Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
This paper lays down the various image encryption techniques and specifically gives an account of chaos based encryption of images. The kinds of techniques studied include image encryption using digital signatures, lossless image compression and encryption using SCAN, mirror like image encryption, chaotic image encryption and colour image encryption using double random phase coding. Image encryption is different from text encryption because of the larger scale of data, higher redundancy and stronger correlation of pixels in images. Hence traditional encryption algorithms are not suitable for digital image encryption. To overcome these drawbacks we present a chaos based algorithm for images. This algorithm is based on scrambling of pixels where the randomness of chaos is utilized. The data are scrambled in the order of randomness of elements based on the chaotic map and reshuffled again to their original positions in the decryption process. Compared to traditional methods, chaotic image key encryption has a larger space, simple implementation, robustness and the advantages of faster encryption.
2017
In open communication network, it is utmost crucial to keep sensitive information protected from becoming vulnerable to unauthorized access. Encryption process provides high security to the digital data content. Chaos theory has been broadly serviceable for encrypting image due to its multiple features. The discrete chaotic cryptographic system approaches are established on block and stream encryption schemes. If these two are combined the security level is significantly advanced. Chaos is used for expanding confusion and diffusion in images. Chaotic map gives benefits of large key space and high level security. In this paper, the survey of various chaos-based image encrypting techniques is done based on existing works. The paper also lays emphasis on the methodology of different techniques in detail.
2014
In present times, Due to the rapidly growth of digital and multimedia applications, more multimedia data are developed and transmitted through the networks in ,art, entertainment, advertising, education, training and commercial areas, which may have important information that should not be accessed by the general users. Therefore issue of protecting the confidentiality, integrity, security, privacy as well as the authenticity of images has become an important issue for communication and storage of images. In recent years, various encryption techniques are developed and applied to protect the confidential images from unauthorized users. This paper has a review on the aspects and existing different image encryption techniques based on chaos to design an image cryptosystem. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different chaotic based image encryption techniques and related works for each technique reviewe...
In a well-developed digital world, security plays a key role in transmission of images. To overcome these challenges Encryption and Decryption techniques need to be applied. In this paper we have applied the chaotic encryption and chaotic decryption on an image by doing pixel shuffling and using chaotic maps. Chaotic nature i.e., randomness property is present in both Henon map and Arnold cat map. Pseudorandom values generation plays an important key role in Henon maps and iteratively pixel shuffling is done in Arnold cat map. A sorting Technique is followed on key values produced by Henon map. By using those sorted positions, shuffle the pixel values generated by Arnold cat map iteratively. In this way the images are provided with high security for confidential transmission.
These paper presents the novel idea about the various image ecryption processes available specifically the encryption of the image by using chaos theory .In the recent age of communication allows us to transfer any of the information over the longer distance.but it also involves the factors of security. This paper is the overview of the chaos theories and the encryption processes available for the transmission of image over a secured media. Keywords: Chaotic maps, Image Encryption, Pixel Shuffling, Chaotic theory
Bulletin of Electrical Engineering and Informatics, 2017
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
New method of secure image encryption and decryption scheme based on the chaos is proposed. There are two steps are followed after the preprocessing step in the proposed system namely, Encryption and Decryption. In preprocessing, images are denoised using median filter. Then the original input images will be encrypted by using the chaos mapping algorithm. At last the original images are retrieved back from the encrypted image by using the key that is specified during the encryption process for the decryption of the original images. Then the histogram mapping is done for the encrypted and the decrypted images. The proposed system is tested on well-known images like Lena, Mandrill, Clown and Barbara. The experimental results have demonstrated that the introduced image encryption scheme can achieve high security for practical image encryption.
IRJET, 2022
Digital images are a common part of multimedia communication, and in the current scenario they are frequently used to transmit data. Therefore, their security is a major concern for them. Chaos maps are good for encrypting images because they are chaotic, ergodic, and highly sensitive to initial conditions. Many of the past proposed image encryption methods relied on lowdimensional chaotic maps, which are the least secure and have limited resistance to brute force and statistical attacks. In attempt to overcome this difficulty, researchers have created a variety of high-dimensional chaotic maps. This review article gives a scientific evaluation of a variety of studies conducted over the recent years that have employed chaotic in various forms to process digital images in the encryption.
2006
In this paper a novel image encryption algorithm is proposed based on combination of pixel shuffling and three chaotic maps. This algorithm is based on pixel scrambling where in the randomness of the chaos is utilized to scramble the position of the data. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. In the proposed algorithm, the plainimage is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out. After that the shuffled image is encrypted using chaotic sequence generated by one another chaotic map. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks. Keywords—Image encryption, cha...
Due to the rise in the use of internet facility for data/information transmission, the data must be kept secured. The data to be transferred can also be an images. So that images being transmitted through the internet must also be kept much secured for gaining the trust from the users. The image encryption can be performed through many ways. The proposed method of image encryption is by mapping with the chaotic maps provided as chaos theory. The original image will be divided in to different blocks, then permute and diffuse separately at the pixel level of each block. Finally combine and diffuse the permuted image as a cipher image. The proposed method also experimented and tested to reach the current need of image encryption to maintain the security among the users.
