Encryption of color images using Hadamard matrices
DOI:
https://doi.org/10.18372/2410-7840.21.14312Keywords:
Hadamard matrix, information security, encryption, color images, web applicationAbstract
There are many methods of encrypting information. Encrypting information using Hadamard matrices is one of the methods that is best for encrypting graphic information or information in the form of images. In this paper, the Hadamard matrices and their classification were investigated, and it was determined that there are four main types of Hadamard matrices: the canonical Hadamard matrices (type C), the "light" Hadamard matrix with a minimum number of elements equal to -1, the Hadamard matrix "50 / 50 "with equal number of elements equal to 1 and -1 (type M), semi-canonical Hadamard matrix (type D). Also their feature and ability to use in the image encryption method were analyzed, as well as the feature with color image encoding. An encryption method that used the Hadamard matrix to encrypt color raster images was identified. In the process, it was determined that it was sufficient to use non-orthogonal Hadamard base matrices, but in the future, 16 Hadamard 4x4 support matrices could be used to improve the crypto-stability of the application. An algorithm for encrypting image pixel combinations using the Hadamard matrices was developed. First, for each pixel of the image, this method randomly determines three Hadamard matrices R, G and B. Then, for each matrix of the encoded image, a matrix key is selected. The key matrix is generated in such a way that when you overlay one matrix on another, they form a combination of four pixels that are as close as possible to the pixel of the input / secret image. The R, G, and B matrices of one pixel of the encoded image and key overlap. The matrix data is then added to the encoded image and key image respectively according to the pixel position. As a result, the web application user receives two images (encoded image and key). Only one of them cannot play a secret image. A web application was developed that uses this encryption method to encode and decode color images.
References
Л. Дідух, М. Шовгенюк, Н. Писанчин, "Комп’ютерні методи обробки зображень для су-часних технологій захисту цінних паперів", Комп’ютерні технології друкарства, №15, С. 175-187, 2006.
Л. Дідух, М. Шовгенюк, "Класи подібних матриць Адамара", Комп’ютерні технології друкарства, №22, С. 54-64, 2010.
М. Шовгенюк, Л. Дідух, Класи подібних матриць Адамара та їх властивості, Львів, 2009, 18 c (Преп-ринт / ІФКС НАН України, ICMP-09-11U).
C. Swenson, Modern Cryptanalysis: Techniques for Advanced Code Breaking, Indianapolis, Wiley, 2008, 264 p.
H. Evangelaras, "Applications of Hadamard matrices", Journal of Telecommunications and Information Technology, pp. 3-10, 2003.
D. Stinson, An introduction to visual cryptography, presented at Public Key Solutions ’97, Toronto, Canada, April 28–30, 1997.
G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, "Visual cryptography for general access structures, Inform", Comput. 129, pp. 86-106, 1996.
G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Extended schemes for visual cryptography.
C. Blundo, A. De Santis, D.R. Stinson, "On the contrast in visual cryptography schemes", J. Cryptology, Vol. 12, pp. 261-289, 1999.
V. Rijmen, B. Preneel, "Ecient colour visual encryption for shared colors of Benetton", Eurocrypto’96, Rump Session, Berlin, 1996.
A. Rubin, "Independent one-time passwords", Comput. Systems, no. 9, pp. 15-27, 1996.
A. Shamir, "Visual cryptanalysis", Proceedings of the Euro- crypt’98, Espoo, 1998.
C. Poynton, Frequently asked questions about color. [Electronic resource]. Available: http://www. inforamp.net/∼poynton.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).