Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
4 pages
1 file
This paper reviews various chaotic map-based cryptographic techniques focusing on their efficacy in encrypting visual information, particularly in the context of image security. It investigates different diffusion and permutation methods based on chaotic maps like the logistic map and Chebyshev map, emphasizing their robustness against various types of attacks including brute-force assaults. The analysis indicates that while the architectures of these algorithms are largely similar, the choice of chaotic maps and configuration variations play a significant role in enhancing the strength of encryption.
2013
This paper presents are view of Image cryptography techniques based on chaotic maps. The chaotic cryptography is gaining more attention than others because of its lower mathematical complexity & better Security. It also avoids the data spreading hence reduces the transmission cost & delay. The digital image cryptography which is based on chaotic system utilizes the discrete on-linear system dynamics generally called chaotic maps. Depending upon the type of system many types of chaotic maps are available. By combining the large number of cryptographic techniques could be designed in this paper we are presenting are views of some of those techniques.
International Journal of Computer Applications, 2015
In the present time, Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image data. Encryption technique are used in many fields such as medical science, military, geographic satellite images. Thus due to this protecting the image data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of images via insecure channel like internet. Modern cryptography technique provides essential techniques for securing information and protecting multimedia data. In recent years, many encryption technology have been proposed. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different type of chaotic based image encryption techniques and reviewed the related works for each technique. , At last, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.
2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), 2013
Traditional encryption schemes do not work for images because of their large size and high redundancy. The image encryption schemes are based on chaotic systems should compose of two basic operations: chaotic confusion and diffusion of the pixel values [1]. The confusion and diffusion operations are both repeated several times to enhance the security of this cryptosystem [2]. These two operations use pseudo random number sequences generated using a chaotic dynamic system [3]. Chaotic maps are very suitable for various data encryption schemes. In particular, chaotic maps are easy to be implemented by microprocessors and personal computers. The chaotic cryptosystems generally have high speed with low cost, and excellent security which makes them better candidates than many traditional ciphers for images cryptosystem. So, it has more useful and practical applications, such as standard map (used confusion process) and henon map (used diffusion process), has been widely used now [4].
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Due to the tremendous developments in communication networks especially in the Internet network, which used to exchange many types of data by many people. Data security has become a major concern. Therefore, there is an increasing interest in the use of encryption and decryption methods. Many encryption methods have been developed to maintain data security, one of these methods that commonly used in recent are chaotic encryption systems. Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc... In this paper, we attempt to review and describe many methods used to encrypt images and make a comparison among these methods.
2014 Fifth International Conference on Signals and Image Processing, 2014
As the exchange of data over the open networks and Internet is rapidly growing, security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc.. In today's world most of the multimedia applications involve images. Earlier image encryption techniques like AES,DES,RSA etc. exhibit low levels of security and also weak anti attack ability. This problem was overcome by using chaos based cryptography. The chaotic systems are very sensitive to initial conditions and control parameters which make them suitable for image encryption. Many works have been done in the field of chaos based image encryption. In this survey paper an attempt has been made to review the aspects and approaches of the design used for image encryption.
A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2 883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.
International Journal of Engineering Research and Advanced Technology , 2021
Due to the network and multimedia application developments, information security become important since information can be attacked over the transmission channels, and the combination of cryptography and chaotic become an important field of information security, where many encryption algorithms are based on chaotic mapping due to the inherent features of Image like high redundancy and bulk data capacity. In this paper, three chaotic maps are used to achieve a good diffused Image by setting the initial conditions to generate the shuffling sequence randomly by 2D Zaslevskii map and employ them in 2D cat map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them. For increasing the levels of security related to the encryption algorithm, the Gaffe random key generator is used to generate 128 bits keys and employ it with an exclusive-OR equation to the diffused Image. The results indicated that the combination of chaotic and cryptography proved to be good for the high-security level. The experimental results have shown that the suggested algorithm is secure due to the large key space and the high sensitivity to the secret key. This paper applies a chaotic map algorithm by Mat lab a program.
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of data via insecure channel like internet. The available encryption algorithms which are mainly used for textual data maynot be suitable for multimedia data like images. Image encryption can be done in different ways. Most of the encryption techniques have some security and performance issues. Nowadays many algorithms related to image encryption based on the chaotic method have been put forward to improve security during transmission of images. Chaos based encryption systems are mostly used because of their better performance and certain features like sensitivity to initial conditions, state ergodicity, randomness etc. The confusion and diffusion in image is increased using chaos. Chaotic maps have several advantages like enormous key space and high security. In order to reach higher performance, these chaotic based methods take advantage of the more and more complex behavior of chaotic signals. There are different dimensions of chaotic maps used for chaotic encryption like one dimensional, multidimensional and cascade chaotic system. The performance of each systems is determined by the statistical and security analysis. This work is a review of chaos based image encryption algorithms using chaotic maps of different dimensions.
Chaos, Solitons & Fractals, 2008
Chaos-based encryption appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an implementation of digital image encryption scheme based on the mixture of chaotic systems is reported. The chaotic cryptography technique used in this paper is a symmetric key cryptography. In this algorithm, a typical coupled map was mixed with a one-dimensional chaotic map and used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail, along with its security analysis and implementation. The experimental results based on mixture of chaotic maps approves the effectiveness of the proposed method and the implementation of the algorithm. This mixture application of chaotic maps shows advantages of large key space and high-level security. The ciphertext generated by this method is the same size as the plaintext and is suitable for practical use in the secure transmission of confidential information over the Internet.
2006
In this paper a novel image encryption algorithm is proposed based on combination of pixel shuffling and three chaotic maps. This algorithm is based on pixel scrambling where in the randomness of the chaos is utilized to scramble the position of the data. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. In the proposed algorithm, the plainimage is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out. After that the shuffled image is encrypted using chaotic sequence generated by one another chaotic map. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks. Keywords—Image encryption, cha...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
ICCKE 2013, 2013
International Journal of Business Innovation and Research
International journal of statistics and applied mathematics, 2016
AIP Advances, 2020
Journal of Multimedia Information System, 2021
Arabian Journal for Science and Engineering, 2014
Baghdad Science Journal, 2022