CFP last date
20 December 2024
Reseach Article

Chaos Encryption Algorithm using Key Generation from Biometric Image

by Ali M. Meligy, Hossam A. Diab, Marwa S. El-Danaf
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 11
Year of Publication: 2016
Authors: Ali M. Meligy, Hossam A. Diab, Marwa S. El-Danaf
10.5120/ijca2016911600

Ali M. Meligy, Hossam A. Diab, Marwa S. El-Danaf . Chaos Encryption Algorithm using Key Generation from Biometric Image. International Journal of Computer Applications. 149, 11 ( Sep 2016), 14-20. DOI=10.5120/ijca2016911600

@article{ 10.5120/ijca2016911600,
author = { Ali M. Meligy, Hossam A. Diab, Marwa S. El-Danaf },
title = { Chaos Encryption Algorithm using Key Generation from Biometric Image },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 11 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 14-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number11/26040-2016911600/ },
doi = { 10.5120/ijca2016911600 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:28.550867+05:30
%A Ali M. Meligy
%A Hossam A. Diab
%A Marwa S. El-Danaf
%T Chaos Encryption Algorithm using Key Generation from Biometric Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 11
%P 14-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, chaos based encryption techniques introduce several merits over the classical techniques such as extensive security levels, complexity and fast speed. In this paper, a chaotic based cipher that incorporates both Logistic chaotic map and Tent map is proposed. An external biometric key of length 256-bits is employed to derive the initial seeds of the applied chaotic maps. In the encipher stage, the pixels information are masked based on an iterative structure using a data-dependent feedback mechanism that mixes the current cipher parameters with the previously enciphered pixels. Accordingly, the relation of the enciphered image and the original image is confused and the suggested cipher can defeat any attack. The experiments reveal the high efficiency of the proposed algorithm in addition to its sensitivity to secret key changes and its resistance to different types of attacks.

References
  1. Z. H. Guan, F. Huang, and W. Guan. 2005. Chaos-Based Image Encryption Algorithm. Physics Letter A. vol. 346. pp. 153-157.
  2. S. Li, X. Zheng, X. Mou, and Y. Cai. 2002. Chaotic encryption scheme for real time digital video. Proceedings of the SPIE on electronic imaging. pp. 149-160. San Jose, CA, USA.
  3. Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, and Abd El Fatah .A. Hegazy. 2010. An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems. IJCSNS International Journal of Computer Science and Network Security. VOL.10 No.2.
  4. G. Jakimoski and L. Kocarev. 2001. Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications. vol. 48, no. 2.
  5. H. El-din, H. Ahmed, H. M. Kalash, and O. S. F. Allah,. 2007. An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica. vol. 31. pp. 121-129.
  6. M. S. Baptista. 1998. Cryptography with chaos. Phys. Lett. A. vol.240. pp.50-54.
  7. I. A. Ismail, M. Amin, and H. Diab. 2010. A digital image encryption algorithm based a composition of two chaotic logistic maps. International Journal of Network Security. vol. 11. no. 1. pp. 1-10.
  8. N.K. Pareek, Vinod Patidar, and K.K. Sud. 2005. Cryptography using multiple onedimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10 (7) 715–723.
  9. Nitumoni Hazarika and Monjul Saikia. 2014. A Novel Partial Image Encryption using Chaotic Logistic Map. International conference on Signal Processing and Integrated Networks (SPIN).
  10. G. Chen, Y. Mao, and C.K. Chui. 2004. A symmetric image encryption based on 3D chaotic maps. Chaos Solitons Fractals. vol. 21. pp. 749-761.
  11. DeWang, and Yuan-Biao Zhang. 2009. image encryption algorithm based on s-boxes substitution and chaos random sequence. International Conference on Computer Modeling and Simulation.
  12. Pareek ,N. K., Patidar , V., Sud, .K .K. . 2006. Image encryption using chaotic logistic map. In Image and Vision Computing 24-926–934. Elsevier.
  13. Rajinder Kaurand Er.Kanwalprit Singh. 2013. Image Encryption Techniques:A Selected Review. IOSR Journal of Computer Engineering Vol. 9. No. 6. pp. 80-83.
  14. Ashwaq T. Hashim, Dr. Rasha Fahim Nathim, and Gaidaa Saeed Mahdi. 2014. Modification of RC5 Algorithm for Image Encryption. IJCCCE Vol.14. No.2.
  15. Abullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahumd and Muhammed Khurram Khan. 2009. Bio-Chaotic Stream Cipher – Based Iris Image Encryption. International Conference on Computational Science and Engineer.
  16. Z.Yun-peng, and Z. Zheng-jun. 2009. Digital Image Encryption Algorithm Based on Chaos and Improved DES. Proceedings of the IEEE International Conference on Systems. Man, and Cybernetics San Antonio. TX, USA.
  17. Muhammad Khurram Khan, and Jiashu Zhang. 2006. Implementing Templates Security in Remote Biometric Authentication System. IEEE Conf. Proceedings on CIS’06, China. pp. 1396-1400. vol.2.
  18. Fu, Ch., Zhang, Z., Chen, Z., and Wang, X. 2007. An Improved Chaos-Based Image Encryption Scheme. ICCS. Springer-Verlag. Berlin.
  19. Jiri Giesl, Ladislav Behal and Karel Vlcek. 2009. Improving Chaos Image Encryption Speed. International Journal of Future Generation Communication and Networking Vol. 2. No. 3.
  20. Zhai, Y., Lin, S., Zhang, and Q. 2008. Improving Image Encryption Using Multi-chaotic Map. Workshop on Power Electronics and Intelligent Transportationi System.
  21. National Institute of Standards and Technology. 2008. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special publication 800-22. Revision 1.
  22. Bóna, and Miklós 2011, A Walk Through Combinatorics (2nd ed.), New Jersey: World Scientific.
  23. CASIA Iris Database. [Online March, 2009] http://sinobiometric.com.
Index Terms

Computer Science
Information Sciences

Keywords

Stream Cipher Chaos Cryptography Tent Map Logistic Map Statistical Tests Security analysis