Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, TJPRC
Communication is a meaningful exchange of information between two or more entities. In this era of e-communication i.e. the transmission of non-physical data that has been encoded digitally for the purpose of storage and processing of information, the first concern is about the security of the content which is shared during communication. Security is a continuous process via which data can be secured from several active and passive attacks. Encryption technique protects the confidentiality of a message or information which is in the form of multimedia (text, image, and video). In this paper, a new symmetric image encryption algorithm is proposed based on Henon’s chaotic system with byte sequences applied with a novel approach of pixel shuffling of an image which results in an effective and efficient encryption of images. By increasing confusion and diffusion, statistical analysis and experimental analysis of key sensitivity proved that the proposed image encryption algorithm resulted in a new dimension for secure image transfer in digital transmission world.
In a well-developed digital world, security plays a key role in transmission of images. To overcome these challenges Encryption and Decryption techniques need to be applied. In this paper we have applied the chaotic encryption and chaotic decryption on an image by doing pixel shuffling and using chaotic maps. Chaotic nature i.e., randomness property is present in both Henon map and Arnold cat map. Pseudorandom values generation plays an important key role in Henon maps and iteratively pixel shuffling is done in Arnold cat map. A sorting Technique is followed on key values produced by Henon map. By using those sorted positions, shuffle the pixel values generated by Arnold cat map iteratively. In this way the images are provided with high security for confidential transmission.
With the advancement in digital communication and cyber crime, security in storage and transmission of digital images over communication media becomes a key issue. Encryption is one of the ways to ensure high security by masking the information. The use of traditional cryptosystems (such as RSA, DES-like cryptosystems) is not as efficient for images as it is for text data. This paper proposes a new algorithm for image encryption and decryption using twodimensional henon map for substitution and logistic map for pseudorandom permutation. The algorithm calculates the permuting address for rows and columns by bit XOR'ing the pixels of the image with pseudorandom values generated from henon map. This is followed by diffusion making use of full chaotic property of logistic map. Therefore, the algorithm has higher key space and higher degree of scrambling. The use of two chaotic maps increases resistance to brute force attack.
Arabian Journal for Science and Engineering, 2014
The paper proposes an algorithm for image encryption using the random bit sequence generator and based on chaotic maps. Chaotic Logistic and Tent maps are used to generate required random bit sequences. Pixels of the plain image are permuted using these chaotic functions, and then the image is partitioned into eight bit map planes. In each plane, bits are permuted and substituted according to random bit and random number matrices; these matrices are the products of those functions. The pixels and bit maps permutation stage are based on a chaotic random Ergodic matrix. This chaotic encryption method produces encrypted image whose performance is evaluated using chi-square test, correlation coefficient, number of pixel of change rate (NPCR), unified average changing intensity (UACI), and key space. The histogram of encrypted image is approximated by a uniform distribution with low chi-square factor. Horizontal, vertical, and diagonal correlation coefficients of two adjacent pixels of encrypted image are calculated. These factors are improved compared to other proposed methods. The NPCR and UACI values of encrypted image are also calculated. The result shows that a swift change in the original image will cause a significant change in the ciphered image. Total key space for the proposed method is (2 ∧ 2,160), which is large enough to protect the proposed encryption image against any bruteforce attack.
2006
In this paper a novel image encryption algorithm is proposed based on combination of pixel shuffling and three chaotic maps. This algorithm is based on pixel scrambling where in the randomness of the chaos is utilized to scramble the position of the data. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. In the proposed algorithm, the plainimage is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out. After that the shuffled image is encrypted using chaotic sequence generated by one another chaotic map. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks. Keywords—Image encryption, cha...
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Due to the tremendous developments in communication networks especially in the Internet network, which used to exchange many types of data by many people. Data security has become a major concern. Therefore, there is an increasing interest in the use of encryption and decryption methods. Many encryption methods have been developed to maintain data security, one of these methods that commonly used in recent are chaotic encryption systems. Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc... In this paper, we attempt to review and describe many methods used to encrypt images and make a comparison among these methods.
