Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2005, Physics Letters A
AI
This research introduces a chaos-based image encryption algorithm designed to enhance the security of digital multimedia information. The algorithm utilizes chaotic properties to perform pixel position shuffling and grey value alterations simultaneously, addressing vulnerabilities found in previous encryption schemes. The effectiveness is demonstrated through experimentation, showing significant differences in the histograms of the original and ciphered images, indicating improved security measures against common attack methods.
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of data via insecure channel like internet. The available encryption algorithms which are mainly used for textual data maynot be suitable for multimedia data like images. Image encryption can be done in different ways. Most of the encryption techniques have some security and performance issues. Nowadays many algorithms related to image encryption based on the chaotic method have been put forward to improve security during transmission of images. Chaos based encryption systems are mostly used because of their better performance and certain features like sensitivity to initial conditions, state ergodicity, randomness etc. The confusion and diffusion in image is increased using chaos. Chaotic maps have several advantages like enormous key space and high security. In order to reach higher performance, these chaotic based methods take advantage of the more and more complex behavior of chaotic signals. There are different dimensions of chaotic maps used for chaotic encryption like one dimensional, multidimensional and cascade chaotic system. The performance of each systems is determined by the statistical and security analysis. This work is a review of chaos based image encryption algorithms using chaotic maps of different dimensions.
Communications in Nonlinear Science and Numerical Simulation, 2012
cryptanalyzed the chaotic image encryption algorithm of [Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifur Chaos 1998;8(6):1259-1284], which was considered a benchmark for measuring security of many image encryption algorithms. This attack can also be applied to other encryption algorithms that have a structure similar to Fridrich's algorithm, such as that of [Chen G, Mao Y, Chui, C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 2004;21:749-761]. In this paper, we suggest a novel image encryption algorithm based on a three dimensional (3D) chaotic map that can defeat the aforementioned attack among other existing attacks. The design of the proposed algorithm is simple and efficient, and based on three phases which provide the necessary properties for a secure image encryption algorithm including the confusion and diffusion properties. In phase I, the image pixels are shuffled according to a search rule based on the 3D chaotic map. In phases II and III, 3D chaotic maps are used to scramble shuffled pixels through mixing and masking rules, respectively. Simulation results show that the suggested algorithm satisfies the required performance tests such as high level security, large key space and acceptable encryption speed. These characteristics make it a suitable candidate for use in cryptographic applications.
2006
In this paper a novel image encryption algorithm is proposed based on combination of pixel shuffling and three chaotic maps. This algorithm is based on pixel scrambling where in the randomness of the chaos is utilized to scramble the position of the data. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. In the proposed algorithm, the plainimage is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out. After that the shuffled image is encrypted using chaotic sequence generated by one another chaotic map. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks. Keywords—Image encryption, cha...
2014 Fifth International Conference on Signals and Image Processing, 2014
As the exchange of data over the open networks and Internet is rapidly growing, security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc.. In today's world most of the multimedia applications involve images. Earlier image encryption techniques like AES,DES,RSA etc. exhibit low levels of security and also weak anti attack ability. This problem was overcome by using chaos based cryptography. The chaotic systems are very sensitive to initial conditions and control parameters which make them suitable for image encryption. Many works have been done in the field of chaos based image encryption. In this survey paper an attempt has been made to review the aspects and approaches of the design used for image encryption.
This paper proposes a new image encryption technique based on a new chaotic system consists of joining two chaotic maps: the logistic chaotic map and the cubic chaotic map. This chaotic system is used to encrypt the R, G, B components of a colored image at the same time and the three components affect each other. So the correlations between R, G, and B components were reduced and the security of algorithm was increased. Simulation results show that the algorithm satisfy the required performance tests such as high level security and large key space which larger than the key space of related work. Keywords-one dimensions logistic map, cubic map, new chaotic map and image encryption.
A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2 883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.
