We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Improving the Security of Image Encryption by using Two Chaotic Maps

by N. F. Elabady, M. I. Moussa, H. M. Abdalkader, S. F. Sabbeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 19
Year of Publication: 2014
Authors: N. F. Elabady, M. I. Moussa, H. M. Abdalkader, S. F. Sabbeh
10.5120/19021-0532

N. F. Elabady, M. I. Moussa, H. M. Abdalkader, S. F. Sabbeh . Improving the Security of Image Encryption by using Two Chaotic Maps. International Journal of Computer Applications. 108, 19 ( December 2014), 27-32. DOI=10.5120/19021-0532

@article{ 10.5120/19021-0532,
author = { N. F. Elabady, M. I. Moussa, H. M. Abdalkader, S. F. Sabbeh },
title = { Improving the Security of Image Encryption by using Two Chaotic Maps },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 19 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number19/19021-0532/ },
doi = { 10.5120/19021-0532 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:24.879286+05:30
%A N. F. Elabady
%A M. I. Moussa
%A H. M. Abdalkader
%A S. F. Sabbeh
%T Improving the Security of Image Encryption by using Two Chaotic Maps
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 19
%P 27-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) have been proposed, but the drawbacks of small key space, low speed, and low security in 1-D chaotic cryptosystems are obvious. This paper proposes a new image encryption technique based on 1-D and 2-D chaotic maps which provide more security and big key space. The 1-D chaotic system is induced from a mathematical combination between the logistic map and the cubic chaotic map. It has the advantage of bigger key space and high security analysis such as key space analysis, statistical analysis and sensitivity analysis were carried out. The proposed system uses 1-D and 2-D chaotic maps for simultaneous encryption of the components R, G, B of the colored image; these three components affect each other. So, the security and confidentiality of image data become more important. The security of digital images and performance speed has become more important since the communications of digital information over network occur more frequently. An image encryption has applications in various fields for example; the internet communication, the multimedia systems, the medical imaging, Tele-medicine and the military communication. The image encryption's aim is to convert the original image to another image that is hard to understand. However, image encryption differs from text encryption due to some intrinsic features of images which include bulk data capacities, high redundancy, strong correlations among pixels, etc. These features make conventional cipher systems such as DES, AES and RSA unsuitable for practical image encryption [1]. The chaos theory is used in cryptography due to its intrinsic features. These properties of chaos includes: sensitivity to initial condition and control parameters, random like behavior and mixing property, etc [2]. Several chaos based image encryption approaches have been described. The first is the confusion approach where the position of pixels scrambled without changing the values of pixels, the application of this approach does not guarantee a good level of security [3]. The second approach is the diffusion which aims to change the value of each pixel in the whole image [4]. Other approach shuffles the positions of plain-image in spatial domain by cat map [5-7]. To enhance the security, the majority of methods propose to mix between more than one approach simultaneously. Some conditions should be fulfilled such as a large key space, randomness of the cipher-image and a high sensitivity on the initial conditions. In [8], an image encryption scheme based on improved 3-D cat map is proposed. Shuffling the positions with Henon map and changing the grey values of image pixels with improved 2-D Logistic map are combined simultaneously to ensure the security of our scheme. New color image encryption algorithms encrypt the three components R, G, B of the color image. The common drawback of these algorithms is: they neglect the correlations between the components R, G, B and are more vulnerable to attack [9-15]. To overcome this problem, a novel color image encryption algorithm based on 1-D chaos map is described for the encryption R, G and B components of color image at the same time and made the three components affect each other [16]. In this paper, a new chaotic map which combines the logistic map and cubic map is used as a 1-D chaotic system to shuffle the position of blocks of the three components of image, on the other side the 2-D logistic map is used to rearrange the position of image pixels. These two chaotic systems are used to encrypt R, G, and B components of color image at the same time and made the three components affect each other. The current algorithm consists of 3 phases. Phase-1 creates a 1-D chaotic system, its initial values and scrambles the blocks of the image. Phase-2 uses a 2-D chaotic system to scrambling the rows and columns and increases the quadratic coupling of the items? y?_i^2, x_i^2, x_i y_i this provides more security to the system. Phase-3 uses the 1-D chaotic system again to change the values of pixels. The rest of this paper is organized as follows: section 2 describes the proposed chaotic system. Section 3 describes the proposed image encryption algorithm. section4 describes the image decryption algorithm. Section 5 experimental results and performance analysis are reported. Section 6 presents the conclusion.

