Abstract
In this study, we present a technique for image encryption problem based on the underdetermined blind source separation (BSS) principle with adaptive learning rates. The encryption process is transferred as the underdetermined BSS problem and is treated by means of the key images to achieve decryption. By properly generating the key images and constructing the underdetermined mixing matrix, the proposed BSS technique can achieve the security. The proposed BSS with adaptive learning rates approach is implemented by the interval type-2 fuzzy cerebellar model articulation controller (T2FCMAC) and particle swarm optimization. The T2FCMAC system is a more generalized system with better learning ability to provide the adaptive learning rate of the BSS. Besides, the particle swarm optimization is utilized to enhance the performance of convergence. Computer simulation results are shown to illustrate the effectiveness of the proposed approach.
Introduction
With the widespread use of the computer networks, the security of image transmission has become an import topic. The image encryptions are categorized as encryption without compression, encryption combining compression [4]. Recently, Lin et al. introduced the BSS for the image encryption [23–26]. These articles utilized the intractability of the underdetermined BSS problem to present the BSS-based encryption by properly constructing the underdetermined mixing matrix for encryption [23–26]. The basic idea is to mix multiple plaintexts with a number of secret key signals, in the hope that an attacker has to solve the underdetermined BSS problems. On the decryption side, if we have the information of key images, the original images can be separated well by the BSS. In addition, in order to reduce the complex calculation of the BSS for plenty image data, the pre-processing is considered to the mixed images in the BSS. In this paper, we propose a novel BSS with gradient algorithm which adopts the T2FCMAC-based adaptive learning rates technique for solving the image encryption.
In recent years, the BSS problem has received attentions from the signal processing community and the neural network community. It has become an active research area in both statistical signal processing and unsupervised neural learning [2, 31–33]. The meaning of “blind” is that both the original sources and the way the sources were mixed are all unknown, and only mixed signals or mixtures can be measured and observed. The objective of the BSS is to recover the unknown source signals from observed mixed signals without knowing the mixing coefficients. The well-known independent component analysis (ICA) approach has been successfully applied to the BSS. The related BSS methods are also applied to many fields such as communications and biomedical engineering [6, 33].
In literature [19, 27], a fuzzy-based learning rate determination was proposed for solving the BSS problems. The fuzzy-based method performs good signal separation but the membership functions and the fuzzy rule should be set up and need expert’s experience. In order to make the learning rate selection more flexible and perform better, we adopt a novel interval type-2 fuzzy cerebellar model articulation controller (T2FCMAC) to adjust the learning rate for the BSS [29]. In this study, the T2FCMAC based-learning rate adjustment methods for the BSS are extended to image encryption problems. The T2FCMAC a generalization neural network and has better learning ability and lower computational complexity. According to the robust characteristics, the learning rate in the BSS can be selected by T2FCMAC system adaptively. Furthermore, to enhance the convergent performance of BSS problems, the particle swarm optimization (PSO) is adopted to adjust the parameters in the T2FCMAC system. To overcome the image encryption problem using BSS principle, the encryption process is formulated as the underdetermined BSS problem, and the key-images are introduced to achieve the decryption. Thus, the proposed approach has the ability of image encryption.
The rest of the paper is organized as follows. Section 2 gives the brief introduction of the underdetermined BSS principle. In Section 3, the image encryption system based on BSS is introduced. The proposed image encryption using T2FCMAC is introduced in Section 4. Simulation results are shown in Section 5. Finally, conclusion will be given.
