Chaos Encryption and Coding for Image Transmission over Noisy Channels (original) (raw)
Related papers
Abstract: Robust and secure transmission strategy for high quality image through wireless networks is considered a great challenge. However, the majority of encrypted image transmission schemes don't consider well the effect of bit errors occurring during transmission. These errors are due to the factors that affect the information such as noise and multipath propagation. That should be handled by an efficient channel coding scheme. Our proposed scheme is based on combining hybrid chaotic encryption, which is based on twodimensional chaotic maps which is utilized for data security, with an error correction technique based on the Low Density Parity Check (LDPC)code. The LDPC is employed as channel coding for data communication in order to solve the problem of the channel’s limited bandwidth and improve throughput. Simulation results show that the proposed scheme achieves a high degree of robustness against channel impairments and wide varieties of attacks as wells as improved reliability of the wireless channel. In addition, LDPC is utilized for error correction in order to solve the limitations of wireless channels.
Applications of Chaotic Maps and Coding for Secure Transmission of Images over Wireless Channels
In this paper we present the applications of image encryption techniques and channel coding techniques, to design scheme effective for secure image transmission over wireless channels, we present three proposed scheme as follow: First scheme apply image encryption by a combination of hybrid chaotic maps using Baker map and our proposed Hénon chaotic map 3 in three different modes of operations, beside using fractional Fourier transform (FRFT). Second image encryption scheme is combine the main advantages of FRFT, Arnold cat map for confusion and our proposed Hénon chaotic map 3 for diffusion. Third scheme based on combination of hybrid chaotic encryption and low density parity check (LDPC) to secure transmission of image over wireless channel. Our proposed scheme improve throughput. The proposed scheme enhanced the performance parameters and achieved both security and reliability of image transmission over wireless channels.
A new chaos-based cryptosystem for secure transmitted images
International Conference on …, 2010
This paper presents a novel and robust chaos-based cryptosystem for secure transmitted images and four other versions. In the proposed block encryption/decryption algorithm, a 2D chaotic map is used to shuffle the image pixel positions. Then, substitution (confusion) and permutation (diffusion) operations on every block, with multiple rounds, are combined using two perturbed chaotic PWLCM maps. The perturbing orbit technique improves the statistical properties of encrypted images. The obtained error propagation in various standard cipher block modes demonstrates that the proposed cryptosystem is suitable to transmit cipher data over a corrupted digital channel. Finally, to quantify the security level of the proposed cryptosystem, many tests are performed and experimental results show that the suggested cryptosystem has a high security level.
Journal of Information Security and Applications, 2019
Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is because most of these security solutions exhibit intolerable overhead and consider only securing scalar data, which are not suitable for other data types such as digital images, hence affecting the provided security level and network performance. Thus, in this paper, we propose a lightweight and efficient security scheme based on chaotic algorithms to efficiently encrypt digital images. Our proposed algorithm handles digital images in two phases: Firstly, digital images are split into blocks and compressed by processing them in frequency domain instead of Red-Green-Blue (RGB) domain. The ultimate goal is to reduce their sizes to speed up the encryption process and to break the correlation among image pixel values. Secondly, 2D Logistic chaotic map is deployed in key generation, permutation, and substitution stages for image pixel shuffling and transposition. In addition, 2D Henon chaotic map is deployed to change the pixel values in the diffusion stage in order to enhance the required level of security and resist various security attacks. Security performance analysis based on standard test images shows that our proposed scheme overcomes the performance of other existing techniques.
Indian Journal of Computer Science and Engineering, 2021
Professor, SDM College of Engineering and Technology, Dharwad, Karnataka 580001, India srbiradar@gmail.com Abstract In the present technology growth, the need of multimedia data transmission. The key challenge to provide the secured data transmission in WMSNs owing to their tough situations. In this paper, a novel light-weight hybrid 3D chaotic based encryption algorithm is developed to address the issue of transmission of information securely. The proposed technique consists of two the combination of chaotic encryption scheme and cryptographic methods to build a secured technique. Initially, the input image of the size M*N is considered in which the first 128-bit of the data is processed with Chaotic encryption scheme and remaining 128-bit with 3D Logistic Map based encryption to generate the pseudo random key values, the input is encrypted. In the OMNET++ simulated environment, the encrypted cipher image is transmitted and decrypted at the receiver end. By the experimental analysi...
