Open Access Open Access  Restricted Access Subscription or Fee Access

Image Encryption Using Development of 1D Chaotic Maps

Heba M. Elhoseny, Hossam E.H. Ahmed, Hassan B. Kazemian, Fathi E. Abd El-Samie

Abstract


In this paper an efficient approach for image encryption is presented based on feedback stream cipher using a developed chaotic maps. It consists of two modules; first the encryption module which encrypts the plain image pixel-by-pixel by using external secret key 256-bit, taking into consideration the previous values of the encrypted pixels obtained in each iteration. The second module is decryption module which decrypts the cipher image pixel by pixel to retrieve the plain image using the same key which is used in encryption. Decryption module is typical to the encryption module except the pad (session key) in this case is
unmerged. The proposed algorithm can be performed using many logistic maps. We here use 1D maps such as Bernoulli map, Logistic map, and other three developed maps. The proposed algorithm using developed Bernoulli map has achieved the best results among all other maps used in the proposed algorithm. It has many useful advantages as the range of the variable r is increased, and the feedback property. Several encryption metrics is applied to judge the
proposed algorithm such as statistical analysis, differential analysis, and key sensitivity tests. The proposed algorithm is compared with RC6 algorithm. Experiments and results verify and prove that the proposed algorithm using the developed Bernoulli map is highly secure from the cryptographic viewpoint, more immune to noise, has higher entropy, and has higher sensitivity. The results of security analysis show that the proposed algorithm is secure and efficient in
real-time image applications. 


Keywords


Cryptography, Chaos, Image Cryptosystem, Stream Cipher, Logistic Map, Bernoulli Map, Security Analysis

Full Text:

PDF

References


W. Stallings., "Cryptography and Network Security: Principles and Practice," Prentice Hall, New Jersey, 1999.

Bruce Schneier, "Applied Cryptography Protocols, algorithms, and source code in C,"John Wiley & Sons, Inc., New York, second edition, 1996.

O. S. Faragallah, “Utilization of Security Techniques for Multimedia Applications”, Ph. D. Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, 2007.

N. Bourbakis, C. Alexopoulos, Picture data encryption using SCAN pattern, Pattern Recogn. 25 (1992) 567–581.

S. Lian, J. Sun and Z. Wang. "Security analysis of a chaos-based image encryption algorithm," Physica A: Statistical and Theoretical Physics, vol. 351, Issues 2-4, 15 June 2005, pp. 645-661.

Shujun Li, Guanrong Chen and Xuan Zheng, "Chaos-based encryption for digital images and videos," chapter 4 in Multimedia Security Handbook, February 2004.

Hossam H. Ahmed, O. S. Faragallah, Hamdy M. Kalash, " An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption", Informatica (03505596); Vol. 31 Issue 1, p121, Mar2007

Luciano, Dennis, Gordon Prichett "Cryptology: From Caesar Ciphers to Public-Key Cryptosystems". The College Mathematics Journal 18 (1): 2–17. (January 1987).

R. C. Merkle and M. Hellman, “On The Security of Multiple

Encryption”, Communications of The ACM, Vol. 24, No. 7, pp. 465-467, July 1981.

D. E. Newton, “Encyclopedia of Cryptology”, ABC-CLIO Inc., California, USA, 1997.

Z. Yun-Peng, L. Wei, C. Shui-Ping, Z. Zheng-Jun, N. Xuan, and D. Wei-Di, “Digital Image Encryption Algorithm Based on Chaos and Improved DES”, IEEE International Conference on Systems, Man and Cybernetics, pp. 474-479, 2009.

J. Cheng, F. Zhang, K. Yu, and J. Ma, “The Dynamic and Double Encryption System Based on Two-Dimensional Image”, International Conference on Computational Intelligence and Security (CIS '09) , pp. 458-462, 2009

A. H. M. Ragab, N. A. Ismail, and O. S . FaragAllah, “ Enhancements and Implementation of RC6 Block Cipher for Data Security”,

Proceedings of International Conference on Electrical and Electronic Technology, Vol. 1, pp. 133-137, 2001.

Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili, "Image Encryption: A Communication Perspective," December 14, 2013 by CRC Press.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.