Academia.eduAcademia.edu

Encrypting Image based on Chaotic Map algorithm

2021, International Journal of Engineering Research and Advanced Technology

https://doi.org/10.31695/IJERAT.2021.3703

Abstract

Due to the network and multimedia application developments, information security become important since information can be attacked over the transmission channels, and the combination of cryptography and chaotic become an important field of information security, where many encryption algorithms are based on chaotic mapping due to the inherent features of Image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve a good diffused Image by setting the initial conditions to generate the shuffling sequence randomly by 2D Zaslevskii map and employ them in 2D cat map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them. For increasing the levels of security related to the encryption algorithm, the Gaffe random key generator is used to generate 128 bits keys and employ it with an exclusive-OR equation to the diffused Image. The results indicated that the combination of chaotic and cryptography proved to be good for the high-security level. The experimental results have shown that the suggested algorithm is secure due to the large key space and the high sensitivity to the secret key. This paper applies a chaotic map algorithm by Mat lab a program.

Key takeaways

  • This study suggested a key generator and a chaotic image encryption system.
  • Also, the cryptography system ingredients are plaintext, cipher key, encryption algorithm that takes a plain-text and cipher key to be the input and produces cipher-text to be the output and decryption algorithm which is considered as the inverse of encryption algorithm [12].
  • With regard to symmetric cryptography, just one key is utilized for decryption and encryption.
  • In 1989, Matthews, a British mathematician, firstly employed chaos for encryption, suggesting a novel encryption algorithm generating key streams on the basis of Logistic map and encrypting the information by stream cipher method [21].
  • In the second stage, the encryption, in this stage encryption image is implemented by the chaotic algorithm.