CFP last date
20 January 2025
Reseach Article

An Improved Cryptography Scheme for Secure Image Communication

by Bhaskar Mondal, Akash Priyadarshi, D. Hariharan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 18
Year of Publication: 2013
Authors: Bhaskar Mondal, Akash Priyadarshi, D. Hariharan
10.5120/11496-7206

Bhaskar Mondal, Akash Priyadarshi, D. Hariharan . An Improved Cryptography Scheme for Secure Image Communication. International Journal of Computer Applications. 67, 18 ( April 2013), 23-27. DOI=10.5120/11496-7206

@article{ 10.5120/11496-7206,
author = { Bhaskar Mondal, Akash Priyadarshi, D. Hariharan },
title = { An Improved Cryptography Scheme for Secure Image Communication },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 18 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number18/11496-7206/ },
doi = { 10.5120/11496-7206 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:48.368235+05:30
%A Bhaskar Mondal
%A Akash Priyadarshi
%A D. Hariharan
%T An Improved Cryptography Scheme for Secure Image Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 18
%P 23-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The traditional chaos algorithm is based on the logistic maps and has some drawbacks. In order to enhance the security, improved chaos system is used. It is based on location Transform and pixel value alteration using random sequence. The proposed algorithm shuffles the image based on the chaotic sequence and change the value of each pixel. The key generates 16 chaotic sequences from given sequence using a secret look-up matrix. Key used for encryption improves efficiency by acting on n sub-parts of image. The Matlab is used for simulation of image encryption algorithm. The algorithm's safety is analyzed from different aspects such as histogram comparison, correlation coefficient and secret key sensitivity. The algorithm proposed is robust against statistical attack, brute force attack and plain text attack.

References
  1. Philip P. Dang and Paul M. Chau. Image Encryption for Secure Internet Multimedia Applications [J]. IEEE Transactions on consumer electronics 2000, 395-443.
  2. HuaZhong Based on the chaotic image encryption technology research [D]. Changsha Polytechnic University, Master's Thesis, Hunan, Changsha, 5-6.
  3. R. A. J. Matthews. On the derivation of a chaotic encryption algorithm [J]. Cryptologia. 1989, 13(1): 29- 42.
  4. Fredrich J. Image Encryption Based on Chaotic Maps[C] , IEEE , 1997 , 1105-1110.
  5. T. Habutsu, Y. Nishio, I. Sasase, et al. A secret cryptosystem by iterating a chaotic map [A]. Advances in Cryptology EURCRYPT'91[C]. Berlin: Springer-Verlag. 1991:127-140.
  6. Zhang Han, Wang XiuFenget al. A new image encryption algorithm based on chaos system[C]. Proc. IEEEInt. Conf. Robotics, Intelligent Systems and Signal Processing. Changsha, China, October 2003:778-782.
  7. Ellis Horowitz, SartajSahni, and Dinesh Mehta. Fundamentals of Data Structures in C++[M]. W H Freeman , NY. 1995.
  8. Ai-hong Zhu and Lian Liu. Improving for chaos Image Encryption Algorithm based on logistic maps[C]. Environmental Science and Information Application Technology (ESIAT), 2010 International Conference. Page(s): c1 - c4
  9. Shannon CE. Communication theory of security systems [J]. the Bell System Tech J, 1949,28, pp. 656-715.
  10. Zhang Jun, Li Jinping, Wang Luqian. A New Compound Chaos Encryption Algorithm for Digital Images[C]. Information Technology and Applications (IFITA), 2010 International Forum. 2010 , Page(s): 277 – 279
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption chaotic sequence location transform random sequence