We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

New Chaotic Information Security Algorithms

by Hazem Al-najjar, Nadia Al-rousan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 5
Year of Publication: 2013
Authors: Hazem Al-najjar, Nadia Al-rousan
10.5120/12740-9632

Hazem Al-najjar, Nadia Al-rousan . New Chaotic Information Security Algorithms. International Journal of Computer Applications. 73, 5 ( July 2013), 33-39. DOI=10.5120/12740-9632

@article{ 10.5120/12740-9632,
author = { Hazem Al-najjar, Nadia Al-rousan },
title = { New Chaotic Information Security Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 5 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number5/12740-9632/ },
doi = { 10.5120/12740-9632 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:18.647943+05:30
%A Hazem Al-najjar
%A Nadia Al-rousan
%T New Chaotic Information Security Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 5
%P 33-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, new information security algorithms using a Rossler chaotic function are suggested, which contain image encryption, data encryption and data hiding. In designing the image encryption algorithm, a chaotic block was used to change the pixels value using the target pixels in each block. The experiments show that the system performance is improved and the cipher image characteristics are enhanced. Where, in the data encryption algorithm N x N blocks were used to encrypt the text files, so each character in the file will represent one generated block. The experiments show that the system is efficient and fast in encrypting the large text files but the size of the encrypted file will be increased dramatically since the characters will be converted to nine bits. On another hand, the data hiding algorithm is designed using chaotic block which improves the PSNR of stego-images. However, the suggested algorithms show that using the chaotic functions and N x N blocks will enhance and improve the information security.

References
  1. E . Xu; L. Shao, G. Cao , Y. Ren and T. Qu. "A New Method of Information Encryption," Int. Colloqu'ium on Computing, Communication, Control, and Management, 2009, pp. 583-586.
  2. A. A. Shtewi, B. Hasan, A. Hegazy. "An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems," Int. Journal of Computer Science and Network Security, vol. 10 no. 2, February 2010.
  3. Z. Dinghui; G. Qiujie, P. Yonghua and Z. Xinghua. "Discrete Chaotic Encryption and Decryption of Digital Images," Int. Conf. on Computer Science and Software Engineering, 2009 pp. 849- 852.
  4. H. Nien; W. Huang; C. Hung; C. Huang and Y. Hsu. "Hybrid image encryption using multi-chaos-system," Int. Conf. in Information, Communications and Signal Processing (ICICS),2009 pp. 1-5.
  5. W. Zhu; Y. Shen. "Encryption Algorithms Using Chaos and CAT Methodology," Int. Conf. Anti-Counterfeiting Security and Identification in Communication (ASID), 2010, pp. 20 – 23.
  6. R. Rhouma and B. Safya. "Cryptoanalysis of a new image encryption algorithm based on hyper-chaos," Phyiscal Letters A, Vol. 372, 2008, pp. 5973-5978.
  7. J. Delei; B. Sen and D. Wenming. "An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-filter," Int. Conf. on Computer Science and Software Engineering, 2008, pp. 251-255.
  8. Xing-Yuan, Wang, and Liu Lin-Tao. "Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices. " Chinese Physics B 22. 5 (2013): 050503.
  9. X. Di, L. Xiaofeng and W. Pengcheng. "Analysis and improvement of a chaos image encryption algorithm," Chaos, Solution and Fractals, 2009, vol. 40, pp. 2191-2199.
  10. N. Al-Rousan and H. Al-Najjar. "Digital Image Encryption Algorithm Based on Chaotic Block and Pixel Mapping Table," International Journal of Computer Theory and Engineering, Vol. 4, No. 6, June 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Image encryption Data encryption Data hiding Rossler Chaotic function