Encryption of color images using Hadamard matrices

Authors

  • Артем Олександрович Фролов UzhNU
  • Олександр Ілліч Чобаль UzhNU
  • Василь Михайлович Різак UzhNU

DOI:

https://doi.org/10.18372/2410-7840.21.14312

Keywords:

Hadamard matrix, information security, encryption, color images, web application

Abstract

There are many methods of encrypting information. Encrypting information using Hadamard matrices is one of the methods that is best for encrypting graphic information or information in the form of images. In this paper, the Hadamard matrices and their classification were investigated, and it was determined that there are four main types of Hadamard matrices: the canonical Hadamard matrices (type C), the "light" Hadamard matrix with a minimum number of elements equal to -1, the Hadamard matrix "50 / 50 "with equal number of elements equal to 1 and -1 (type M), semi-canonical Hadamard matrix (type D). Also their feature and ability to use in the image encryption method were analyzed, as well as the feature with color image encoding. An encryption method that used the Hadamard matrix to encrypt color raster images was identified. In the process, it was determined that it was sufficient to use non-orthogonal Hadamard base matrices, but in the future, 16 Hadamard 4x4 support matrices could be used to improve the crypto-stability of the application. An algorithm for encrypting image pixel combinations using the Hadamard matrices was developed. First, for each pixel of the image, this method randomly determines three Hadamard matrices R, G and B. Then, for each matrix of the encoded image, a matrix key is selected. The key matrix is generated in such a way that when you overlay one matrix on another, they form a combination of four pixels that are as close as possible to the pixel of the input / secret image. The R, G, and B matrices of one pixel of the encoded image and key overlap. The matrix data is then added to the encoded image and key image respectively according to the pixel position. As a result, the web application user receives two images (encoded image and key). Only one of them cannot play a secret image. A web application was developed that uses this encryption method to encode and decode color images.

Author Biographies

Артем Олександрович Фролов, UzhNU

PhD student, Department of Solid State Electronics and Information Security of the Physics Faculty, UzhNU

Олександр Ілліч Чобаль, UzhNU

Candidate of Physical and Mathematical Sciences, Associate Professor of the Department of Solid State Electronics and Information Security of the Physical Faculty, UzhNU

Василь Михайлович Різак, UzhNU

Doctor of Physical and Mathematical Sciences, Professor, Head of the Department of Solid State Electronics and Information Security of the Physical Faculty, UzhNU

References

Л. Дідух, М. Шовгенюк, Н. Писанчин, "Комп’ютерні методи обробки зображень для су-часних технологій захисту цінних паперів", Комп’ютерні технології друкарства, №15, С. 175-187, 2006.

Л. Дідух, М. Шовгенюк, "Класи подібних матриць Адамара", Комп’ютерні технології друкарства, №22, С. 54-64, 2010.

М. Шовгенюк, Л. Дідух, Класи подібних матриць Адамара та їх властивості, Львів, 2009, 18 c (Преп-ринт / ІФКС НАН України, ICMP-09-11U).

C. Swenson, Modern Cryptanalysis: Techniques for Advanced Code Breaking, Indianapolis, Wiley, 2008, 264 p.

H. Evangelaras, "Applications of Hadamard matrices", Journal of Telecommunications and Information Technology, pp. 3-10, 2003.

D. Stinson, An introduction to visual cryptography, presented at Public Key Solutions ’97, Toronto, Canada, April 28–30, 1997.

G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, "Visual cryptography for general access structures, Inform", Comput. 129, pp. 86-106, 1996.

G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Extended schemes for visual cryptography.

C. Blundo, A. De Santis, D.R. Stinson, "On the contrast in visual cryptography schemes", J. Cryptology, Vol. 12, pp. 261-289, 1999.

V. Rijmen, B. Preneel, "Ecient colour visual encryption for shared colors of Benetton", Eurocrypto’96, Rump Session, Berlin, 1996.

A. Rubin, "Independent one-time passwords", Comput. Systems, no. 9, pp. 15-27, 1996.

A. Shamir, "Visual cryptanalysis", Proceedings of the Euro- crypt’98, Espoo, 1998.

C. Poynton, Frequently asked questions about color. [Electronic resource]. Available: http://www. inforamp.net/∼poynton.

Published

2019-12-27

Issue

Section

Articles