Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021, International Journal of Engineering Research and Advanced Technology
https://doi.org/10.31695/IJERAT.2021.3703…
14 pages
1 file
Due to the network and multimedia application developments, information security become important since information can be attacked over the transmission channels, and the combination of cryptography and chaotic become an important field of information security, where many encryption algorithms are based on chaotic mapping due to the inherent features of Image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve a good diffused Image by setting the initial conditions to generate the shuffling sequence randomly by 2D Zaslevskii map and employ them in 2D cat map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them. For increasing the levels of security related to the encryption algorithm, the Gaffe random key generator is used to generate 128 bits keys and employ it with an exclusive-OR equation to the diffused Image. The results indicated that the combination of chaotic and cryptography proved to be good for the high-security level. The experimental results have shown that the suggested algorithm is secure due to the large key space and the high sensitivity to the secret key. This paper applies a chaotic map algorithm by Mat lab a program.
2006
In this paper a novel image encryption algorithm is proposed based on combination of pixel shuffling and three chaotic maps. This algorithm is based on pixel scrambling where in the randomness of the chaos is utilized to scramble the position of the data. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. In the proposed algorithm, the plainimage is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out. After that the shuffled image is encrypted using chaotic sequence generated by one another chaotic map. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks. Keywords—Image encryption, cha...
International Journal of Computer Applications, 2015
In the present time, Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image data. Encryption technique are used in many fields such as medical science, military, geographic satellite images. Thus due to this protecting the image data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of images via insecure channel like internet. Modern cryptography technique provides essential techniques for securing information and protecting multimedia data. In recent years, many encryption technology have been proposed. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different type of chaotic based image encryption techniques and reviewed the related works for each technique. , At last, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.
International Journal of Advanced Research in Computer Science, 2017
In modern days there are various image encryption techniques forecast for bringing image reliability and protection in the internet for the evolution of government, medical applications, military. In this paper, we analysed many encryptions techniques of digital image utilizing multiple chaotic map methods of demands of security side. For the protection purpose, it is more essential or encryption of image is important method for establish protection. There is multiple encryption of image techniques scheduled, every image encryption method and decryption schemes have its own strengths and defects. In the paper, focusing on approaches to encryption of an image by chaotic map and to enhance the method to solve the major issues of encryption of image techniques by chaotic map.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Due to the tremendous developments in communication networks especially in the Internet network, which used to exchange many types of data by many people. Data security has become a major concern. Therefore, there is an increasing interest in the use of encryption and decryption methods. Many encryption methods have been developed to maintain data security, one of these methods that commonly used in recent are chaotic encryption systems. Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc... In this paper, we attempt to review and describe many methods used to encrypt images and make a comparison among these methods.
Information Security Journal: A Global Perspective, 2016
In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky chaotic map as a pseudo-random generator to produce the key encryption of the proposed image cryptosystem. The cipher structure has been chosen based on permutation-diffusion processes, where we adopt the classic permutation substitution network, which ensures both confusion and diffusion properties for the encrypted image. Our proposed algorithm has high sensitivity in plain image and the secret key. Moreover, the results show that the characteristics of our approach have excellent performance, with high scores (NPRC = 99.61%, UACI = 33.47%, entropy (CipherImage) ' 8, and correlation coefficient ' 0). Experimental results have been studied and analyzed in detail with various types of security analysis. These results demonstrate that our proposed cryptosystem has highly satisfactory security performance and can withstand various attacks compared to state-of-the-art methods.
ICCKE 2013, 2013
We are living in the world in which most people and organizations communicate via digital devices so that a large quantity of information is electronically saved. In this condition, it's readily possible to access sensitive organizational and personal information. There is no doubt that of digital data, multimedia data carry heavy information load. This paper attempts to provide an efficient method for encryption digital image using logistic and Tent map in order to protect digital images in cyber space. In order to assess the performance of our method, it was implemented in Matlab.
