We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Hybrid Ciphering System of Images based on Fractional Fourier Transform and Two Chaotic Maps

by Noha Ramadan, Hossam Eldin H. Ahmed, Said E. Elkhamy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 11
Year of Publication: 2015
Authors: Noha Ramadan, Hossam Eldin H. Ahmed, Said E. Elkhamy
10.5120/21110-3892

Noha Ramadan, Hossam Eldin H. Ahmed, Said E. Elkhamy . Hybrid Ciphering System of Images based on Fractional Fourier Transform and Two Chaotic Maps. International Journal of Computer Applications. 119, 11 ( June 2015), 12-17. DOI=10.5120/21110-3892

@article{ 10.5120/21110-3892,
author = { Noha Ramadan, Hossam Eldin H. Ahmed, Said E. Elkhamy },
title = { Hybrid Ciphering System of Images based on Fractional Fourier Transform and Two Chaotic Maps },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 11 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number11/21110-3892/ },
doi = { 10.5120/21110-3892 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:45.829183+05:30
%A Noha Ramadan
%A Hossam Eldin H. Ahmed
%A Said E. Elkhamy
%T Hybrid Ciphering System of Images based on Fractional Fourier Transform and Two Chaotic Maps
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 11
%P 12-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a new implementation of a hybrid ciphering system of images in Fourier domain based on two chaotic maps. The first map is the Bakermap,which is used to scramble the image pixels in three modes of operation (CBC, CFB and OFB). The second map is the logistic map,whose secret key depends on the plain text. In the key generation step of the logistic map, the chaotic stream is generated with plain text and hence the relation between the key and the plain text is established. We use Fractional Fourier Transform (FrFT) before the encryption to achieve a large degree of randomization. We examine the proposed algorithm and compare the results with the RC6 algorithm. The performance and security analysis prove that this hybrid ciphering system is efficient, reliable, and can effectively resist different attacks.

References
  1. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46, U. S. Government Printing Office, Washington, DC, 1977.
  2. Announcing the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001.
  3. Patidar, V. , Pareek, N. K. , Sud, K. K. , A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat. , 2009, 14: 3056-3075.
  4. Zhang LH, Liao XF, Wang XB, "An image encryption approach based on chaotic maps," Chaos, Solitons& Fractals, Vol. 24, 2005; pp. 759–765.
  5. Y. Mao, G. Chen, and S. Lian, "A novel fast image encryption scheme based on 3D chaotic baker maps," International Journal of Bifurcation and Chaos, vol. 14, no. 10, pp. 3613–3624, 2004.
  6. J. Shen, X. Jin, and C. Zhou, "A color image encryption algorithm based on magic cube transformation and modular arithmetic operation," in Advances in Multimedia Information Processing, vol. 3768 of Lecture Notes in Computer Science, pp. 270–280, Springer, 2005.
  7. X. He, Q. Zhu, and P. Gu, "A new chaos-based encryption method for color image," in Rough Sets and Knowledge Technology, vol. 4062 of Lecture Notes in Computer Science, pp. 671–678, Springer, 2006.
  8. C. Li and G. Chen, "On the security of a class of image encryption schemes," in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '08), pp. 3290–3293, Seattle, Wash, USA, May 2008.
  9. Swiss encryption technology, "Medi Crypt, Modes of operation", pp. 1-4,http: //www. mediacrypt. com/ pdf/MC modes 1204pdf.
  10. Clifiord Bergman, Encryption modes, Lecture 16, Feb. 2005, pp. 1-18,
  11. Nawal El-Fishawy, Osama M. Abu Zaid Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security, 5(3) : 241–251, Nov. 2007.
  12. Cao Guanghui, Hu Kai, Zhang Yizhi, Zhou Jun, and Zhang Xing, " Chaotic Image Encryption Based on Running-Key Related to Plaintext" Hindawi Publishing Corporation the Scientific World Journal Volume 2014, Article ID 490179, 9 pages
  13. L. B. Almeida, "The fractional Fourier transform and time-frequency representations," IEEE Trans. Signal Process. , vol. 42, no. 11, pp. 3084–3091, Nov. 1996.
  14. Hossam M. Kasem; Mohamed E. Nasr; Elsayed A. Sallamand F. E. Abd El-Samie "Efficient transmission of 1D and 2D chaotic map encrypted images with orthogonal frequency division multiplexing", Proc. SPIE 8285, International Conference on Graphic and Image Processing (ICGIP 2011), 82850D (September 30, 2011)
  15. Jiri Fridrich. . " Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. " International Journal of Bifurcation and Chaos, Vol. 8, No. 6 , 1259-1284 1998.
  16. S. Li, ?Analyses and new designs of digital chaotic ciphers, Ph. D. dissertation, Info. And Comm. Eng. , Xi'an Jiaotong Univ. , China, 2007.
  17. C. Zhu and K. Sun, "Chaotic image encryption algorithm by correlating keys with plaintext," China Communications, vol. 9, no. 1, pp. 73–79, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Baker map Fourier transform Logistic map Modes of operation and Security analysis.