Multiple Image Fusion Encryption (MIFE) using Discrete Cosine Transformation (DCT) and Chaotic Generators (original) (raw)
Related papers
Multimedia Information Retrieval [Working Title]
This chapter proposes a new multiple-image encryption algorithm based on spectral fusion of watermarked images and new chaotic generators. Logistic-May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as chaotic generators for their good properties in order to correct the flaws of 1D chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually. Firstly, the discrete cosine transformation (DCT) and the low-pass filter of appropriate sizes are used to combine the target watermarked images in the spectral domain in two different multiplex images. Secondly, each of the two images is concatenated into blocks of small size, which are mixed by changing their position following the order generated by a chaotic sequence from the Logistic-May system (LM). Finally, the fusion of both scrambled images is achieved by a nonlinear mathematical expression based on Cramer's rule to obtain two hybrid encrypted images. Then, after the decryption step, the hidden message can be retrieved from the watermarked image without any loss. The security analysis and experimental simulations confirmed that the proposed algorithm has a good encryption performance; it can encrypt a large number of images combined with text, of different types while maintaining a reduced Mean Square Error (MSE) after decryption.
A novel algorithm for image encryption based on mixture of chaotic maps
Chaos, Solitons & Fractals, 2008
Chaos-based encryption appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an implementation of digital image encryption scheme based on the mixture of chaotic systems is reported. The chaotic cryptography technique used in this paper is a symmetric key cryptography. In this algorithm, a typical coupled map was mixed with a one-dimensional chaotic map and used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail, along with its security analysis and implementation. The experimental results based on mixture of chaotic maps approves the effectiveness of the proposed method and the implementation of the algorithm. This mixture application of chaotic maps shows advantages of large key space and high-level security. The ciphertext generated by this method is the same size as the plaintext and is suitable for practical use in the secure transmission of confidential information over the Internet.
Image Encryption using Combination of Chaotic
2016
Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way is by cryptographic techniques. Cryptography is science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. To compensate for increasing computing speeds increases, it takes more than one encryption algorithm to improve security of digital images. One way is by using algorithms to double cryptography do encryption and decryption. Cryptographic algorithm often used today and the proven strength specially the digital image is Algorithm with Chaos system. To improve security at the image then we use Additional algorit...
An image encryption algorithm based on substitution technique and chaos mixing
Multimedia Tools and Applications, 2018
These recent years, countless chaos-based image encryption algorithms have been proposed to meet security needs in real time multimedia communication. However, many of these have exhibited flaws due to the chaotic map inadequacy. In this paper, we proposed a fast and secure image encryption algorithm by using new 1D chaotic systems, with better chaotic properties in the range of their control parameters. These new chaotic systems were obtained from wellknown 1D chaotic maps (Logistic, May, Gaussian, Gompertz) with flaws in their chaotic properties. From the chaotic systems designed, we extracted a pseudo random number sequence (PRNS) and generated S-boxes. Then a novel technique of plain image substitution was used to enhance the sensitivity of the original image pixels, followed by a scramblingmasking technique using the generated S-box. Security tests and evaluation metrics confirmed that the proposed cryptosystem was efficient, practicable, and reliable, with high potential to be adopted for network security and secure communications because of its high encryption speed.
New Image Encryption Based on Pixel Mixing and Generating Chaos System
2020
There was suggested new utilizing of the dispersion principle, based on the Lorenz Map, and chaos theory is known as perfect for using cryptography applications for their properties like unpredictability and sensitive initial states as one of the complex encryption approaches. to disengage the color of pixels (R, G, B). Was created this suggest with mixing all each color pixel to swap horizontally, vertically, or diagonally, finally using XOR operation. only milliseconds to encryption and decryption image, because the behavior of block cipher that leads to the period for the image to be decrypted fairly close as the images. The experiments demonstrate that the information security capabilities will be both safe more efficient, the result of our analysis of picture quality evaluation, differential attacks (NPSR), (UACI), Pixels correlation shows the quality and strength of encryption processing, Entropy show good results and closely to 8.
A New Method for Encryption of Color Images based on Combination of Chaotic Systems
DOAJ (DOAJ: Directory of Open Access Journals), 2019
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which make the image encryption more efficient and robust. The proposed algorithm generates three series of data ranged between 0 and 255 using a chaotic Chen system. Another Chen system is then started with different initial values, which are converted to three series of numbers from 0 to 10. The red, green, and blue values are combined with the three values for the first Chen system to encrypt pixel 1 of the image, while the values for the second Chen system are used to distort the combination order of the values for the first Chen system with the pixels of the image. The process is repeated until all pixels of the image are encrypted. The innovative aspect of this method is in combination with the two chaotic systems, which make the encryption process more complicated. The tests performed on the standard images (USC datasets) indicate the effectiveness and robustness of the proposed encryption method.
Multi-Image Encryption Technique Based on Permutation of Chaotic System
2016
Noora Shihab Ahmed Collage of Science, Department of Computer Science, Halabja University Halabja, Kurdistan, Iraq noora.ahmed1982@gmail.com Abstract-The key stream generator is the key design issue of an encryption system. In this work presents an n-array three key stream generators (KSI, KSII and KSIII), Based on permutation of three chaotic maps (Logistic map, Kent map and tent map). This work reviews of some image encryption algorithm and finally investigate three methods for image encryption. First algorithm is encryption of original image by using KSI system. Second algorithm relies on KSII system to randomly generate two sequences of numbers by means of selecting proper factors along with seed value. Afterwards, the randomly produced numbers are employed to permute the image by means of shuffling its rows, columns and pixels sequentially in a manner by which first sequence is utilized to shuffle rows while second sequence is utilized to shuffle columns. Afterwards masking pro...
A Novel Image Encryption using Improved Chaotic Maps and Multiple Encryption Tables
Scientia Iranica
This paper proposes a new symmetric cryptographic system using chaotic systems. The basic idea is that a random strand is generated from chaotic functions. The developed random strand is merged with the strand obtained from the original image. The researcher used tables called multiple encryption tables in the composition of these strands. These tables are produced according to a specific pattern. The strand combination algorithm randomly selects a table from a set of tables and performs the combination operation. This table will be replaced with another table under certain conditions. The diversity of tables and their dynamic selection in the integration operation will increase the resistance to attacks and threats and increase the proposed encryption system's efficiency. To prove the proposed system's efficiency, the obtained results have been evaluated by various tests such as entropy, correlation coefficient, and pixel change rate. Our results show that the proposed cryptographic system is cost-efficient, practical, and resistant, yet further research is required to make a final statement about its competence.
Image Encryption Based on the General Approach for Multiple Chaotic Systems
Journal of Signal and Information Processing, 2011
In the recent years, researchers developed image encryption methods based on chaotic systems. This paper proposed new image encryption technique based on new chaotic system by adding two chaotic systems: the Lorenz chaotic system and the Rössler chaotic system. The main advantage of this technique is stronger security, as is shown in the encryption tests. JSIP 243 osed method and recent methods. ` Lorenz [8] Rossler [9] Logistic Map [10] New Logistic Map [7] The 3D cat map [11] One D based [8] Encryption Based