2012
This paper presents a chaotic map based cryptography technique, in the proposed technique; confusion and diffusion applied on spectral domain (on DCT(Discrete Cosine Transform) coefficients) hence the encryption can be achieved quickly without applying the large number of confusion and diffusion cycle as it is needed in spatial domain. Also the diffusion template is created by random number generator based on Gaussian distribution. The technique uses Bakers map and capable of providing the key length of 128 bits although it’s length can be extended further. The proposed technique is simulated using Matlab and the results prove its robustness with all type of cryptanalytic tests and faster execution.
In a well-developed digital world, security plays a key role in transmission of images. To overcome these challenges Encryption and Decryption techniques need to be applied. In this paper we have applied the chaotic encryption and chaotic decryption on an image by doing pixel shuffling and using chaotic maps. Chaotic nature i.e., randomness property is present in both Henon map and Arnold cat map. Pseudorandom values generation plays an important key role in Henon maps and iteratively pixel shuffling is done in Arnold cat map. A sorting Technique is followed on key values produced by Henon map. By using those sorted positions, shuffle the pixel values generated by Arnold cat map iteratively. In this way the images are provided with high security for confidential transmission.
Swift development in contingencies of information transmission and communication, cryptographic techniques are in great demand. A variety of effective chaos-based image encryption schemes have been proposed. The intent of this paper is to propose an image encryption scheme using chaotic map. Arnold cat map is used for diffusion as well as for substitution. This paper applies an alternate structure of the classic block cipher applied with Arnold Cat map. The paper that is being followed uses Arnold cat map and OCML for encryption which leads to large computational time, whereas our schemes computational time is less as compared to the previous. Key words: Arnold Cat map, Cryptography, Chaotic Maps, Image Encryption.
2009
In the past decade, a number of image encryption algorithms based on chaotic maps have been proposed. Recently, an image encryption algorithm based on chaotic map lattice (CML) is proposed that allows direct encryption and decryption of color digital images. In this paper, we propose an enhanced CML based algorithm for image encryption to improve the security of the algorithm. The performance of the proposed algorithm is analyzed through computer simulations. It is shown that the enhanced algorithm successfully and completely encrypts the color images and provides more distortion to the plainimages than previously proposed CML based algorithm for the same set of parameters. It is also shown that the proposed algorithm is more sensitive to a small change in plainimages, number of iterations and number of cycles. This makes the proposed algorithm more efficient and improves the level of security provided by the algorithm.
2003
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of image security has become a major concern and because of this reason, research in image confidentiality has gained popularity amongst security experts. This paper discusses an alternative chaotic image encryption based on Baker's map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker's map that requires only square image for encryption. In addition, the algorithm also includes other functions such as password binding and pixel shifting to further strengthen the security of the cipher image. The algorithm also supports two modes of operation namely EBC and CBC. The number of iterations to be performed can vary depending on the security level required by the user. The paper also includes an example of image encryption. From the analysis done, it shows that the security level is high even though keys that are found to be weak keys for Baker's map algorithm are being used in the algorithm.
2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), 2013
Traditional encryption schemes do not work for images because of their large size and high redundancy. The image encryption schemes are based on chaotic systems should compose of two basic operations: chaotic confusion and diffusion of the pixel values [1]. The confusion and diffusion operations are both repeated several times to enhance the security of this cryptosystem [2]. These two operations use pseudo random number sequences generated using a chaotic dynamic system [3]. Chaotic maps are very suitable for various data encryption schemes. In particular, chaotic maps are easy to be implemented by microprocessors and personal computers. The chaotic cryptosystems generally have high speed with low cost, and excellent security which makes them better candidates than many traditional ciphers for images cryptosystem. So, it has more useful and practical applications, such as standard map (used confusion process) and henon map (used diffusion process), has been widely used now [4].