2009 International Conference on Information Engineering and Computer Science, 2009
Recently, the chaotic maps have been investigated in order to develop more secure encryption schemes. In this paper we propose a new image encryption scheme with a classic bi-modular architecture: a diffusion stage, in which the pixels of the plain image are shuffled using a random permutation generated with a new algorithm, and a confusion stage, in which the pixels are modified with a XOR-scheme. In both stages are used four piecewise linear chaotic maps with very good cryptographic properties. The results of its statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for image encryption.
In recent years, owing to frequent flow of digital images across the world over the transmission media, it has become essential to secure them from leakages. Due to the exceptionally desirable properties of mixing, sensitivity to initial conditions and parameters of chaotic maps; chaosbased encryption has recommended a new and efficient way to deal with the problem of fast and highly secure image encryption. The implemented image encryption scheme consists of an 80-bit secret key and uses chaotic map like Arnold Cat-Map and Logistic Map. The initial conditions for the chaotic maps are derived using the 80-bit secret key. In this cryptosystem, permutation-diffusion architecture followed by an efficient diffusion scheme is implemented. This scheme consists of two diffusion procedures, with a supplementary diffusion procedure padded after the normal diffusion. In the supplementary diffusion module, the control parameter of the selected chaotic map is altered by the resultant image produced after the normal diffusion operation. As a result, a slight difference in the plain image can be transferred to the chaotic iteration and bring about distinct key streams, and hence totally different cipher images will be produced. Therefore, this scheme can remarkably accelerate the diffusion effect of the cryptosystem and effectively resist differential attacks. Our project objective is to provide high level of security and satisfactory encryption speed for practical secure image applications.
2010
Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can have confidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to te...
Intelligent Computing and Innovation on Data Science, 2021
In the new era, multimedia technology is used extensively. Multimedia data transfers over the Internet are not adequately stable. Data protection is needed for digital images transfer to avoid unauthorized entities. Many encryption strategies have been established for multimedia data over a medium that is not stable. This paper aims to compare the techniques used in encoding multimedia content. This paper explains the process for assessment for chaos image encryption algorithm. The chaos-based image encryption algorithm is used mainly because of its high protection and efficiency. Parameters such as MSC, encryption quality and avalanche effect check the image's quality. This paper presents a comparative review of non-chaotic and chaotic image encryption techniques.
2016
Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way is by cryptographic techniques. Cryptography is science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. To compensate for increasing computing speeds increases, it takes more than one encryption algorithm to improve security of digital images. One way is by using algorithms to double cryptography do encryption and decryption. Cryptographic algorithm often used today and the proven strength specially the digital image is Algorithm with Chaos system. To improve security at the image then we use Additional algorit...
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11, 2011
This paper proposes a robust image encryption algorithm via Smooth Exponential Map (SEM) to meet the demand for fast and highly secure image transmission. The proposed algorithm consists of two phases; image-diffusion and image-fusion. In the image diffusion phase, pixel locations of the original image are shuffled in the spatial domain while pixel values are modified in the image fusion phase. Investigating the chaotic map characteristics of proposed SEM indicates a full chaotic behavior. Results of testing the proposed algorithm show that the proposed algorithm has a large key space with complete obscuring of the original image, secured against brute-force attack as it is achieved a large complexity of order 90 2 O , and requires 343ms to encrypt 200x200 pixels image.
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019
In this paper, proposes Image Encryption using chaotic crypto algorithm for improving the cyber security levels of Images and videos, the inherent characteristics and Properties of digital images, enormously using all properties of chaos being the natural superiorities of chaotic systems in secret transmissions and information encryption, able to provide the way to solve major issues of cyber security.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Due to the tremendous developments in communication networks especially in the Internet network, which used to exchange many types of data by many people. Data security has become a major concern. Therefore, there is an increasing interest in the use of encryption and decryption methods. Many encryption methods have been developed to maintain data security, one of these methods that commonly used in recent are chaotic encryption systems. Where many methods were suggested to encrypt images using a chaotic map because their features such as sensitivity to initial conditions and unpredictability of random behaviors etc... In this paper, we attempt to review and describe many methods used to encrypt images and make a comparison among these methods.
IJCA special issue on Computational Science-New …, 2011
Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based ...
TELKOMNIKA (Telecommunication Computing Electronics and Control), 2014
Presentation of information in digital form is highly vulnerable againts information abusing. Digital image is one of digital information which is frequently becomes a target of crime. Therefore, reliable, secure, and fast security techniques are required in digital image information. In this study, chaos-based encryption algorithm for digital image is built to improve endurance from brute force and known plaintext attack. The algorithm use logistic map as a random number generator for key stream. According to test and analysis, this algorithm has key space of 10 , key sensitivity up to 10 , the key stream is proved random, and the distribution of pixels value from encrypted image is proved uniform. So, it can be concluded that, the algorithm is very difficult to be cracked by brute force attack and also known plaintext attack.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.