Chaotic Algorithm for Standard Image Encryption

Authors:

Surya Bhupal Rao,S.Rahamat Basha,

DOI NO:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00010

Keywords:

Image Encryption,Chaotic crypto,Cyber Security,Image Decryption,

Abstract

In this paper, proposes Image Encryption using chaotic crypto algorithm for improving the cyber security levels of Images and videos, the inherent characteristics and Properties of digital images, enormously using all properties of chaos being the natural superiorities of chaotic systems in secret transmissions and information encryption, able to provide the way to solve major issues of cyber security.

Refference:

I. A.Akhshani, A., Behnia, S., Akhavan, A., Hassan, H.A. and Hassan, Z, “A
novel scheme for image encryption based on 2D piecewise chaotic maps”,
Optics Communications, Vol.: 283, pp.3259-3266, 2010.
II. A.Awad, “A New Chaos-Based Cryptosystem for Secure Transmitted
Images”, IEEE Trans. on Computers, 2011.
III. Ahmad, Musheer, and M. ShamsherAlam. “A new algorithm of encryption
and decryption of images using chaotic mapping.” International Journal on
computer science and engineering, Vol.: 2, Issue: 1, pp. 46-50, 2009.
IV. A.Z. Tirkel, R.G. Van Schyndel, C.F. Osborne, A digital watermark,
Proceedings of ICIP 1994, Austin Convention Center, Austin, Texas, Vol.: II,
pp. 86–90, 1994.
V. Banik, B.Gupta, S.K.Bandyopadhyay. “Secret Sharing Using 3 Level DWT
Method of Image Steganography Based on Lorenz Chaotic Encryption and
Visual Cryptography.” Computational Intelligence and Communication
Networks (CICN), 2015 International Conference on. IEEE, 2015.
VI. Bauer, Lujo, “Device-enabled authorization in the Grey
system.”InternationalConference on Information Security. Springer Berlin
Heidelberg, 2005.
VII. Francois, Michael “A new pseudo-random number generator based on two
chaotic maps”, Informatica, Vol.: 24, Issue: 2, pp.181-197, 2013.

VIII. Liu, Ye, “Image encryption algorithm based on chaotic system and dynamic
S-boxes composed of DNA sequences”, Multimedia Tools and
Applications, Vol.: 75, Issue: 8, pp. 4363-4382, 2016.
IX. Liu, Hongjun, A.Kadir, Pijuan, Gong “A Fast Color Image Encryption
Scheme using one-time S-Boxes based on complex chaotic system and
Random noise”, Optics Communications , Vol.: 338, pp.340-347, 2015.
X. M.Brindha, N.A.Gounden. “A chaos based image encryption and lossless
compression algorithm using hash table and Chinese Remainder
Theorem.” Applied Soft Computing, Vol.: 40 (2016): 379-390.
XI. N.Bourbakis, and Christos Alexopoulos. “Picture data encryption using scan
patterns.” Pattern Recognition, Vol.: 25, Issue: 6, pp. 567-581, 1992.
XII. Norouzi, Benyamin, “A novel image encryption based on row-column,
masking and main diffusion processes with hyper chaos”, Multimedia Tools
and Applications, Vol.: 74, Issue: 3, pp.781-811, 2015.
XIII. R. Guesmi, “A novel chaos-based image encryption uses DNA sequence
operation and Secure Hash Algorithm SHA-2 and Nonlinear Dynamguesmi,
Ramzi, et al., Hash key-based image encryption using crossover operator and
chaos”, Multimedia tools and applications, Vol.: 75, Issue: 8, pp.1123-1136,
2016.
XIV. Uhl, Andreas, A.Pommer, “Image and video encryption: from digital rights
management to secured personal communication” , Vol.: 15. Springer
Science and Business Media, 2004.
XV. X.H.Q.Zhang “Image Encryption Based on Chaotic Modulation of Wavelet
Coefficients”, Congress on IEEE Image and Signal Processing (CISP’08),
Sanya, Hainan, Vol.: 1, pp.622-626, 27- 30, May 2008.
XVI. Ying, Wang, “The spatial-domain encryption of digital images based on
high-dimension chaotic system”, Cybernetics and Intelligent Systems, IEEE
Conference on, Vol.: 2. IEEE, 2004.
XVII. Y.Wang, X.Liao, T.Xiang, K.W.Wong, D.Yang, “Cryptanalysis and
Improvement on a Block Cryptosystem based on Iteration a Chaoticmap”,
Physics Letters A, Vol.: 363, pp. 277-281, 2007.

View | Download