A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation (original) (raw)
Related papers
Performance of Chaos-Based Encryption Algorithm for Digital Image
TELKOMNIKA (Telecommunication Computing Electronics and Control), 2014
Presentation of information in digital form is highly vulnerable againts information abusing. Digital image is one of digital information which is frequently becomes a target of crime. Therefore, reliable, secure, and fast security techniques are required in digital image information. In this study, chaos-based encryption algorithm for digital image is built to improve endurance from brute force and known plaintext attack. The algorithm use logistic map as a random number generator for key stream. According to test and analysis, this algorithm has key space of 10 , key sensitivity up to 10 , the key stream is proved random, and the distribution of pixels value from encrypted image is proved uniform. So, it can be concluded that, the algorithm is very difficult to be cracked by brute force attack and also known plaintext attack.
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption
First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005
In the past few years, a number of image encryption algorithms based on chaotic maps have been proposed. A recently proposed Chaotic-Key Based Algorithm (CKBA) is based on a one-dimensional Logistic map. However, it has been shown that the current CKBA model is unavoidably susceptible to chosen/known-plaintext attacks, and that the high security claims against ciphertext-only attack were overestimated by the authors. In addition, the chaotic Logistic map yields unbalanced output. In this paper we enhance the CKBA algorithm three-fold: (1)we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, (2)we increase the key size to 128 bits, and (3)-we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/known-plaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good. A security analysis for the proposed system is performed and presented.
Securing Digital Image using Chaotic Encryption Scheme
Encryption of images is different from that of texts due to some basic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional means. Most of the available ciphers cannot be used directly to encrypt digital images in real-time systems because their encryption speed is not fast. In this paper, a chaotic image encryption schemes which uses a two-dimensional discretized Arnold's cat map was used for pixel permutation and a logistic map which is a one-dimensional chaotic map was used for key stream generator where the control parameter b is used as part of the secret key. The work was implemented using Microsoft Visual Basic 2008. The result shows an encrypted image which is decrypted by inverse of the map and the use of the secret keys. The chaotic system employed shows its simplicity in form and complexity in dynamics.
Design and Implementation of Image Encryption using Chaos Theory
Due to the rise in the use of internet facility for data/information transmission, the data must be kept secured. The data to be transferred can also be an images. So that images being transmitted through the internet must also be kept much secured for gaining the trust from the users. The image encryption can be performed through many ways. The proposed method of image encryption is by mapping with the chaotic maps provided as chaos theory. The original image will be divided in to different blocks, then permute and diffuse separately at the pixel level of each block. Finally combine and diffuse the permuted image as a cipher image. The proposed method also experimented and tested to reach the current need of image encryption to maintain the security among the users.
Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold: 1) we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, 2) we increase the key size to 128 bits, and 3) we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/knownplaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good.
Image encryption using chaotic logistic map
Image and Vision Computing, 2006
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication, we propose a new approach for image encryption based on chaotic logistic maps in order to meet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic logistic maps are employed. The initial conditions for the both logistic maps are derived using the external secret key by providing different weightage to all its bits. Further, in the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and which one of them will be used for a particular pixel is decided by the outcome of the logistic map. To make the cipher more robust against any attack, the secret key is modified after encrypting each block of sixteen pixels of the image. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission. q
IMAGE ENCRYPTION USING CHAOTIC MAPS OF VARIOUS DIMENSIONS: REVIEW
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of data via insecure channel like internet. The available encryption algorithms which are mainly used for textual data maynot be suitable for multimedia data like images. Image encryption can be done in different ways. Most of the encryption techniques have some security and performance issues. Nowadays many algorithms related to image encryption based on the chaotic method have been put forward to improve security during transmission of images. Chaos based encryption systems are mostly used because of their better performance and certain features like sensitivity to initial conditions, state ergodicity, randomness etc. The confusion and diffusion in image is increased using chaos. Chaotic maps have several advantages like enormous key space and high security. In order to reach higher performance, these chaotic based methods take advantage of the more and more complex behavior of chaotic signals. There are different dimensions of chaotic maps used for chaotic encryption like one dimensional, multidimensional and cascade chaotic system. The performance of each systems is determined by the statistical and security analysis. This work is a review of chaos based image encryption algorithms using chaotic maps of different dimensions.
A Review of Image Encryption Using Chaos based Techniques
2017
In open communication network, it is utmost crucial to keep sensitive information protected from becoming vulnerable to unauthorized access. Encryption process provides high security to the digital data content. Chaos theory has been broadly serviceable for encrypting image due to its multiple features. The discrete chaotic cryptographic system approaches are established on block and stream encryption schemes. If these two are combined the security level is significantly advanced. Chaos is used for expanding confusion and diffusion in images. Chaotic map gives benefits of large key space and high level security. In this paper, the survey of various chaos-based image encrypting techniques is done based on existing works. The paper also lays emphasis on the methodology of different techniques in detail.
An Image Encryption and Decryption using Chaos Algorithm
In a well-developed digital world, security plays a key role in transmission of images. To overcome these challenges Encryption and Decryption techniques need to be applied. In this paper we have applied the chaotic encryption and chaotic decryption on an image by doing pixel shuffling and using chaotic maps. Chaotic nature i.e., randomness property is present in both Henon map and Arnold cat map. Pseudorandom values generation plays an important key role in Henon maps and iteratively pixel shuffling is done in Arnold cat map. A sorting Technique is followed on key values produced by Henon map. By using those sorted positions, shuffle the pixel values generated by Arnold cat map iteratively. In this way the images are provided with high security for confidential transmission.