Underdetermined BSS principle
Blind source separation (BSS) is a technique that recovers a set of unobserved signals from some observed mixtures [3]. Assume that there are n observed signals
The goal of the BSS is to recover the unknown source signals
The ideal condition is
For the BSS, there are some restrictions about the source signals. One of the restrictions is that the number of observed signals (sensor number) n should not be smaller than the number of source signals m (n ≥ m). If the sensor number is smaller than source number (n < m), this is the so-called underdetermined problem and it is difficult for BSS [6, 24]. However, the underdetermined problem is treated as an advantage to establish the security of many cryptosystems [9, 23–26]. The secret key signals introduced by Lin et al. make the determination of signals become an underdetermined problem that the key signals is unknown in the BSS [23–26]. In other words, there is an underdetermined problem, less information of the mixed signals (n < m), in the BSS for the cryptosystem, but the problem can be solved if we have the key signals to make the mixed signals to be complete (n ≥ m).
Many independent component analysis (ICA) algorithms have been proposed to solve the BSS problem [7, 29–33]. The ICA approaches measure the non-Gaussian signals to find the independent component. That is, the mixed signals can be separated well by ICA algorithm if the source signals are independent to each other. The gradient algorithm is one of popular methods for ICA and it is usually used to update the separating matrix W with
In this paper, we develop a novel BSS with gradient algorithm which adopts the adaptive learning rates technique for solving the image encryption, i.e., η (t) is time-varying and provides by the T2FCMAC and optimized by PSO algorithm.
In this section, we introduce the BSS-based image encryption system. In literature [23–26], Lin et al. construct the intractable underdetermined BSS problem in encryption that can only be solved with the key signals in decryption. According to the BSS system, there are source images
Encryption
Assume that there are m original images
In order to reduce the complex calculation of the BSS, especially for lots of image signals, the pre-process of the mixed signal matrix
After whitening, the elements in the matrix Z are uncorrelated, that is,
Thus, the mixing matrix
Furthermore, the matrix
To decrypt images from the encrypted images based on the BSS, the underdetermined problem should be solved. At first, Equation (7) is replaced by
As above, the information of the key images makes the model determinedly. Thus, the decryption can be treated well by the BSS technique.
In this paper, the mutual information is chosen as the objective function. The so-called Kullback–Leibler divergence for mutual information is defined as [31, 33]
In general, the mutual information is nonnegative when the components of separated signals
To evaluate the statistical performance of BSS, the cross-talking error is adopted to be the performance index (PI) [13, 28]
This section introduces the interval type-2 fuzzy cerebellar model articulation controller (T2FCMAC)-based learning rate for the BSS problem. At first, we give a brief introduction of the learning rate adjustment method for the BSS. Subsequently, we introduce the T2FCMAC to adjust the learning rate for the BSS. Finally, the particle swarm optimization algorithm is presented to optimize the T2FCMAC for enhancing the performance of the BSS problem.
Adaptive learning rates technique
Several adaptive learning rate methods have been developed to speed up the convergence of BSS algorithms [5, 26]. As above description, we adopt the EASI algorithm to solve the BSS problem and develop a fuzzy-based adaptive learning rate method for the EASI algorithm. In addition, techniques for selecting different step-sizes during the different stages of adaptation have been proposed. Herein, we would like to determine the learning rates with the separation states by using the T2FCMAC. The T2FCMAC implements the interval type-2 fuzzy system in CMAC structure. It can be simplified to an interval type-2 fuzzy neural network, a fuzzy neural network, and a fuzzy cerebellar model articulation controller (FCMAC) in some special cases [20]. Hence, this T2FCMAC is a more generalized network and has better learning ability to adjust the learning rate of the BSS. The proposed T2FCMAC-based learning rates adjustment for the BSS system is shown in Fig. 2. The learning rate η (t) = diag [η1 (t) , η2 (t) , …, η n (t)] of the EASI algorithm is adjusted by each T2FCMAC with correlation measure D i (t) and HD i (t) inputs, i = 1, 2, …, n. The calculation of measure D and HD will be introduced in Appendix.
Note that different output components require different learning rates. Therefore, the separated signals with higher dependence between the components should be adjusted by larger learning rate. On the other hand, the signals with lower dependence between the components should be adjusted by smaller learning rate. In addition, the T2FCMAC is optimized by the particle swam optimization algorithm to enhance the performance of our approach.
