We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Efficient Chaotic Tent Map-based Image Cryptosystem

by Mohammed A. AlZain, Osama S. Faragallah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 167 - Number 7
Year of Publication: 2017
Authors: Mohammed A. AlZain, Osama S. Faragallah
10.5120/ijca2017914237

Mohammed A. AlZain, Osama S. Faragallah . Efficient Chaotic Tent Map-based Image Cryptosystem. International Journal of Computer Applications. 167, 7 ( Jun 2017), 12-17. DOI=10.5120/ijca2017914237

@article{ 10.5120/ijca2017914237,
author = { Mohammed A. AlZain, Osama S. Faragallah },
title = { Efficient Chaotic Tent Map-based Image Cryptosystem },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 167 },
number = { 7 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume167/number7/27782-2017914237/ },
doi = { 10.5120/ijca2017914237 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:14:10.845353+05:30
%A Mohammed A. AlZain
%A Osama S. Faragallah
%T Efficient Chaotic Tent Map-based Image Cryptosystem
%J International Journal of Computer Applications
%@ 0975-8887
%V 167
%N 7
%P 12-17
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an efficient chaotic image encryption cipher that is designed with the aim of improving the security and enhancing the encryption efficiency. In this paper, a chaotic tent map (CTM) is utilized to build a new digital chaotic image cryptosystem. The characteristics of CTM are very suitable for the design of encryption schemes. The security estimation of the proposed CTM-based image cryptosystem against brute-force, statistical, and differential attacks is investigated from strict cryptographic viewpoint. Experimental tests are performed with detailed analysis confirming the high security of the proposed CTM-based image cryptosystem.

References
  1. National Bureau of standards. "Data Encryption Standard," Federal Information processing standards Publication 46, US Government Printing Office, Washington, D.C., 1977.
  2. NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013). "Block cipher modes", Cryptographic Toolkit. NIST. Retrieved April 12, 2013.
  3. Ahmad M. Elshamy, Ahmed N. Z. Rashed, Abd El-Naser A. Mohamed, Osama S. Faragallah, Yi Mu, Saleh A. Alshebeili and F. E. Abd El-Samie, "Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding," IEEE/OSA Journal of Lightwave Technology, vol. 31(15), pp. 2533-2539, 2013.
  4. Chen J, Zhu Z, Liu Z, Fu C, Zhang L, Yu H., "A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains," Opt. Express, vol. 22, pp. 7349-7361, 2014.
  5. Ahmad M. Elshamy, Fathi E. Abd El-Samie, Osama S. Faragallah, Sayed M. Elshamy, Hala S. El-sayed, S. F. El-Zoghdy, Ahmed N. Z. Rashed, Abd El-Naser A. Mohamed, and Ahmad Q. Alhamad, "Optical Image Cryptosystem Using Double Random Phase Encoding and Arnold's Cat Map," Optical and Quantum Electronics, vol. 48(3):212, pp. 1-18, 2016, Springer.
  6. Chen W, Chen X, Sheppard CJR. "Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain," Opt. Express, vol. 20, pp. 3853-3865, 2012.
  7. P.C. Mogensen and J. Gluckstad, "Phase-only optical encryption," Opt. Lett. 25, 566-568, 2000.
  8. W. Stallings., "Cryptography and Network Security: Principles and Practice," Prentice-Hall, New Jersey, 1999.
  9. A. Menezes, P. van Oorschot and S. Vanstone, "Handbook of Applied Cryptography," CRC Press, New York, 1997.
  10. B. Furht and D. Socek, "A Survey of Multimedia Security," Technical Report, pp. 1-24, August 21, 2003.
  11. S. Tosun and W. C. Feng, "Lightweight Security Mechanisms for Wireless Video Transmission," In Proc. IEEE Int. Conference on Information Technology: Coding and Computing, pp. 157–161, 2001.
  12. Mohamed Amin, Osama S. Faragallah, Ahmed A. Abd El-Latif, "A Chaotic Block Cipher Algorithm for Image Cryptosystems," Communications in Nonlinear Science and Numerical Simulation, vol. 15(1), pp. 3484–3497, 2010.
  13. B. Furht and D. Socek, "Multimedia Security: Encryption Techniques," In IEC Comprehensive Report on Network Security, International Engineering Consortium, Chicago, IL, pp. 335-349, 2004
  14. B. Preneel and M. Csapodi, "Cryptographic Algorithms: Basic Concepts and Applications to Multimedia Security," Appeared in Proceedings of the Design Automation Day on Cellular Computing Architectures for Multimedia and Intelligent Sensors, European Conference on Circuit Theory and Design (ECCTD 1997), 1997.
  15. Heba M. Elhoseny, Hossam E. H. Ahmed, Alaa M. Abbas, Hassan B. Kazemian, Osama S. Faragallah, Sayed M. El-Rabaie, Fathi E. Abd El-Samie, "Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation," Signal, Image and Video Processing Journal, vol. 9(3), pp. 611-622, 2015.
  16. Ensherah A. Naeem, Mustafa M. Abd Elnaby, Naglaa F. Soliman, Alaa M. Abbas, Osama S. Faragallah, Noura Semary, Mohiy M. Hadhoud, Saleh A. Alshibeili, and Fathi E. Abd El-Samie, "Efficient Implementation of Chaotic Image Encryption in Transform Domains," Journal of Systems and Software, vol. 97, pp. 118-127, 2014.
  17. Osama S. Faragallah, "An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications," Information Security Journal: A Global Perspective, vol. 20(3), pp. 135-147, 2011.
  18. Osama S. Faragallah, "Digital Image Encryption Based on the RC5 Block Cipher Algorithm," Sensing and Imaging: An International Journal, vol. 12(3), pp. 73-94, 2011, Springer.Shiguo Lian, "Multimedia Content Encryption: Techniques and Applications," Taylor & Francis Group, LLC, 2009.
  19. Ljupco Kocarev, Zbigniew Galias and Shiguo Lian, "Intelligent Computing Based on Chaos," Springer Publisher, 2009.
  20. Shiguo Lian , Jinsheng Sun, Zhiquan Wang, "A chaotic stream cipher and the usage in video encryption," Chaos, Solitons and Fractal, vol. 34, pp. 851-859, 2009.
  21. Ljupco Kocarev, Zbigniew Galias and Shiguo Lian(editors). Intelligent Copmuting based on chaos. Springer publisher, 2009.
  22. Mohamed Amin, Osama S. Faragallah, Ahmed A. Abd El-Latif," Chaos-based hash function (CBHF) for cryptographic applications", Chaos, Solitons & Fractals (2009), doi:10.1016/j.chaos.2009.02.001.
  23. G. Chen, Y. Mao, C.K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps". Chaos, Solitons & Fractals vol. 21(3), pp. 749–61, 2004.
  24. Hossam El-din H. Ahmed, Hamdy M. Kalash, Osama S. Faragallah, "Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images," Journal of Optical Engineering, vol.45, 2006.
  25. Nawal El-Fishawy, Osama M. Abu Zaid, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms," International Journal of Network Security, vol. 5(3), pp. 241-251, Nov. 2007.
  26. C.E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, No. 4, pp. 656-715, October 1949.
  27. S. Behnia, A. Akhshani, A.Akhshani, H. Mahmodi, A. Akhavan, "A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps". Physics Letters A vol. 36(6), pp. 391-396, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric encryption Chaos Encryption quality Tent map and Security analysis.