has higher cryptographic stability compared to the traditional RSA algorithm. The authors described the possibilities of using elements of the RSA algorithm in bitwise transformations when encrypting and decrypting images. The results of encryption simulation for cryptographic transformations of color images of a given dimension are presented. Modified models and algorithmic procedures of key formation processes of direct and inverse cryptographic transformations have been developed. They are reduced to elemental mathematical operations.

[1] Michael Vollmer, Klaus-Peter Mollmann, Fundamentals of Infrared Thermal Imaging. Infrared Thermal Imaging, 10.1002 9783527693306, 2017. enus/Infrared+Thermal+Imaging:+Fundamentals,+Resear ch+and+Applications,+2nd+Edition-p-9783527413515
[2] B. Usmonov, O. Evsutin, A. Iskhakov, A. Shelupanov, A. Iskhakova, R. Meshcheryakov, "The cybersecurity in development of IoT embedded technologies", in Proc. International Conference on Information Science and Communications Technologies (ICISCT) IEEE, 2017, pp. 1-4. DOI: 10.1109/ICISCT.2017.8188589
[3] D. Wagh, H. Fadewar, & G. Shinde, "Biometric Finger Vein Recognition Methods for Authentication", Computing in Engineering and Technology, pp. 45-53, 2020. DOI: 10.1007/978-981-32-9515-5-5
[4] P. Chanukya, T. Thivakaran, "Multimodal biometric cryptosystem for human authentication using fingerprint and ear", Multimedia Tools and Applications, 79(1-2), pp. 659-673, 2020. DOI: 10.1007/s11042-019-08123-w
[5] L.Valechha, H. Valecha, V. Ahuja, T. Chawla, & S. Sengupta, "Orisyncrasy - An Ear Biometrics on the Fly Using Gabor Filter", In Advances in Data Sciences, Security and Applications, pp. 457-466, 2020. DOI: 10.1007/978-981-15-0372-6-37
[6] J. Yang, L. Liu, T. Jiang, Y. Fan, "A modified Gabor filter design method for fingerprint image enhancement", Pattern Recognition Letters, 24(12), pp. 1805- 1817, 2003. DOI: 10.1016/S0167-8655(03)00005-9.
[7] Majid Rabbani, Rajan Joshi. "An overview of the JPEG2000 still image compression standard", Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication, no. 17, vol. 1, pp. 3- 48, 2002. aspx?referenceid=727652
[8] A. Kovalchuk, I. Izonin, C. Strauss, M. Podavalkina, N. Lotoshynska, N. Kustra. "Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems", CEUR Workshop Proceedings, vol. 2533, 2019, pp. 139-150. istcmtm2020.04.025
[9] A. Kovalchuk, I. Izonin, Gregush Ml, M., N. Lotoshyiiska, "An approach towards image encryption and decryption using quaternary fractional-linear operations", Procedia Computer Science, vol. 160, 2019, pp. 491-496. Conference Paper (Open Access), DOI : 10.1016 /j.procs. 2019.11.059
[10] S. X. Liao and M. Pawlak, "On image analysis by moments", IEEE Transaction on Pattern Analysis and Machine Intelligence, 18, no. 3, pp. 254-266.
[11] [E. M. Haacke, R.W. Brown, M.R. Thompson and R. Venkatesan, Magnetic Resonance Imagin: Physical Principles and Sequence Design. John Wiley & Sons, New York, 1999. Resonance+Imaging:+Physical+Principles+and+Sequence +Design,+2nd+Edition-p-9780471720850
[12] J. T. Kajiya, The rendering equation. Computer Graphics, vol. 20, is. 4, 143-150, 1986. doi/10.1145/15886.15902
[13] [ M. Sarfraz. Introductory Chapter: On Digital Image Processing, 2020. DOI: 10.5772 intechopen.92060,
[14] Ehsan Samei, Donald J Peck, Projection X‐ray Imaging, Hendee's Physics of Medical Imaging, 10.1002 9781118671016, 217-242, 2019. https://
[15] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Triumf, 2003. https://www.
[16] [B. Jane. Digital Image Processing. Springer-Verlag Berlin Heidelberg, 2005. Digital-Image-Processing-AlgorithmsApplications/dp/3540592989
[17] R. C. Gonzales and R.E. Woods, Digital image processing, Prentice Hall, Upper Saddle River. 2002. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/ 20Image%20Processing%203rd%20ed.%20- %20R.%20Gonzalez%2C%20R.%20Woods-ilovepdfcompressed.pdf
[18] I. Tsmots, O. Riznyk, V. Rabyk, Y. Kynash, N. Kustra, M. Logoid, Implementation of FPGA-Based Barker'sLike Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) "Lecture Notes in Computational Intelligence and Decision Making", ISDMCI 2019, Advances in Intelligent Systems and Computing, vol. 1020. Springer, Cham, 2020. DOI: 10.1007/978-3-030-26474-1_15
[19] Rafael C. Gonzalez, Richard E. Woods, "Digital Image Processing", published by Pearson Education, Inc, Publishing as Prentice Hall. 2002. /sites/default /files/sde_videos /Digital%20Image%20 Processing%203rd%20ed.%20- %20R.%20Gonzalez%2C%20R.%20Woods-love pdfcompressed.pdf
[20] B. Girod, "The information theoretical significance of spatial and temporal masking in video signals", Proc. of the SPIE Symposium on Electronic Imaging, vol. 1077, 1989, pp.178-187.