T2FCMAC system for learning rate generation
Herein, we introduce the interval type-2 fuzzy cerebeller model articulation controller (T2FCMAC), which is fed by D and HD to generate the proper learning rate for EASI algorithm. The T2FCMAC has two inputs, (D i (t) and HD i (t)), and one output, (η i (t)). The network structure of T2FCMAC is shown in Fig. 3(a). From Fig. 3(a), there are five spaces in the T2FCMAC: Input Space, Fuzzification Space, Receptive-field Space, Weight Space, and Output space. The T2FCMAC is a more generalized network with better learning ability and has lower computational complexity for practical implementation. The signal propagation and operation functions of each space are described briefly as follows. More detailed discussion and comparisons about the T2FCMAC system can be found in literature [20].
Input Space: The given control space is uniformly divided into n E regions in this space. The T2FCMAC in two dimensions with n E = 9 is shown in Fig. 3(b). The number of n E is termed as the resolution.
Fuzzification Space: This space shows the fuzzification operation of interval type-2 fuzzy systems. According to the concept of CMAC, n λ elements form a block and n λ layer presented in CMAC. The illustration example in Fig. 3(b) shows four elements form a full block. Therefore, there are four layer (n λ = 4) in the fuzzification space of T2FCMAC and three blocks (n B = 3) in each layer. Herein, we use the interval type-2 triangular asymmetric fuzzy membership function in each block [1, 21]
and
Receptive-field Space: Each location of fuzzification space corresponds to an area in this space. By using t-norm product, the receptive-field space is defined as
Note that the outputs of fuzzification space are interval sets, the outputs of receptive-field space are interval sets as well. Accordingly, the output of this space consists of its lower bound and upper bound .
Weight Space: Each location of receptive-field space corresponds to a particular adjustable value in the weight space. The weight space is expressed as
Output Space: The output of the T2FCMAC is the algebraic sum of the receptive-field space and weight space. Finally, the learning rate for BSS is
In order to enhance the performance of the BSS with T2FCMAC-based learning rates adaptation, the T2FCMAC system is optimized by the particle swarm optimization (PSO). The PSO algorithm is evolutionary algorithm of swarm intelligence techniques [11–13, 16], which is motivated by social behavior of organisms such as bird flicking and fish schooling. It is a population-based algorithm that exploits a population of individuals to probe for promising regions in a search space.
Each particle moves to a new positionx1 (t + 1) according to the new velocity v1 (t + 1) which includes its previous velocity v
l
(t), and the moving vectors according to the particle’s past best solution Pbest,1 (t + 1) and global best solution Gbest,1 (t + 1). The particle position updates laws are [12, 15]
Subsequently, we select the second-order correlation measure D to be the fitness function (or objective function) of optimization. As the properties of the measures D and HD, the output states are almost independent to each other if both D and HD are sufficiently small. The separations are worse if either D or HD is large (or small enough). On the other hand, the output is correlated with another output when the D and HD are not small enough. Since D i (t) and HD i (t) perform the dependence measure of separated signals, they present the information of the learning rate selection in the BSS. In order to obtain the suitable learning rate η i (t), both D i (t) and HD i (t) are adopted to be the inputs of the learning rate selection system and we can obtain the better learning rates for the BSS through the optimization process.
Herein, the PSO algorithm is utilized to optimize the T2FCMAC parameters according to the evaluation of second-order correlation measure D. Therefore, the particle denotes the adjustable T2FCMAC parameters, , , , , , , γ, c, and s. Thus, consider the T2FCMAC having n λ layers and n B blocks, the dimensions of particle are n λ × n B × 2 ×7 for fuzzification space and n λ × n B × 2, for weight space.
