We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Fast Adaptive Image Encryption using Chaos by Dynamic State Variables Selection

by Daniel Roohbakhsh, Mahdi Yaghoobi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 12
Year of Publication: 2015
Authors: Daniel Roohbakhsh, Mahdi Yaghoobi
10.5120/19880-1886

Daniel Roohbakhsh, Mahdi Yaghoobi . Fast Adaptive Image Encryption using Chaos by Dynamic State Variables Selection. International Journal of Computer Applications. 113, 12 ( March 2015), 28-32. DOI=10.5120/19880-1886

@article{ 10.5120/19880-1886,
author = { Daniel Roohbakhsh, Mahdi Yaghoobi },
title = { Fast Adaptive Image Encryption using Chaos by Dynamic State Variables Selection },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 12 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number12/19880-1886/ },
doi = { 10.5120/19880-1886 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:46.825977+05:30
%A Daniel Roohbakhsh
%A Mahdi Yaghoobi
%T Fast Adaptive Image Encryption using Chaos by Dynamic State Variables Selection
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 12
%P 28-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new image encryption scheme based on high dimensional compound chaotic systems is proposed in this paper. Common chaotic image encryption, will perform encryption algorithm on pixels one by one which make the process slower, in this paper we called logistic map to choose and encrypt appropriate number of pixels makes the algorithm swifter and much more reliable by enlarging the key length.

References
  1. Geol, Amnesh, and Nidhi Chandra, "A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group-Wise Of RGB Values and Explosive Inter-Pixel Displacement", pp. 16-22, 2012
  2. J. C. Yen, J. I. Guo, "A New Chaotic Key-Based Design for Image Encryption and Decryption", Proceeding IEEE International Conference on Circuits and Systems,vol. 4, pp. 49-52, 2000
  3. R. Valerij, "Symmetry of the modified Mandelbrot set", Pi in the Sky(9):20–1. 2005
  4. Narendra Singh, Aloka, "Optical image encryption using fractional Fourier transform and chaos", Optics and Lasers in Engineering. Vol 46, Issue 2, Pages 117–123. February 2008
  5. Kadir, Abdurahman, Wang, "A chaotic image encryption algorithm based on perceptron model", Nonlinear Dynamics, Vol. 62, pp. 615-623, 2011.
  6. Liao X, Chen G, Wang Y, "A new chaos-based fast image encryption algorithm", Applied Soft Computing Journal, Vol. 11, PP. 514-522,
  7. Alireza Jolfaei, Abdolrasoul Mirghadri, "Image Encryption Using Chaos and Block Cipher", Computer and Information, Vol 4, No 1, pp 172-179, 2011.
  8. Tiegang Gao, Zengqiang Chen, ""A new image encryption algorithm based on hyper-chaos", Physics Letters A ,Vol. 372, Issue 4, PP 394–400, 21 January 2008
  9. R Jun, P. , J. Shangzhu, and L. Yongguo," Design and Analysis of an Image Encryption Scheme Based on Chaotic Maps", International Conference ICICTA, pp. 1115-1118, 2010
  10. Li, Ling, Weinan Wang, and Jinjie Li, "A Novel Image Encryption Algorithm Based on High-dimensional Compound Chaotic Systems", International Conference on Multimedia Technology (ICMT), pp. 5715-5718, July 2011.
  11. Jolfaei, Alireza, and Abdolrasoul mirghadri, "An Image Encryption Approach Using Chaos and Stream Cipher", Journal of Theoretical and Applied Information Technology, pp120-122, 2010
  12. S, Rakesh, Ajitkumar A Kaller, Shadakshari B C, and Annappa B, "Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping", International Journal on Cryptography and Information Security, (IJCIS),Vol. 2, No. 1, pp 49-57, 2012.
  13. Gao, Tiegang, Qiaolun Gu, Zengqiang Chen, and Renhong Cheng, "An Improved Image Encryption Algorithm Based on Hyper-chaos", Fourth International Conference on Innovative Computing Information and Control (ICICIC), pp. 1281-1284, 2009
  14. Prasad, Manjunath, and K. L. Sudha, "Chaos Image Encryption using Pixel shuffling. ",pp. 170-177, 2011
  15. Bruce Schneier, "Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C", John Wiley & Sons, Inc, Publication Date 1996
  16. R, Rhouma, and Belghith S "Cryptanalysis of a new image Encryption Based on hyper chaos", Physics letters pp. 5973-5978, 2008
  17. Rhouma R, Solak E, Belghith S. Cryptanalysis of a new substitutiondiffusion based image cipher. Commun Nonlinear Sci Numer Simul Co—2010;15(7):1887-92
  18. Rhouma R, Solak E, Belghith S. Cryptanalysis of a new substitutiondiffusion based image cipher. Commun Nonlinear Sci Numer Simul Co—2010;15(7):1887-92
  19. Li C, Li S, Lo K. Breaking a modified substitution diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Tjff] Simul 2011;16(2):837-43
  20. Li C, Li MAS, Nunez J, Alvarez GCG. On the security defects of an image encryption scheme. Image Vis Comput 2009;27(9):1371-82.
  21. Cokal C, Solak E. Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A 2009;373(15):1357-60.
Index Terms

Computer Science
Information Sciences

Keywords

Encrypting Information Security Hyper chaos