Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis and Implementation of Optimized Image Encryption Algorithm using Bhramgupta-Bhaskara Equation

Sanjay Chaudhari, Dr. Deepak Dembla

Abstract


In today’s era advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a detailed analysis on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. Generally chaotic based cryptography is not suitable for practical application. It does not secure algorithm due to dependency of initial condition [1][3], which can be easily broken. This Algorithm is optimizing by B.B equation. Modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build algorithm in whose security one can have confidence. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. The performance is analyzed against different encryption algorithm such as A.E.S, D.E.S AND X-OR, a regular well-behaved DSR network is used as a reference. The experimental results are being studied under DVPB-HD is a rapid development platform based on TITMS320DM6467 DaVinci™ Technology. Simulation experiments have been carried out in order to evaluate performance of proposed algorithm under different input images in (k.b) This algorithm proved secure against brute-force and plain-text attack resolve in [10].

Keywords


B-B Equation, Chaos, Cryptography, Image Encryption, Image Decryption.

Full Text:

PDF

References


N Masuda and K Aihara, "Cryptosystems with discretized chaotic maps," IEEE Trans. on Circuits and Systems -I: Fundamental Theory and Applications, vol. 49, no. 1, pp. 28-40, 2002.

DouS Li, G Chen and X Zheng, "Chaos-based encryption for digital images and videos," In: B. Furht and D. Kirovski, editors. Multimedia Security Handbook of Internet and Communications Series, Ch. 3, CRC Press, Vol. 4, 2004.

N. Rama Murthy and M. N. S. Swamy, “Cryptographic Applications of Brahmagupta-Bhaskara Equation ", IEEE Transactions on Circuits and Systems-I Regular Papers, VOL.53, NO. 7, JULY 2006 I

K. Deergha Rao, K. Praveen Kumar and P.V. Murali Krishna, "A New and Secure Cryptosystem for Image Encryption and Decryption", IETE Journal of Research, VOL. 57, ISSUE 2, Mar-Apr 2011

Wenbo Mao, "Modern Cryptography: Theory and Practice publisher prantice hall PTR, HP-2004

D. S. Abdul. Elminaam, Higher Technological Institute, 10th of Ramadan City, "Performance Evaluation of Symmetric Encryption Algorithms", Communications of the IBIMAVolume 8, 2009 ISSN: 1943-7765

J C Yen and J I Guo, "A New Chaotic Key -Based Design for Image Encryption and Decryption," Proc. IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, vol. 4, pp. 49-52, 2000.

S Li, G Chen and X Zheng, "Chaos-based encryptionfor digital images and videos," In: B. Furht and D. Kirovski, editors. Multimedia Security Handbook of Internet and Communications Series, Ch. 3, CRC Press, Vol. 4, 2004.

S J Li and X Zheng, “Cryptanalysis of s Chaotic Image Encryption Method,” IEEE International Symposium on Circuits and Systems (ISCAS 2002), vol. 2, pp.708-11,2002

N Rama Murthy and M N S Swamy, “Author’s reply”, IEEE Trans. Circuits Syst. I, Reg. Papers, vol.54, no. 4, pp. 928-9, 2007.

A M Youssef, A comment on “Cryptographic applications of Brahmagupta-Bhaskara equation”, IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 54, pp. 927-8, 2007.

Jolly Shah and Dr. Vikas Saxena, “ Performance Study on Image Encryption Schemes”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.