DOI QR코드

DOI QR Code

이미지 암호화 및 다양한 잡음에 내성을 갖춘 PingPong 256 Shuffling 방법

PingPong 256 shuffling method with Image Encryption and Resistance to Various Noise

  • Kim, Ki Hwan (Department of Ubequertus IT, Dongseo University) ;
  • Lee, Hoon Jae (Department of Computer Engineering, Dongseo University)
  • 투고 : 2020.07.09
  • 심사 : 2020.09.08
  • 발행 : 2020.11.30

초록

고화질 이미지는 정보가 많아 민감한 데이터는 민간기업이나 군사용 암호화에 의해 저장된다. 암호화된 영상은 비밀키를 통해서만 해독이 가능하지만, 일부 픽셀 데이터를 임의의 값으로 덮어쓰는 공유 공격 및 노이즈 공해 공격 기법의 공격을 받아도 원본 데이터는 보존할 수 없다. 중요한 데이터는 공격에 대한 복구 방법에 대한 대책이 더 필요하다는 것이다. 본 논문에서는 난수 발전기 PingPong 256과 셔플링 방법을 제안한다. PingPong 256은 영상이고 영상 암호화는 더 빠르게 수행할 수 있다. 또한 셔플링 방식은 화소를 재조정하여 Shear attack과 Noise pollution attack 기법에 저항하는 것이다. 다음으로 제안한 PingPong256을 SP800-22로 검사하고 다양한 노이즈에 대한 내성을 테스트하고 셔플 링 방식이 적용된 이미지가 Anti-shear attack과 Anti-noise pollution attack을 만족하는지 검증했다.

High-quality images have a lot of information, so sensitive data is stored by encryption for private company, military etc. Encrypted images can only be decrypted with a secret key, but the original data cannot be retained when attacked by the Shear attack and Noise pollution attack techniques that overwrite some pixel data with arbitrary values. Important data is the more necessary a countermeasure for the recovery method against attack. In this paper, we propose a random number generator PingPong256 and a shuffling method that rearranges pixels to resist Shear attack and Noise pollution attack techniques so that image and video encryption can be performed more quickly. Next, the proposed PingPong256 was examined with SP800-22, tested for immunity to various noises, and verified whether the image to which the shuffling method was applied satisfies the Anti-shear attack and the Anti-noise pollution attack.

키워드

참고문헌

  1. Security news, CCTV data deletion to hide negligence is useless! [Internet]. Available: https://www.boannews.com/media/view.asp?idx=63311
  2. JoongAng Ilbo, CCTV footage that disappeared one day and the scheme of daycare center directors. [Internet]. Available: https://news.joins.com/article/23493244
  3. K. H. Kim, H. J. Lee, and Y. S. Lee, "Proposed image encryption method using PingPong256," Journal of the Korea Society of Computer and Information, vol. 25, no. 1, pp. 71-77, Jan. 2020. https://doi.org/10.9708/JKSCI.2020.25.01.071
  4. A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangle, D. Banks, A. Heckert, J. Dray, and S. Vo. "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, Sp 800-22 rev. 1a, 2001.
  5. M. Makoto. "Linear feedback shift register," US Patent No. 5,090,035, to NEC Corp, Patent and Trademark Office, Tokyo, 1992.
  6. S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Optics & Laser Technology, vol. 57, pp. 327-342, Apr. 2014. https://doi.org/10.1016/j.optlastec.2013.05.023
  7. Y. Liu, J. Wang, J. Fan, and L. Gong, "Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences," Multimedia Tools and Applications, vol. 75, no. 8, pp. 4363-4382, Feb. 2015.
  8. Y. Wu, J. Noonan, and S. Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications, vol. 1, no. 2, pp. 31-38, Apr. 2011.
  9. X. Wang and J. Yang, "A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system," Optik, vol. 217, no. 164884, May. 2020.
  10. Y. Su, W. X. Su, and Z. Jie, "Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography," Optics and Lasers in Engineering, vol. 128, no. 106042, Jan. 2020.
  11. F. Yang, J. Mou, C. Ma, and Y. Cao, "Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application," Optics and Lasers in Engineering, vol. 129, 106031, Jan. 2020.
  12. C. Pak and L. Huang, "A new color image encryption using combination of the 1D chaotic map," Signal Processing, vol. 138, pp. 129-137, Mar. 2017. https://doi.org/10.1016/j.sigpro.2017.03.011
  13. H. Liu and X. Wang, "Image encryption using DNA complementary rule and chaotic maps," Applied Soft Computing, vol. 12, no. 5, pp. 1457-1466, Dec. 2014.
  14. D. E. ElKamchouchi, H. G. Mohamed, and K. H. Moussa, "A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion," Entropy, vol. 22, no. 2, 180, Feb. 2020. https://doi.org/10.3390/e22020180
  15. Y. Wan, S. Gu, and B. Du, "A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding," Entropy, vol. 22, no. 2, 171, Jan. 2020. https://doi.org/10.3390/e22020171
  16. I. Jarin, S. A. Fattah, and C. Shahnaz, "Natural and Medical Image Encryption using Self-Adaptive Permutation and DNA Encoding," in Proceeding of the 2018 IEEE International WIE Conference on Electrical and Computer Engineering, Chonburi: Thailand, pp. 99-102, 2018.
  17. X. Y. Wang and Z. M. Li, "A color image encryption algorithm based on Hopfield chaotic neural network," Optics and Lasers in Engineering, vol. 115, pp. 107-118, Apr. 2019. https://doi.org/10.1016/j.optlaseng.2018.11.010
  18. J. S. Jeong and Y. J. Kim, "Structural Similarity Index for Image Assessment Using Pixel Difference and Saturation Awareness," Journal of KIISE, vol. 41, no. 10, pp. 847-858, Oct. 2014. https://doi.org/10.5626/JOK.2014.41.10.847
  19. S. B. Rhee, J. H. Kang, and K. H. Kim, "Local Differential Pixel Assessment Method for Image Stitching," Journal of Broadcast Engineering, vol. 24, no. 5, pp. 775-784, Sep. 2019. https://doi.org/10.5909/JBE.2019.24.5.775