Image encryption using chaotic logistic map
Image and Vision Computing, 2006
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication, we propose a new approach for image encryption based on chaotic logistic maps in order to meet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic logistic maps are employed. The initial conditions for the both logistic maps are derived using the external secret key by providing different weightage to all its bits. Further, in the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and which one of them will be used for a particular pixel is decided by the outcome of the logistic map. To make the cipher more robust against any attack, the secret key is modified after encrypting each block of sixteen pixels of the image. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission. q
International Conference on Graphic and Image Processing (ICGIP 2011), 2011
Image transmission takes place as an important research branch in multimedia broadcasting communication systems in the last decade. Our paper presents image transmission over a FFT-OFDM (Fast Fourier Transform Orthogonal Frequency Division Multiplexing). The need for encryption techniques increase with the appearance of the expression which said that our world became small village, and the use of image application such as conference and World Wide Web which increase rapidly in recent years. Encryption is an effective method for protecting the transmitted data by converting it into a form being invisible over transmission path and visible in receiver side. This paper presents a new hybrid encryption technique based on combination of Backer maps and logistic map. This proposed technique aims to increase PSNR and reduce the noise in the received image. The encryption is done by shuffling the positions of a pixel image using two dimensional Baker maps then encrypt using XOR operation with logistic map to generate cipher image over orthogonal frequency multiplexing (OFDM). The encryption approach adopted in this paper is based on chaotic Baker maps because the encoding and decoding steps in this approach are simple and fast enough for HDTV applications. The experimental results reveal the superiority of the proposed chaotic based image encryption technique using two logistic maps and two dimensional Backer map over normal Backer map.
Reliable wireless error correction technique for secure image transmission
43rd Annual 2009 International Carnahan Conference on Security Technology, 2009
Robust and secure transmission strategy for highquality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission scheme that combines chaotic encryption and turbo coding technique into one processing step is proposed. In the proposed scheme, selective encryption algorithm based on two-dimensional chaotic map is utilized for data security. Furthermore, error correction technique based on turbo coding is employed as channel coding for data communication in order to solve the problem of limited bandwidth and throughput. Simulation results show that the proposed scheme achieves high degree of robustness against channel impairments and improve image quality with acceptable data rates.
In last few decades, due to the use of internet digital information transmission has becoming the common. But while transmitting the information over the open network, the question comes out, whether it is secure or not. To maintain its security the information should be transmitted into the format which is not recognized by the third person. the process of sending the information into unrecognized form is called as encryption. This particular paper presents the idea of encrypting the image using the chaos theory i.e encrypting in complete noise format, using the theory of logistic map. Keywords- Chaotic Map, Logistic Map, Image Encryption, Chaotic Theory, Key Sensitivity.
Digital image encryption based on chaotic map for secure transmission
2009
In the past decade, a number of image encryption algorithms based on chaotic maps have been proposed. Recently, an image encryption algorithm based on chaotic map lattice (CML) is proposed that allows direct encryption and decryption of color digital images. In this paper, we propose an enhanced CML based algorithm for image encryption to improve the security of the algorithm. The performance of the proposed algorithm is analyzed through computer simulations. It is shown that the enhanced algorithm successfully and completely encrypts the color images and provides more distortion to the plainimages than previously proposed CML based algorithm for the same set of parameters. It is also shown that the proposed algorithm is more sensitive to a small change in plainimages, number of iterations and number of cycles. This makes the proposed algorithm more efficient and improves the level of security provided by the algorithm.