In this section, the simulation results of image encryption based on the BSS principle using the T2FCMAC-based learning rate is introduced. To illustrate the underdetermined problem in the BSS, there are two examples to be compared with. One is to encrypt the original images with the key images when there are no key images in the decrypted model which is categorized as the underdetermined problem. Another one is to encrypt the original images with the key images; this means that it has the key images in the decrypted model.
Herein, two original images (Lena and kitten) shown in Fig. 5(a) are used for the illustrated the example. Both of the images are 128×128 pixels and will be processed under gray scale in range [0–255]. The key images, as the same number of the original images which are generated randomly in range [0–255], shown in Fig. 5(b). In order to compare the results in the two examples, we set the same initial state here. The mixing matrix A is given as
To process the images, they are turned 2-D into 1-D. The horizontal scanning with line by line is adopted. The specifications of computer for the simulation are, Operating System (OS): Microsoft Windows XP, Central Processing Unit (CPU): i5-2500K, and Random Access Memory (RAM): 3.24GB.
Herein, we use the EASI algorithm to develop the proposed BSS-based encryption system. The EASI algorithm with fixed learning rate (denoted EASI) and T2FCMAC-based adaptive learning rate adjusted by PSO are introduced to illustrate the performance of our proposed approach. The fixed learning rate of the traditional EASI is chosen as η = 0.2. For the T2FCMAC, the initial parameters, , , , , , , and γ, are selected randomly in the own block but restricted and 0.5 ≤ γ ≤ 1 for the interval type-2 triangular asymmetric fuzzy membership function. The parameters c and s in the weight space are initialized in the range of [0, 1]. Since n λ = 4 and n B = 3, the partial representation has 192 parameters. The particle number of T2FCMAC is half number of the partial representation (96). In PSO, the parameters are given by w = 0.35, c1 = 0.75, and c2 = 0.75, respectively.
Herein, we have the information of key images in the decrypted model. The mixed model of the BSS is present as the Equation (24). The T2FCMAC-based BSS method for image encryption system without key images decrypting is shown in Fig. 1. For the image decryption, there is information of key images to make the BSS determined. The decrypted images, decrypted from encrypted images with key images in the BSS, are shown in Fig. 6.
Since there are four images, two encrypted images and two key images, as the input of the T2FCMAC-based BSS, then the outputs are four images. In the Fig. 7, the original images are presented in y1 and y3, and the key images are presented in y2 and y4. In addition, the decrypted images show the uncertainties of ICA. They not only present the uncertain permutation but also perform the uncertain scaling. The pixel values in decrypted images opposite to the values in original images, shown in y1 and y3. With the key images in decryption model, the underdetermined BSS problem is solved and the original image can be recovered from the encrypted images. The performance of the T2FCMAC-based BSS method for the image encryption system is shown in Fig. 7. The T2FCMAC-based learning rate for the BSS system shows the better performance than EASI with fixed learning rate method. This demonstrates the effectiveness and performance of our approach.
In this paper, the underdetermined BSS problem with adaptive learning rates technique was utilized for the image encryption to ensure the security of cryptosystem. With the information of key images, it is a determined system for BSS and the original images can be recovered well by the proposed method. The proposed adaptive learning rates approach was implemented by using the T2FCMAC. To enhance the performance of convergence, the T2FCMAC system is optimized by PSO algorithm. Simulation results have shown the effectiveness and performance of our approach.
The mutual information I (
Herein, we introduce the calculation of dependence measure D and HD. Assume that
It is useful to adopt D
i
(t) to measure the dependence between two Gaussian signals. However, a limitation of BSS is that there is at most one Gaussian source signal. Therefore, we consider the high order correlation measure to ensure the restriction of BSS. The high order correlation measure is defined as
Footnotes
Acknowledgments
The authors would like to thank anonymous reviewers and Associate Editor for their insightful comments and valuable suggestions. This work was supported in part by the National Science Council, Taiwan, R.O.C., under contracts MOST-100-2221-E-005-093-MY2, MOST-102-2221 -E-005-95-MY2.