Arabian Journal for Science and Engineering, 2014
The paper proposes an algorithm for image encryption using the random bit sequence generator and based on chaotic maps. Chaotic Logistic and Tent maps are used to generate required random bit sequences. Pixels of the plain image are permuted using these chaotic functions, and then the image is partitioned into eight bit map planes. In each plane, bits are permuted and substituted according to random bit and random number matrices; these matrices are the products of those functions. The pixels and bit maps permutation stage are based on a chaotic random Ergodic matrix. This chaotic encryption method produces encrypted image whose performance is evaluated using chi-square test, correlation coefficient, number of pixel of change rate (NPCR), unified average changing intensity (UACI), and key space. The histogram of encrypted image is approximated by a uniform distribution with low chi-square factor. Horizontal, vertical, and diagonal correlation coefficients of two adjacent pixels of encrypted image are calculated. These factors are improved compared to other proposed methods. The NPCR and UACI values of encrypted image are also calculated. The result shows that a swift change in the original image will cause a significant change in the ciphered image. Total key space for the proposed method is (2 ∧ 2,160), which is large enough to protect the proposed encryption image against any bruteforce attack.
Baghdad Science Journal, 2022
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people's transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
With the advancement in digital communication and cyber crime, security in storage and transmission of digital images over communication media becomes a key issue. Encryption is one of the ways to ensure high security by masking the information. The use of traditional cryptosystems (such as RSA, DES-like cryptosystems) is not as efficient for images as it is for text data. This paper proposes a new algorithm for image encryption and decryption using twodimensional henon map for substitution and logistic map for pseudorandom permutation. The algorithm calculates the permuting address for rows and columns by bit XOR'ing the pixels of the image with pseudorandom values generated from henon map. This is followed by diffusion making use of full chaotic property of logistic map. Therefore, the algorithm has higher key space and higher degree of scrambling. The use of two chaotic maps increases resistance to brute force attack.
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of data via insecure channel like internet. The available encryption algorithms which are mainly used for textual data maynot be suitable for multimedia data like images. Image encryption can be done in different ways. Most of the encryption techniques have some security and performance issues. Nowadays many algorithms related to image encryption based on the chaotic method have been put forward to improve security during transmission of images. Chaos based encryption systems are mostly used because of their better performance and certain features like sensitivity to initial conditions, state ergodicity, randomness etc. The confusion and diffusion in image is increased using chaos. Chaotic maps have several advantages like enormous key space and high security. In order to reach higher performance, these chaotic based methods take advantage of the more and more complex behavior of chaotic signals. There are different dimensions of chaotic maps used for chaotic encryption like one dimensional, multidimensional and cascade chaotic system. The performance of each systems is determined by the statistical and security analysis. This work is a review of chaos based image encryption algorithms using chaotic maps of different dimensions.
Vol. 18 No. 11 NOVEMBER 2020 International Journal of Computer Science and Information Security (IJCSIS), 2020
Using the chaotic theory in the color image encryption become a popular research field in recent decades. This paper suggests a color image encryption method based on combines between 3D-Logistic maps and 2D Cat Mapping. This method depends on splitting the original color image in to three essential components Red, Green and Blue in the first stage and then using 3D-Logistic maps to generate random numbers to encrypt the information of image through generating three keys one for each essential color in the second stage. using the 2D Cat Mapping to generate random numbers to scramble the pixels in the image that got from previous step. After applying the proposed method, we obtain an image that has two levels of protection (encryption and rearranging the locations of the image pixels).
A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2 883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.
2014 Fifth International Conference on Signals and Image Processing, 2014
As the exchange of data over the open networks and Internet is rapidly growing, security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc.. In today's world most of the multimedia applications involve images. Earlier image encryption techniques like AES,DES,RSA etc. exhibit low levels of security and also weak anti attack ability. This problem was overcome by using chaos based cryptography. The chaotic systems are very sensitive to initial conditions and control parameters which make them suitable for image encryption. Many works have been done in the field of chaos based image encryption. In this survey paper an attempt has been made to review the aspects and approaches of the design used for image encryption.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.