International journal of engineering research and technology, 2013
In recent times, a variety of encryption algorithms on image encryption have been reported and broadly used. In this paper, firstly the encryption is performed on a gray scale image by simply using shuffling algorithm in MATLAB and calculated the entropy value of the cipher images at different levels of encryption. Secondly, a novel image encryption scheme is presented based on Henon Chaotic System for color images in order to perform secure transmission of image. The proposed cipher provides good transposition and substitution properties by performing exclusive OR operation and circular right bit shift operation. Lastly, a comparative analysis is performed on both the above encryption techniques based on the unintelligible degree of their cipher images. This way security of image encryption is enhanced effectively. Application of this method is found in the field of military and medical.
International Journal of Engineering Research and Advanced Technology , 2021
Due to the network and multimedia application developments, information security become important since information can be attacked over the transmission channels, and the combination of cryptography and chaotic become an important field of information security, where many encryption algorithms are based on chaotic mapping due to the inherent features of Image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve a good diffused Image by setting the initial conditions to generate the shuffling sequence randomly by 2D Zaslevskii map and employ them in 2D cat map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them. For increasing the levels of security related to the encryption algorithm, the Gaffe random key generator is used to generate 128 bits keys and employ it with an exclusive-OR equation to the diffused Image. The results indicated that the combination of chaotic and cryptography proved to be good for the high-security level. The experimental results have shown that the suggested algorithm is secure due to the large key space and the high sensitivity to the secret key. This paper applies a chaotic map algorithm by Mat lab a program.
2012
The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is viewed as binary sequence. The results of statistical analysis about randomness, sensitivity and correlation on the cipher-images show the relevance of the proposed cryptosystem.
Due to the rise in the use of internet facility for data/information transmission, the data must be kept secured. The data to be transferred can also be an images. So that images being transmitted through the internet must also be kept much secured for gaining the trust from the users. The image encryption can be performed through many ways. The proposed method of image encryption is by mapping with the chaotic maps provided as chaos theory. The original image will be divided in to different blocks, then permute and diffuse separately at the pixel level of each block. Finally combine and diffuse the permuted image as a cipher image. The proposed method also experimented and tested to reach the current need of image encryption to maintain the security among the users.
2014
Nowadays, with the incredible development of internet technologies and wireless communication networks such as computer and mobile networks, all kinds of multimedia data like digital image, Audio, text and video can be accessed in easily way on internet. As a result, cryptographic techniques are required to accomplish a certain level of security, integrity, confidentiality and as well as, to prevent unauthorized access of sensitive information during data storage and transmission. In this research, a novel and efficient color image encryption and decryption schemes has been suggested based on image pixels scrambling by iteratively dividing it in sixty four blocks and rotate each one in clockwise direction with 90 angles. Then applied two dimensions Arnold cat mapping to make more distortion of the relationship among adjacent pixels of original image by hide the statistical structure of pixels. Actually, the location of the image pixels is again reordered back to their original locat...
International Journal of Computer Applications, 2015
In the present time, Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image data. Encryption technique are used in many fields such as medical science, military, geographic satellite images. Thus due to this protecting the image data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of images via insecure channel like internet. Modern cryptography technique provides essential techniques for securing information and protecting multimedia data. In recent years, many encryption technology have been proposed. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different type of chaotic based image encryption techniques and reviewed the related works for each technique. , At last, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.
Encryption of images is different from that of texts due to some basic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional means. Most of the available ciphers cannot be used directly to encrypt digital images in real-time systems because their encryption speed is not fast. In this paper, a chaotic image encryption schemes which uses a two-dimensional discretized Arnold's cat map was used for pixel permutation and a logistic map which is a one-dimensional chaotic map was used for key stream generator where the control parameter b is used as part of the secret key. The work was implemented using Microsoft Visual Basic 2008. The result shows an encrypted image which is decrypted by inverse of the map and the use of the secret keys. The chaotic system employed shows its simplicity in form and complexity in dynamics.