Vol. 18 No. 11 NOVEMBER 2020 International Journal of Computer Science and Information Security (IJCSIS), 2020
Using the chaotic theory in the color image encryption become a popular research field in recent decades. This paper suggests a color image encryption method based on combines between 3D-Logistic maps and 2D Cat Mapping. This method depends on splitting the original color image in to three essential components Red, Green and Blue in the first stage and then using 3D-Logistic maps to generate random numbers to encrypt the information of image through generating three keys one for each essential color in the second stage. using the 2D Cat Mapping to generate random numbers to scramble the pixels in the image that got from previous step. After applying the proposed method, we obtain an image that has two levels of protection (encryption and rearranging the locations of the image pixels).
2009 International Conference on Information Engineering and Computer Science, 2009
Recently, the chaotic maps have been investigated in order to develop more secure encryption schemes. In this paper we propose a new image encryption scheme with a classic bi-modular architecture: a diffusion stage, in which the pixels of the plain image are shuffled using a random permutation generated with a new algorithm, and a confusion stage, in which the pixels are modified with a XOR-scheme. In both stages are used four piecewise linear chaotic maps with very good cryptographic properties. The results of its statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for image encryption.
IRJET, 2022
Digital images are a common part of multimedia communication, and in the current scenario they are frequently used to transmit data. Therefore, their security is a major concern for them. Chaos maps are good for encrypting images because they are chaotic, ergodic, and highly sensitive to initial conditions. Many of the past proposed image encryption methods relied on lowdimensional chaotic maps, which are the least secure and have limited resistance to brute force and statistical attacks. In attempt to overcome this difficulty, researchers have created a variety of high-dimensional chaotic maps. This review article gives a scientific evaluation of a variety of studies conducted over the recent years that have employed chaotic in various forms to process digital images in the encryption.
These paper presents the novel idea about the various image ecryption processes available specifically the encryption of the image by using chaos theory .In the recent age of communication allows us to transfer any of the information over the longer distance.but it also involves the factors of security. This paper is the overview of the chaos theories and the encryption processes available for the transmission of image over a secured media. Keywords: Chaotic maps, Image Encryption, Pixel Shuffling, Chaotic theory
First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005
In the past few years, a number of image encryption algorithms based on chaotic maps have been proposed. A recently proposed Chaotic-Key Based Algorithm (CKBA) is based on a one-dimensional Logistic map. However, it has been shown that the current CKBA model is unavoidably susceptible to chosen/known-plaintext attacks, and that the high security claims against ciphertext-only attack were overestimated by the authors. In addition, the chaotic Logistic map yields unbalanced output. In this paper we enhance the CKBA algorithm three-fold: (1)we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, (2)we increase the key size to 128 bits, and (3)-we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/known-plaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good. A security analysis for the proposed system is performed and presented.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Due to the tremendous developments in communication networks especially in the Internet network, which used to exchange many types of data by many people. Data security has become a major concern. Therefore, there is an increasing interest in the use of encryption and decryption methods. Many encryption methods have been developed to maintain data security, one of these methods that commonly used in recent are chaotic encryption systems. Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc... In this paper, we attempt to review and describe many methods used to encrypt images and make a comparison among these methods.
With the advancement in digital communication and cyber crime, security in storage and transmission of digital images over communication media becomes a key issue. Encryption is one of the ways to ensure high security by masking the information. The use of traditional cryptosystems (such as RSA, DES-like cryptosystems) is not as efficient for images as it is for text data. This paper proposes a new algorithm for image encryption and decryption using twodimensional henon map for substitution and logistic map for pseudorandom permutation. The algorithm calculates the permuting address for rows and columns by bit XOR'ing the pixels of the image with pseudorandom values generated from henon map. This is followed by diffusion making use of full chaotic property of logistic map. Therefore, the algorithm has higher key space and higher degree of scrambling. The use of two chaotic maps increases resistance to brute force attack.
It is well-known that images are different from texts in many aspects, such as highly redundancy and correlation, the local structure and the characteristics of amplitude-frequency. As a result, the methods of conventional encryption cannot be applicable to images. In this paper, we improve the properties of confusion and diffusion in terms of discrete exponential chaotic maps, and design a key scheme for the resistance to statistic attack, differential attack and grey code attack. Experimental and theoretical results also show that our scheme is efficient and very secure.