References
  1. S. Li, G. Chen, A. Cheung, B. Bhargava, K. -T. Lo, On the Design of Perceptual MPEG video Encryption Algorithms, CoRR abs/cs/0501014, 2005. Encryption Algorithms, CoRR abs/cs/0501014, 2005.
  2. C. Fu, Z. Zhang and Y. Cao, "An Improved Image Encryption Algorithm Based on Chaotic Maps," Third In-ternational Conference on Natural Computation, Vol. 3, Washington, 2007, pp. 24-27.
  3. S. Li, C. Li, G. Chen, N. G. Bourbakis, K. T. Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks", Signal Processing: Image Communication 23 (3) (2008) 212–223
  4. Xin Zhang, Webin Chen,"Anew Chaotic Algorithm For Image Encryption", pp. 889-892 IEEE ICALIP 2008.
  5. G. R. Chen, Y. B. Mao, and Charles K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps", Chaos, Solitons & Fractals, 2004, pp. 749-741.
  6. Y. N. SI, B. S KANG, "Digital Image Scrambling Based on Improved Arnold Transformation", Chinese Comp. Technology and development, 2008, pp. 74-79.
  7. Y. Wang, Z. W. Zhao, and L. L. Zou, "A Fault-tolerable Encryption Algorithm for Two-dimensional Digital Image", 2007 2nd IEEE Conference on Industrial Electronics and Applications, 2007, pp. 2737-2741.
  8. Hongjuan Liu, Zhiliang Zhu, Huiyan Jiang, Beilei Wang. "A Novel Image EncryptionAlgorithm Based on Improved 3D Chaotic Cat Map", The 9th International Conference for Young Computer Scientists, 2008.
  9. K. Sakthidasan Sankaran and B. V. Santhosh Krishna," A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images", International Journal of Information and Education Technology, Vol. 1, No. 2, June 2011.
  10. LIU Xiangdong, Zhang Junxing, Zhang Jinhai, He Xiqin,"Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation". IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1, January 2008.
  11. Qais H. Alsafasfeh, Aouda A. Arfoa," Image Encryption Based on the General Approach for Multiple Chaotic Systems", Journal of Signal and Information Processing, 2011, 2, 238-244.
  12. H. Zhang, X. F. Wang, Z. H. Li, and D. H. Liu, "A Fast Image Encryption Algorithm Based on Chaos System and Henon Map", Chinese Journal of Computer Research and Development,2005,pp. 2137-2142.
  13. X. J. Li, J. H. Peng, and N. Xu, et al. "Image Encryption Algorithm Based on 2D Hyper chaotic Sequences", Journal of Image and Graphics, 2003, pp. 1172-1177.
  14. Sudhir Keshari, 2Dr. S. G. Modani," Image Encryption Algorithm based on Chaotic Map Lattice and Arnold cat map for Secure Transmission", IJCST Vol. 2, Issue 1, March 2011.
  15. Guoji Zhang a, Qing Liu b,," A novel image encryption method based on total shuffling scheme", Optics Communications 284 (2011) 2775–2780.
  16. Xingyuan Wangn, LinTeng,XueQin," A novel colour image encryption algorithm based on chaos", Signal Processing 92 (2012) 1101–1108.
  17. N. F. Elabady , H. M. Abdalkader , M. I. Moussa and S. F. Sabbeh, "Image Encryption Based on New-One dimensional chaotic Map", Second International Conference on Engineering and Technology ,GUC,Egypt,2013.
  18. Wang Y, Wong K-W, Liao X, Chen G,"A new chaos-based fast image encryption algorithm", Applied Soft Computing , Volume 11 Issue 1, January, 2011
  19. Rukhin, A. et al. (2010b). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, Revision 1a.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Algorithms Pixels Diffusion Block Shuffling Image Decryption