Research Journal of Applied Sciences, Engineering and Technology 9(11): 969-981, 2015 ISSN: 2040-7459; e-ISSN: 2040-7467 © Maxwell Scientific Organization, 2015 Submitted: October 29, 2014 Accepted: December 18, 2014 Published: April 15, 2015 Corresponding Author: Lahieb Mohammed Jawad, UTM-IRDA Digital Media Center (MaGIC-X), Faculty of Computing, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia 969 Classification of Novel Selected Region of Interest for Color Image Encryption 1, 2 Lahieb Mohammed Jawad and 1 Ghazali Sulong 1 UTM-IRDA Digital Media Center (MaGIC-X), Faculty of Computing, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia 2 Department of Network Engineering, College of Information Engineering, Al-Nahrain University, Baghdad, Iraq Abstract: Securing digital image in exchanging huge multimedia data over internet with limited bandwidth is a significant and sensitive issue. Selective image encryption being an effective method for reducing the amount of encrypted data can achieve adequate security enhancement. Determining and selecting the region of interest in digital color images is challenging for selective image encryption due to their complex structure and distinct regions of varying importance. We propose a new feature in acquiring and selecting Region of Interest (ROI) for the color images to develop a selective encryption scheme. The hybrid domain is used to encrypt regions based on chaotic map approach which automatically generates secret key. This new attribute is a vitality facet representing the noteworthy part of the color image. The security performance of selective image encryption is found to enhance considerably based on the rates of encrypted area selection. Computation is performed using MATLAB R2008a codes on eight images (Lena, Pepper, Splash, Airplane, House, Tiffany, Baboon and Sailboat) each of size 512*512 pixels obtained from standard USC-SIPI Image Database. A block size of 128*128 pixels with threshold levels 0.0017 and 0.48 are employed. Results are analyzed and compared with edge detection method using the same algorithm. Encrypted area, entropy and correlation coefficients performances reveal that the proposed scheme achieves good alternative in the confined region of interest, fulfills the desired confidentiality and protects image privacy. Keywords: Block cipher, chaotic map, hybrid domain, ROI, selective image encryption, vitality feature INTRODUCTION Lately, the exponential escalation in multimedia technology and exhaustive exploitations of internet in transmitting and storing gigantic amount of digital data with limited bandwidth and small storage capacity posed substantial threat towards data security and safety. Images being the widely used multimedia information in assorted fields of applications demand secured transmission (Rehman et al., 2014). Image Encryption (IE) is an established technique that is used to keep image safety. The rationale of developing a precise IE scheme is to modify the original image by encoding it in such a way so that it appears non-understandable for unauthorized users. In short, the idea of encryption is to ensure the utter secrecy via data conversion into a form called a ciphertext. Usually, IE requires vast amount of processing requirements which is ever-demanding for an efficient solution (Ullah et al., 2013). Consequently, efforts are dedicated to remarkably reduce the encrypted digital contents via the Selective Image Encryption (SIE) that only encrypts a part of the image (Puech et al., 2013). The fundamental concept of SIE is based on analyzing and identifying the significant and insignificant image regions followed by the encryption of significant areas (Hoang and Tran, 2014; Metzler and Agaian, 2010). In fact, occurrence of a tiny error in the significant part causes substantial change in the image. Conversely, slight modifications in the insignificant part does not induce much effect on the image (Bhatnagar and Jonathan Wu, 2012). Moreover, the encrypted parts in SIE scheme must be independent of the unencrypted parts (Suresh and Madhavan, 2012). Figure 1 illustrates the general architecture of SIE system consisting of two main phases such as selected and encrypted ROI. The successful implementation of selective encryption relies on the sizeable reduction in the amount of encrypted area producing satisfactory security level. Subsequently, different encryption algorithm in spatial and frequency domains are developed (Jawad and Sulong, 2013). Nevertheless, ROI based algorithm are limited in determining the correct region of interest because each image use different criteria for determining ROI (Dutta and Chaudhuri, 2009). Therefore, feature extraction that decides the ROI requires further improvement. Furthermore, most of the SIE techniques based on the encrypted area as significant region fail to satisfy the requirements for high security level (Steffi and Sharma, 2011; Puech et al., 2013).