Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2 883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.
2006
In this paper a novel image encryption algorithm is proposed based on combination of pixel shuffling and three chaotic maps. This algorithm is based on pixel scrambling where in the randomness of the chaos is utilized to scramble the position of the data. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. In the proposed algorithm, the plainimage is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out. After that the shuffled image is encrypted using chaotic sequence generated by one another chaotic map. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks. Keywords—Image encryption, cha...
International Journal of Computer Applications, 2015
In the present time, Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image data. Encryption technique are used in many fields such as medical science, military, geographic satellite images. Thus due to this protecting the image data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of images via insecure channel like internet. Modern cryptography technique provides essential techniques for securing information and protecting multimedia data. In recent years, many encryption technology have been proposed. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different type of chaotic based image encryption techniques and reviewed the related works for each technique. , At last, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.
TELKOMNIKA Telecommunication Computing Electronics and Control, 2020
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Due to the tremendous developments in communication networks especially in the Internet network, which used to exchange many types of data by many people. Data security has become a major concern. Therefore, there is an increasing interest in the use of encryption and decryption methods. Many encryption methods have been developed to maintain data security, one of these methods that commonly used in recent are chaotic encryption systems. Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc... In this paper, we attempt to review and describe many methods used to encrypt images and make a comparison among these methods.
International Journal of Computer Network and Information Security, 2012
In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryption is proposed. It is a simple block cipher based on logistic chaotic maps and cipher block chaining (CBC). The new system utilizes simplicity of implementation, high quality, and enhanced security by the combined properties of chaos and CBC cipher. Implementation of the proposed technique has been realized for experimental purposes, and tests have been carried out with detailed analysis, demonstrating its high security. Results confirm that the scheme is unbreakable with reference to many of the well-known attacks. Comparative study with other algorithms indicates the superiority of CMBC security with slight increase in encryption time.
2009
In the past decade, a number of image encryption algorithms based on chaotic maps have been proposed. Recently, an image encryption algorithm based on chaotic map lattice (CML) is proposed that allows direct encryption and decryption of color digital images. In this paper, we propose an enhanced CML based algorithm for image encryption to improve the security of the algorithm. The performance of the proposed algorithm is analyzed through computer simulations. It is shown that the enhanced algorithm successfully and completely encrypts the color images and provides more distortion to the plainimages than previously proposed CML based algorithm for the same set of parameters. It is also shown that the proposed algorithm is more sensitive to a small change in plainimages, number of iterations and number of cycles. This makes the proposed algorithm more efficient and improves the level of security provided by the algorithm.
2009 International Conference on Information Engineering and Computer Science, 2009
Recently, the chaotic maps have been investigated in order to develop more secure encryption schemes. In this paper we propose a new image encryption scheme with a classic bi-modular architecture: a diffusion stage, in which the pixels of the plain image are shuffled using a random permutation generated with a new algorithm, and a confusion stage, in which the pixels are modified with a XOR-scheme. In both stages are used four piecewise linear chaotic maps with very good cryptographic properties. The results of its statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for image encryption.
International Journal of Image, Graphics and Signal Processing
With the extensive recent development of communication methods and resulting increase in data surveillance and espionage, the need for reliable data encryption methods is greater than ever. Conventional encryption calculations, for example, DES and RSA, are not beneficial in the field of picture encryption because of some inherent characteristics of pictures such as bulk data size and high redundancy, which are problematic for conventional encryption. Many researchers have proposed different image encryption schemes to overcome image encryption problems. In the last two decades, more and more studies have looked to incorporate conventional encryption methods and the complex behavior of chaotic signals. In this paper, a novel image encryption algorithm is proposed based on pixel chaotic permutation. A chaotic logistic map and Ikeda map are used to design a new pseudo-random bit generator, and a novel permutation scheme is used to modify pixel values. Then, a new permutation algorithm based on a traditional Japanese game called Amidakuji is used for pixel scrambling. Different statistical manners, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, are used to provide analysis of the effectiveness of the proposed encryption methods. Our example reveals that the proposed encryption method can obtain highly secure encrypted images using a novel chaotic permutation method based on Amidakuji.
Informatica, 2020
This paper proposes a new family of 4-dimensional chaotic cat maps. This family is then used in the design of a novel block-based image encryption scheme. This scheme is composed of two independent phases, a robust light shuffling phase and a masking phase which operate on imageblocks. It utilizes measures of central tendency to mix blocks of the image at hand to enhance security against a number of cryptanalytic attacks. The mixing is designed so that while encryption is highly sensitive to the secret key and the input image, decryption is robust against noise and cropping of the cipher-image. Empirical results show high performance of the suggested scheme and its robustness against well-known cryptanalytic attacks. Furthermore, comparisons with existing image encryption methods are presented which demonstrate the superiority of the proposed scheme.
Due to the rise in the use of internet facility for data/information transmission, the data must be kept secured. The data to be transferred can also be an images. So that images being transmitted through the internet must also be kept much secured for gaining the trust from the users. The image encryption can be performed through many ways. The proposed method of image encryption is by mapping with the chaotic maps provided as chaos theory. The original image will be divided in to different blocks, then permute and diffuse separately at the pixel level of each block. Finally combine and diffuse the permuted image as a cipher image. The proposed method also experimented and tested to reach the current need of image encryption to maintain the security among the users.
