We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Image Encryption Algorithm based on Chaotic Map

by F. K. Tabash, M. Q. Rafiq, M. Izharrudin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 13
Year of Publication: 2013
Authors: F. K. Tabash, M. Q. Rafiq, M. Izharrudin
10.5120/10691-5600

F. K. Tabash, M. Q. Rafiq, M. Izharrudin . Image Encryption Algorithm based on Chaotic Map. International Journal of Computer Applications. 64, 13 ( February 2013), 1-10. DOI=10.5120/10691-5600

@article{ 10.5120/10691-5600,
author = { F. K. Tabash, M. Q. Rafiq, M. Izharrudin },
title = { Image Encryption Algorithm based on Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 13 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number13/10691-5600/ },
doi = { 10.5120/10691-5600 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:16:18.361848+05:30
%A F. K. Tabash
%A M. Q. Rafiq
%A M. Izharrudin
%T Image Encryption Algorithm based on Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 13
%P 1-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper, a new approach for image encryption based on three chaotic logistic maps and multi-pseudo random block permutation has been proposed. This approach is developed to meet the requirements of a secure image transfer. In the proposed image encryption technique, the encryption process has been divided mainly into three steps; the first step is to encrypt the whole image using logistic map, the second step is to divide the image into a random number of blocks, the third step is to generate a random permutation for these blocks. Step two and three will be repeated for a fixed time of iterations. At experimental analysis, the proposed algorithm is compared with other four algorithms. The comparison results show that the proposed algorithm works more efficient than other algorithms. Furthermore, the results of several statistical analysis and key sensitivity tests show that the proposed algorithm provides an effective and secure way for real-time image encryption and transmission.

References
  1. Alvarez, G. , and S. Li, S. , (2006), some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos, 16, 8, pp. 2129–2151.
  2. Bu SL, and Wang H. (2004), Improving the security of chaotic encryption by using a simple modulating method. Chaos, Solutions & Fractals, 19, pp. 919–24.
  3. C. C. Chang, M. S. Hwang, and T. S. Chen, (2001), A new encryption algorithm for image cryptosystems, J. Syst. Software, 58,pp. 83–91.
  4. Fridrich, J. ,(1998), Symmetric ciphers based on two dimensional chaotic maps, Int. J. Bifurcat Chaos, 8, 6, pp1259–1284.
  5. Haojiang, G. , Yisheng, Z. , Shuyun, Li. , and Dequn, Li. , (2005). A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29, pp. 393–399.
  6. Li S. , and Zheng, X. , (2002). Cryptanalysis of a chaotic image encryption method, IEEE Int Symp Circ Syst, 2, pp. 708–11.
  7. Linhua Z. , et al. ,(2005), An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals, 24, pp. 759–765
  8. N. Bourbakis and C. Alexopoulos (1992), Picture data encryption using SCAN pattern, Pattern Recogn, 25 ,pp. 567–581.
  9. N. K. Pareek , et al. , (2006). Sud. Image encryption using chaotic logistic map. Image and Vision Computing,24,pp. 926–934.
  10. Ruisong, Y. and Haiying ,Z. (2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. I. J. Computer Network and Information Security, 7, pp. 41-50.
  11. Wu XG, Hu HP, and Zhang BL (2004). Analyzing and improving a chaotic encryption method. Chaos, Solutions & Fractals, pp. 367–73.
  12. Zhang, et al. , (2011), A novel image encryption method based on total shuffling scheme. Opt. Communication. , 284, pp 2775-2780. [1-21]
  13. Zhaopin Su, Guofu Zhang and Jianguo Jiang (2012). Multimedia Security: A Survey of Chaos-Based Encryption Technology, Multimedia - A Multidisciplinary Approach to Complex Issues, Dr. Ioannis Karydis (Ed. ), ISBN: 978-953-51-0216-8, InTech, Available from: http://www. intechopen. com/books/multimedia-amultidisciplinary- approach-to-complex-issues/multimedia-security-a-survey-of-chaos-based-encryptiontechnology.
  14. Zhu, Z. L. , et al. , (2010), A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sci, 181, pp1171-1186.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos Logistic map Image encryption Algorithm