Image Encryption Using Modified AES with Bio-Chaotic (original) (raw)

Review on Different Chaotic Based Image Encryption Techniques

2014

In present times, Due to the rapidly growth of digital and multimedia applications, more multimedia data are developed and transmitted through the networks in ,art, entertainment, advertising, education, training and commercial areas, which may have important information that should not be accessed by the general users. Therefore issue of protecting the confidentiality, integrity, security, privacy as well as the authenticity of images has become an important issue for communication and storage of images. In recent years, various encryption techniques are developed and applied to protect the confidential images from unauthorized users. This paper has a review on the aspects and existing different image encryption techniques based on chaos to design an image cryptosystem. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different chaotic based image encryption techniques and related works for each technique reviewe...

Image Encryption using Combination of Chaotic

2016

Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way is by cryptographic techniques. Cryptography is science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. To compensate for increasing computing speeds increases, it takes more than one encryption algorithm to improve security of digital images. One way is by using algorithms to double cryptography do encryption and decryption. Cryptographic algorithm often used today and the proven strength specially the digital image is Algorithm with Chaos system. To improve security at the image then we use Additional algorit...

Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption

Journal of theoretical and applied information technology, 2015

With the rapid development of the Internet and communication networks, the confidentiality of digital images transmitted over public networks must be preserved by using encryption techniques. Advanced Encryption Standard (AES) is one of the most commonly used encryption algorithms at present. Although AES has several advantages, such as security in data encryption, it also has a number of drawbacks, such as high computations, pattern problems when used for encrypting images, and fixed S-box weak points. This paper proposes a method that overcomes the fixed S-box weak points and improves the performance of AES when used for encrypting images, particularly when the image data are large. In addition, the MixColumn stage is replaced by chaotic mapping and XOR operation to reduce the high computations in MixColumn transform. The proposed method is tested on several images, and the results show that the proposed method efficiently generated cipher images with very low correlation coeffici...

Hybrid Image Encryption Technique Using Genetic Algorithm and Lorenz Chaotic System

ITM Web of Conferences

One of the important application of image encryption is storing confidential and important images on a local device or a database in such a way that only the authorized party can view or perceive it. The current image encryption technique employs the genetic algorithm to increase confusion in the image, but compromises in time and space complexity. The other method employs chaos or pseudo random number generating systems which have fast and highly sensitive keys but fails to make the image sufficiently noisy and is risky due to its deterministic nature. We propose a technique which employs the non-deterministic, optimizing power of genetic algorithm and the space efficiency and key sensitivity of chaotic systems into a unified, efficient algorithm which will retain the merits of both the methods whereas tries to minimize their demerits in a software system. The encryption process proceeds in two steps, generating two keys. First, an encryption sequence is generated using Lorenz Chao...

Survey: Image Encryption using Chaotic Cryptography Schemes

IJCA special issue on Computational Science-New …, 2011

Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based ...

Chaotic Algorithm for Standard Image Encryption

JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019

In this paper, proposes Image Encryption using chaotic crypto algorithm for improving the cyber security levels of Images and videos, the inherent characteristics and Properties of digital images, enormously using all properties of chaos being the natural superiorities of chaotic systems in secret transmissions and information encryption, able to provide the way to solve major issues of cyber security.

A new chaotic algorithm for image encryption

Chaos, Solitons & Fractals, 2006

Recent researches of image encryption algorithms have been increasingly based on chaotic systems, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper presents a new nonlinear chaotic algorithm (NCA) which uses power function and tangent function instead of linear function. Its structural parameters are obtained by experimental analysis. And an image encryption algorithm in a one-time-onepassword system is designed. The experimental results demonstrate that the image encryption algorithm based on NCA shows advantages of large key space and high-level security, while maintaining acceptable efficiency. Compared with some general encryption algorithms such as DES, the encryption algorithm is more secure.

Image Encryption Techniques Using Chaotic Schemes: A Review

2010

Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can have confidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to te...

A Review of Image Encryption Using Chaos based Techniques

2017

In open communication network, it is utmost crucial to keep sensitive information protected from becoming vulnerable to unauthorized access. Encryption process provides high security to the digital data content. Chaos theory has been broadly serviceable for encrypting image due to its multiple features. The discrete chaotic cryptographic system approaches are established on block and stream encryption schemes. If these two are combined the security level is significantly advanced. Chaos is used for expanding confusion and diffusion in images. Chaotic map gives benefits of large key space and high level security. In this paper, the survey of various chaos-based image encrypting techniques is done based on existing works. The paper also lays emphasis on the methodology of different techniques in detail.

A new chaotic algorithm for image encryption By : Haojiang Gao* , Yisheng Zhang, Shuyun Liang, Dequn Li

Recent researches of image encryption algorithms have been increasingly based on chaotic systems, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper presents a new nonlinear chaotic algorithm (NCA) which uses power function and tangent function instead of linear function. Its structural parameters are obtained by experimental analysis. And an image encryption algorithm in a one-time-onepassword system is designed. The experimental results demonstrate that the image encryption algorithm based on NCA shows advantages of large key space and high-level security, while maintaining acceptable efficiency. Compared with some general encryption algorithms such as DES, the encryption algorithm is more secure.