2016
Noora Shihab Ahmed Collage of Science, Department of Computer Science, Halabja University Halabja, Kurdistan, Iraq [email protected] Abstract-The key stream generator is the key design issue of an encryption system. In this work presents an n-array three key stream generators (KSI, KSII and KSIII), Based on permutation of three chaotic maps (Logistic map, Kent map and tent map). This work reviews of some image encryption algorithm and finally investigate three methods for image encryption. First algorithm is encryption of original image by using KSI system. Second algorithm relies on KSII system to randomly generate two sequences of numbers by means of selecting proper factors along with seed value. Afterwards, the randomly produced numbers are employed to permute the image by means of shuffling its rows, columns and pixels sequentially in a manner by which first sequence is utilized to shuffle rows while second sequence is utilized to shuffle columns. Afterwards masking pro...
Journal of Imaging
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet. One way of achieving secure image transmission over the network is encryption techniques that convert the original image into a non-understandable or scrambled form, called a cipher image, so that even if the attacker gets access to the cipher they would not be able to retrieve the original image. In this study, chaos-based image encryption and block cipher techniques are implemented and analyzed for image encryption. Arnold cat map in combination with a logistic map are used as native chaotic and hybrid chaotic approaches respectively whereas advanced encryption standard (AES) is used as a block cipher approach. The chaotic and AES methods are applied to encrypt images and are subjected to measures of different performance parameters such as peak signal to noise ratio (PSNR)...
ICCKE 2013, 2013
We are living in the world in which most people and organizations communicate via digital devices so that a large quantity of information is electronically saved. In this condition, it's readily possible to access sensitive organizational and personal information. There is no doubt that of digital data, multimedia data carry heavy information load. This paper attempts to provide an efficient method for encryption digital image using logistic and Tent map in order to protect digital images in cyber space. In order to assess the performance of our method, it was implemented in Matlab.
Scientia Iranica
This paper proposes a new symmetric cryptographic system using chaotic systems. The basic idea is that a random strand is generated from chaotic functions. The developed random strand is merged with the strand obtained from the original image. The researcher used tables called multiple encryption tables in the composition of these strands. These tables are produced according to a specific pattern. The strand combination algorithm randomly selects a table from a set of tables and performs the combination operation. This table will be replaced with another table under certain conditions. The diversity of tables and their dynamic selection in the integration operation will increase the resistance to attacks and threats and increase the proposed encryption system's efficiency. To prove the proposed system's efficiency, the obtained results have been evaluated by various tests such as entropy, correlation coefficient, and pixel change rate. Our results show that the proposed cryptographic system is cost-efficient, practical, and resistant, yet further research is required to make a final statement about its competence.
Complexity
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, such as speed, high security, affordable overheads for computation, and procedure power. In this paper, we propose a novel perturbation algorithm for data encryption based on double chaotic systems. A new image encryption algorithm based on the proposed chaotic maps is introduced. The proposed chaotification method is a hybrid technique that parallels and combines the chaotic maps. It is based on combination between Discrete Wavelet Transform (DWT) to decompose the original image into sub-bands and both permutation and diffusion properties are attained using the chaotic states and parameters of the proposed maps, which are then concerned in shuffling of pixel and operations of substitution, respectively. Security, statistical test analyses, and comparison with other techniques indicate that the proposed algorithm has promising effect and it can resist several common attacks. Namely, t...
2011
In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and new modified version of simplified AES. Chaotic baker's map is used for shuffling and improving S-AES efficiency through S-box design. Chaos is used to expand diffusion and confusion in the image. Due to sensitivity to initial conditions, chaotic baker's map has a good potential for designing dynamic permutation map and S-box. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, randomness test, information entropy, encryption quality, correlation analysis, differential analysis and sensitivity analysis. Experimental results show that the new cipher has satisfactory security and is more efficient than AES which makes it a potential candidate for encryption of multimedia data.
It is well-known that images are different from texts in many aspects, such as highly redundancy and correlation, the local structure and the characteristics of amplitude-frequency. As a result, the methods of conventional encryption cannot be applicable to images. In this paper, we improve the properties of confusion and diffusion in terms of discrete exponential chaotic maps, and design a key scheme for the resistance to statistic attack, differential attack and grey code attack. Experimental and theoretical results also show that our scheme is efficient and very secure.
Chaos, Solitons & Fractals, 2008
Chaos-based encryption appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an implementation of digital image encryption scheme based on the mixture of chaotic systems is reported. The chaotic cryptography technique used in this paper is a symmetric key cryptography. In this algorithm, a typical coupled map was mixed with a one-dimensional chaotic map and used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail, along with its security analysis and implementation. The experimental results based on mixture of chaotic maps approves the effectiveness of the proposed method and the implementation of the algorithm. This mixture application of chaotic maps shows advantages of large key space and high-level security. The ciphertext generated by this method is the same size as the plaintext and is suitable for practical use in the secure transmission of confidential information over the Internet.
AIP Advances, 2020
In this paper, a novel framework is presented for chaotic image encryption. The proposed method is based on integrating multiple chaotic maps (e.g., logistic, tent, quadratic, cubic, and Bernoulli) to generate more robust chaotic maps in order to increase the security and privacy needed by applying variable keys. The latter are generated by computing the sine square logistic map and are then applied to generate the chaotic maps employed in our framework. For this, we have performed many experiments to achieve the best period for each chaotic map in which it performed the best encryption. Here, we combine multiple chaotic maps to get a new map that works well when X ∈ [0, 1]. For using a chaotic map in the encryption process, it was necessary to find a way to choose the best of those chaotic maps for encryption. This selection was done with the lowest value for the correlation factor because the smaller value of correlation has an impression of good encryption. We have also noted a c...
International Journal of Applied Information Systems
New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it's highly sensitivity to the cipher keys and plain-images.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.