We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Chaotic Image Encryption Standard (CIES)

by Akhil Kaushik, Satvika, Manoj Barnel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 8
Year of Publication: 2012
Authors: Akhil Kaushik, Satvika, Manoj Barnel
10.5120/9138-3354

Akhil Kaushik, Satvika, Manoj Barnel . Chaotic Image Encryption Standard (CIES). International Journal of Computer Applications. 57, 8 ( November 2012), 46-49. DOI=10.5120/9138-3354

@article{ 10.5120/9138-3354,
author = { Akhil Kaushik, Satvika, Manoj Barnel },
title = { Chaotic Image Encryption Standard (CIES) },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 8 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 46-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number8/9138-3354/ },
doi = { 10.5120/9138-3354 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:57.141264+05:30
%A Akhil Kaushik
%A Satvika
%A Manoj Barnel
%T Chaotic Image Encryption Standard (CIES)
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 8
%P 46-49
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the fast progression of data exchange in an electronic way, information security is becoming more important in data storage and transmission. Because of widely usage of images in industrial process, it is important to protect the confidential image data from unauthorized access. Security of these images while transferring over the internet happens to be more critical, when they are confidential weapon photographs, clandestine military data, furtive architectural designs of financial buildings and top-secret war plan designs, etc. In this paper, we have proposed a new partial symmetric-key based block cipher to meet the special requirements of secure image transfer. The performance of this algorithm is discussed against common attacks such as the brute-force attack, ciphertext attacks and plaintext attacks. The analysis and experimental results show that the proposed algorithms can fully encrypt all types of images. This makes them suitable for securing multimedia applications and shows they have the potential to be used to secure communications in a variety of wired/wireless scenarios and real-time application such as mobile phone services.

References
  1. Zhang S. and M. A. Karim, pp. 318-322, Vol. 21, No. 5, June 5 1999, Color image encryption using double random phase encoding, Microwave and optical technology letters.
  2. Li C. et. al. , pp. 1371–1381, 2009, On the security defects of an image encryption scheme, Image and Vision Computing.
  3. Lukac R. , Plantaniotis N. K. , pp. 454-464, 2005, A cost-effective encryption scheme for color images, Science Direct real time imaging.
  4. Shujun L. and Zheng X. , pp. 708-711, Vol. 2, 2002, Cryptanalysis of a chaotic image encryption method, Inst. of Image Process. Xi'an Jiaotong Univ. Shaanxi, IEEE International Symposium.
  5. Maniccam S. S and Bourbakis N. G. , pp. 1229-1245, 2001, Lossless image compression and encryption using SCAN, Pattern Recognition.
  6. Pareek N. , Patidar V. and Sud K. , pp. 926–934, 2006, Image encryption using chaotic logistic map, Image and Vision Computing 24 (9).
  7. Guo J. I. and Yen J. C. , 2008, A new mirror-like image encryption algorithm and its VLSI architecture, Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
  8. Schneier B. , 1994, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc. , New York, USA.
  9. Dang P. P. and Chau P. M. , pp. 395~403, 2000, Image encryption for secure Internet multimedia applications, IEEE Transactions on Consumer Electronics, 46(8).
  10. Menezes A. J. , Oorschot P. C. V. , and Vanstone S. A. , 1997, Handbook of Applied Cryptography. New York: CRC Press, Inc.
  11. Ashtiyani M. , Birgani P. M. and Hosseini H. M. , pp. 1-5, 2008, Chaos-based medical image encryption using symmetric cryptography, 3rd International conference on Information and Communication Technologies: From theory to applications ICTTA 2008.
  12. Stallings W. , Nov 2005, Cryptography and Network Security: Principles and Practice, Prentice Hall (4th edn. ), Inc. , New York, USA.
  13. Cheng L. K. , Dec 2003, Computer Cryptography – Data Privacy and Security in Computer Network. Tsinghua University Press (3rd edn. ), Inc. , Beijing China.
  14. Gary K. , An Overview of Cryptography, an article available at www. garykessler. net/library/crypto. html.
Index Terms

Computer Science
Information Sciences

Keywords

Block cipher Cryptography Image encryption Chaotic Image Encryption Standard (CIES)