International Journal of Advanced Research in Computer Science, 2017
In modern days there are various image encryption techniques forecast for bringing image reliability and protection in the internet for the evolution of government, medical applications, military. In this paper, we analysed many encryptions techniques of digital image utilizing multiple chaotic map methods of demands of security side. For the protection purpose, it is more essential or encryption of image is important method for establish protection. There is multiple encryption of image techniques scheduled, every image encryption method and decryption schemes have its own strengths and defects. In the paper, focusing on approaches to encryption of an image by chaotic map and to enhance the method to solve the major issues of encryption of image techniques by chaotic map.
IAENG International Journal of Computer Science
Chaotic cryptography has been widely studied in the last 20 years. A common issue in the design of several proposed chaos-based cryptosystems is the use of a single chaotic map in the encoding/decoding processes, fact which leads to a low level security. We present a new symmetric keystream image encryption scheme, in which three 2D chaotic maps, recently proposed by the authors, are used instead of a single chaotic map. Those maps are derived from some plans curves equations, their trigonometric forms ensuring a large key space. The proposed scheme has a bi-modular architecture, in which the pixels are shuffled via a random permutation generated by using a new efficient algorithm, and a diffusion stage, in which the pixels' values are altered using a new XOR-scheme. In order to evaluate the security of the proposed image encryption scheme, a standard analysis was carried out.
International Journal of Engineering Research and Advanced Technology , 2021
Due to the network and multimedia application developments, information security become important since information can be attacked over the transmission channels, and the combination of cryptography and chaotic become an important field of information security, where many encryption algorithms are based on chaotic mapping due to the inherent features of Image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve a good diffused Image by setting the initial conditions to generate the shuffling sequence randomly by 2D Zaslevskii map and employ them in 2D cat map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them. For increasing the levels of security related to the encryption algorithm, the Gaffe random key generator is used to generate 128 bits keys and employ it with an exclusive-OR equation to the diffused Image. The results indicated that the combination of chaotic and cryptography proved to be good for the high-security level. The experimental results have shown that the suggested algorithm is secure due to the large key space and the high sensitivity to the secret key. This paper applies a chaotic map algorithm by Mat lab a program.
Complexity
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, such as speed, high security, affordable overheads for computation, and procedure power. In this paper, we propose a novel perturbation algorithm for data encryption based on double chaotic systems. A new image encryption algorithm based on the proposed chaotic maps is introduced. The proposed chaotification method is a hybrid technique that parallels and combines the chaotic maps. It is based on combination between Discrete Wavelet Transform (DWT) to decompose the original image into sub-bands and both permutation and diffusion properties are attained using the chaotic states and parameters of the proposed maps, which are then concerned in shuffling of pixel and operations of substitution, respectively. Security, statistical test analyses, and comparison with other techniques indicate that the proposed algorithm has promising effect and it can resist several common attacks. Namely, t...
International Journal of Computer Applications, 2015
In the present time, Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image data. Encryption technique are used in many fields such as medical science, military, geographic satellite images. Thus due to this protecting the image data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of images via insecure channel like internet. Modern cryptography technique provides essential techniques for securing information and protecting multimedia data. In recent years, many encryption technology have been proposed. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different type of chaotic based image encryption techniques and reviewed the related works for each technique. , At last, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.
Encryption of images is different from that of texts due to some basic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional means. Most of the available ciphers cannot be used directly to encrypt digital images in real-time systems because their encryption speed is not fast. In this paper, a chaotic image encryption schemes which uses a two-dimensional discretized Arnold's cat map was used for pixel permutation and a logistic map which is a one-dimensional chaotic map was used for key stream generator where the control parameter b is used as part of the secret key. The work was implemented using Microsoft Visual Basic 2008. The result shows an encrypted image which is decrypted by inverse of the map and the use of the secret keys. The chaotic system employed shows its simplicity in form and complexity in dynamics.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.