CFP last date
20 December 2024
Reseach Article

A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security

by Osama M. Abu Zaid, Nawal A. El-fishawy, E. M. Nigm, Osama S. Faragallah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 5
Year of Publication: 2013
Authors: Osama M. Abu Zaid, Nawal A. El-fishawy, E. M. Nigm, Osama S. Faragallah
10.5120/9925-4549

Osama M. Abu Zaid, Nawal A. El-fishawy, E. M. Nigm, Osama S. Faragallah . A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security. International Journal of Computer Applications. 61, 5 ( January 2013), 29-39. DOI=10.5120/9925-4549

@article{ 10.5120/9925-4549,
author = { Osama M. Abu Zaid, Nawal A. El-fishawy, E. M. Nigm, Osama S. Faragallah },
title = { A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 5 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number5/9925-4549/ },
doi = { 10.5120/9925-4549 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:26.798900+05:30
%A Osama M. Abu Zaid
%A Nawal A. El-fishawy
%A E. M. Nigm
%A Osama S. Faragallah
%T A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 5
%P 29-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a proposed encryption scheme based on Henon chaotic system (PESH) is presented in order to meet the requirements of secure image transfer. Scheme based on Henon chaotic system by Chen Wei-bin et al. , will be designated here as (SHCH). SHCH and a proposed encryption scheme (PESH) are applied for encrypting by changing the values of the image pixels. Combination of shuffling the positions and changing the values of image pixels is introduced to shuffle the relationship between the cipher-image and the plain-image. First, the Arnold Cat map or Baker chaotic map is used to shuffle the positions of the image pixels. Second, the shuffled-image is encrypted by using SHCH or a proposed (PESH) pixel by pixel. All of these procedures for encrypting are used with four modes of operations ECB, CBC, CFB, and OFB. The results of several experimental, statistical analysis, key sensitivity tests, NPCR and UACI analysis, and time analysis show that, a proposed image encryption scheme (PESH) alone or combined with whatever of confusion algorithms Arnold Cat map or Baker chaotic map, is the best scheme and provides an efficient and secure way for image encryption.

References
  1. N. k. Pareek, Vinod Patidar, K. K. Sud. 2006. Image Encryption Using Chaotic Logistic Map. Image and Vision Computing 24, 926-934.
  2. E. Petrisor. Oct. 2003. Entry and exit sets in the dynamics of area preserving Henon map. Chaos, Solitons and Fractals, pp. 651–658.
  3. L. Guo-hui, Z. Shi-ping, X. De-ming, L. Jian-wen. Dec. 2001. An Intermittent Linear Feedback Method for Controlling Henon-like Attractor. Journal of Applied Sciences, pp. 288–290.
  4. Chen Wei-bin, Zhang Xin. 2009. Image Encryption Algorithm Based on Henon Chaotic System. 978-1-4244-3986-7/09/$25. 00 © IEEE.
  5. Z. -H. Guan, F. Huang, W. Guan. Aug. 2005. Chaos-based image encryption algorithm. Physics Letters A 346, pp. 153–157.
  6. Zhenwei Shang, Honge Ren, Jian Zhang. 2008. A Block Location Scrambling Algorithm of Digital Image Based on Arnold Transformation. the 9th International Conference for Young Computer Scientists, 978-0-7695-3398-8/08/$25. 00 © IEEE.
  7. Zhu Liehuang, Li Wenzhuo, Liao Lejian, Li Hong. 2006. A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), 0-7695-2745-0/06 $20. 00 © IEEE.
  8. Jiri Fridrich. 1998. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, Vol. 8, No. 6 , 1259-1284.
  9. Nawal El-Fishawy, Osama M. Abu Zaid. Nov. 2007. Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security, 5(3) : 241–251.
  10. Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. August 20, 1998. The RC6TM Block Cipher. M. I. T. Laboratory forComputer Science, 545 Technology Square, Cambridge, MA 02139, USA,v1. 1.
  11. H. H. Nien, S. K. Changchien, S. Y. Wu, and C. K. Huang. 2008. A New Pixel- Chaotic- Shuffle Method for Image Encryption. ICARCV, Hanoi, Vietnam, December 2008, and 978-1-4244-2287-6/08 © IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Arnold Cat map Baker chaotic map Henon chaotic system Image encryption and Modes of operations