Image Encryption based on Floating-Point Representation

In this paper we have presented a new design random numbers generator based on single precision floating point(RNG-SFP). Randomness of RNG-SFR is used for encryption the images. The new technique has advantage of bigger key space, smaller iteration times and high security analysis such as key space analysis. The experimented result show that the proposed technique is efficient and has high security feature


Introduction
Because the Internet has become a very big, Digital photos and videos security, it has become a necessary issue to whole Internet users.Therefore, the cryptography styles can be used to conserve the information before transmission.Transform the important information into garbage data so that no hackers can read the data called the encryption; the researchers suggested a lot of algorithms to cryptography the information such as DES, IDES and RSA.On the other hand, specific styles and specific rules need to be considered to secure the images and multimedia application.Image cryptography systems random distribution rhymester uses.
Chaos is one of the most important notions that are utilized to generate a random chain because of rising suspicion of the cryptography process, which first used in the computer in 1963 by Edward Lorenz. .It was used in the chaos cryptography system due to its advantages, such as sensitivity to prime stipulations and the inability predict the sequence of chaos.Many roads in the attempt to design algorithms to encrypt the image using the chaos, such as [1] uses multiple chaotic maps to encrypt images by splitting the system in the first place in two stages.In the first stage by using a Arnold Cat map pixels are permuted and then in the second stage the permuted pixels are encrypt using multi-chaotic maps.In [2] where used one-dimensional detached Chebyshev chaotic series for column and row jostle for every pixel on the main image.
[3] Used Rossler chaotic system to augmentation the suspicion in the cipher images by performing changes in the pixels value and their postures.[4] To cryptography the image and increment the size of the encrypted keys in cipher the one time pads are used together with the logistic map (as a chaotic function).In [5] to cryptography the image without using any chaotic functions; it was used a knight's tour with slips cryptography filter.However, analyzed security results, hurdles and the power of the chaotic systems [6,7,8].In this sheet, we used a double The number is represented in normalized scientific notation by a fraction multiplied and the pioneer digit in the portion is not zero "except when the number involved is zero" so we write as , not as or or some other way.
The word length in numerous binary computers is 32 bits (binary digits) we shall characterize

Proposed system mode
The propose image encryption algorithm consists of two stage iteration (multilevel) block permeation and nonlinear key stream cipher.

proposed key generation
In this section of the pseudo-random number generation and the structure is based on

Result and Analysis
In this paragraph will be tested on Statistics generated by the algorithm mentioned above, where the key was conducted four tests which tests, 10000 key length and the results were as shown in the table below )frequency test، serial test، poker test، runs test (  Entropy) The results were so good that hold up against the statistical analysis and differential analysis.

Figure 1 2
Figure 1 Partitioned floating-point single-precision computer word

Figure 2
Figure 2 Encryption / Decryption image was to provide a new random number generator depends on (Floating-Point Representation) Where it was generating an initial value through a function numbers  =   (Floating-Point).The result was characterized by sequential access to statistical characteristics of a good where succeeded in statistical tests as in the Table FIGURE 7.After that has been adopted on a row in the encrypted image of colorful Bmp type where the results were as shown in Table FIGURE 9, It was chosen as the resulting image in the encryption key based on the proposed test methods (Correlation Coffiencal Vertical , Correlation Coffiencal Vertical and

Table 2 Statistical tests Where
the key that is configured of the proposed algorithm has been applied in the encrypted color image has been holding a series of measurements or tests (Entropy, Histogram, Correlation Coffiencal Horizontal, Correlation Coffiencal Vertical) As shown in the chart