These paper presents the novel idea about the various image ecryption processes available specifically the encryption of the image by using chaos theory .In the recent age of communication allows us to transfer any of the information over the longer distance.but it also involves the factors of security. This paper is the overview of the chaos theories and the encryption processes available for the transmission of image over a secured media. Keywords: Chaotic maps, Image Encryption, Pixel Shuffling, Chaotic theory
2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), 2013
Traditional encryption schemes do not work for images because of their large size and high redundancy. The image encryption schemes are based on chaotic systems should compose of two basic operations: chaotic confusion and diffusion of the pixel values [1]. The confusion and diffusion operations are both repeated several times to enhance the security of this cryptosystem [2]. These two operations use pseudo random number sequences generated using a chaotic dynamic system [3]. Chaotic maps are very suitable for various data encryption schemes. In particular, chaotic maps are easy to be implemented by microprocessors and personal computers. The chaotic cryptosystems generally have high speed with low cost, and excellent security which makes them better candidates than many traditional ciphers for images cryptosystem. So, it has more useful and practical applications, such as standard map (used confusion process) and henon map (used diffusion process), has been widely used now [4].
International Journal of Advanced Research in Computer Science, 2017
In modern days there are various image encryption techniques forecast for bringing image reliability and protection in the internet for the evolution of government, medical applications, military. In this paper, we analysed many encryptions techniques of digital image utilizing multiple chaotic map methods of demands of security side. For the protection purpose, it is more essential or encryption of image is important method for establish protection. There is multiple encryption of image techniques scheduled, every image encryption method and decryption schemes have its own strengths and defects. In the paper, focusing on approaches to encryption of an image by chaotic map and to enhance the method to solve the major issues of encryption of image techniques by chaotic map.
IEEE Access
The security of images has become a hot research area due to the widespread usage of the digital images all over the world. Literature review on chaotic image cryptography, on the other hand, indicates that many constructs have been employed for the realization of confusion operation while developing the image ciphers. To enhance the computational time, this study proposes a novel image cipher based on two chaotic maps and rectangle as a scrambler. As the given grayscale image is input, it is scrambled through dynamically generated rectangles. As a modus operandi, these rectangles are created in the given image with various dimensions and different location. The pixels lying on the boundary of the rectangle are rotated clockwise and anticlockwise with an arbitrary amount. These operations have been repeated a number of times to get the scrambling effects. The scrambled image has been further subjected to an XOR operation for embedding the diffusion effects in it. Two chaotic maps of Hénon and piecewise linear chaotic map have been used for the generation of random numbers. These numbers help in deciding the size, location, clockwise/anticlockwise movement of the pixels and the amount with which these pixels have to be rotated. The performance analysis and the machine simulation validate that the suggested cipher is sufficient enough to thwart the varied cryptanalytic attacks. In particular, we gained the computational speed of 0.5156 seconds and the information entropy of 7.9975. Besides, we posit that it has the ample prospects for its real world application.
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019
In this paper, proposes Image Encryption using chaotic crypto algorithm for improving the cyber security levels of Images and videos, the inherent characteristics and Properties of digital images, enormously using all properties of chaos being the natural superiorities of chaotic systems in secret transmissions and information encryption, able to provide the way to solve major issues of cyber security.
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of data via insecure channel like internet. The available encryption algorithms which are mainly used for textual data maynot be suitable for multimedia data like images. Image encryption can be done in different ways. Most of the encryption techniques have some security and performance issues. Nowadays many algorithms related to image encryption based on the chaotic method have been put forward to improve security during transmission of images. Chaos based encryption systems are mostly used because of their better performance and certain features like sensitivity to initial conditions, state ergodicity, randomness etc. The confusion and diffusion in image is increased using chaos. Chaotic maps have several advantages like enormous key space and high security. In order to reach higher performance, these chaotic based methods take advantage of the more and more complex behavior of chaotic signals. There are different dimensions of chaotic maps used for chaotic encryption like one dimensional, multidimensional and cascade chaotic system. The performance of each systems is determined by the statistical and security analysis. This work is a review of chaos based image encryption algorithms using chaotic maps of different dimensions.
2009
In the past decade, a number of image encryption algorithms based on chaotic maps have been proposed. Recently, an image encryption algorithm based on chaotic map lattice (CML) is proposed that allows direct encryption and decryption of color digital images. In this paper, we propose an enhanced CML based algorithm for image encryption to improve the security of the algorithm. The performance of the proposed algorithm is analyzed through computer simulations. It is shown that the enhanced algorithm successfully and completely encrypts the color images and provides more distortion to the plainimages than previously proposed CML based algorithm for the same set of parameters. It is also shown that the proposed algorithm is more sensitive to a small change in plainimages, number of iterations and number of cycles. This makes the proposed algorithm more efficient and improves the level of security provided by the algorithm.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.