[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3271553.3271577acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvispConference Proceedingsconference-collections
research-article

Cryptographic Key Generation Using Burning Ship Fractal

Published: 27 August 2018 Publication History

Abstract

The study introduces a key generation scheme using a burning ship fractal function, Hilbert transformation and an external key. The burning ship function is a modified version of a well-known Mandelbrot set function in which absolute value of a complex variable is considered. The process starts with the scrambling of the fractal image pixels by applying a Hilbert curve scanning. To enhance the randomness and complexity, an external key is obtained using a pseudo random number generator (PRNG), whose length depends on the size of the used fractal image. Further, a covering module is applied in which eight different types of operations are performed recursively to cover the scrambled fractal image pixels using eight different keys. At each iteration, a modified external key was used to perform the respective operation to the remaining image pixels. Moreover, to ensure the robustness of the proposed scheme, each block of tempkey (created in previous step) permuted using the sorting indexes of the modified tempkey blocks. The performance analysis of the given method is carried out in terms of the key space, key sensitivity, key generation time, histogram, and correlation coefficient. The results indicate that the proposed method is reliable and secure with great potential to be further use in the image encryption applications.

References

[1]
Abd-El-Hafiz, S. K.; Radwan, A. G.; Haleem, S. H. A.; Barakat, M. L. A fractal-based image encryption system. IET Image Process. 2014, 8, 742--752.
[2]
AbdElHaleem, S. H.; Radwan, A. G.; Abd-El-Hafiz, S. K. Design of pseudo random keystream generator using fractals. In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS); 2013; pp. 877--880.
[3]
Agarwal, S. Secure Image Transmission Using Fractal and 2D-Chaotic Map. J. Imaging 2018, 4, 17.
[4]
Agarwal, S.; Negi, A. Burning Ship and Its Quasi Julia Images Using Mann Iteration. In Recent Advances in Intelligent Informatics; Springer, 2014; pp. 401--410.
[5]
Agarwal, S.; Negi, A. INVENTIVE BURNING SHIP. Int. J. Adv. Eng. Technol. 2013, 6, 1788.
[6]
Alia, M.; Samsudin, A. A new public-key cryptosystem based on mandelbrot and julia fractal sets. Asian J. Inf. Technol. AJIT 2007, 6, 567--575.
[7]
Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129--2151.
[8]
Chopra, A.; Ahmad, M.; Malik, M. An enhanced modulo-based image encryption using chaotic and fractal keys. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in; IEEE, 2015; pp. 501--506.
[9]
Crownover, R. M. Introduction to fractals and chaos; Jones & Bartlett Pub, 1995;
[10]
Faraoun, K. Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. Int Arab J Inf Technol 2010, 7, 231--240.
[11]
Howell, B.; Reese, A.; Basile, M. Fractal Cryptology. N. M. High Sch. Supercomput. Chall. Final Rep. 2003.
[12]
Huntress, G. B. Encryption using fractal key 2004.
[13]
Hussain, S. M.; Al-Bahadili, H. A DNA-Based Cryptographic Key Generation Algorithm.
[14]
Ivo, M.; Jasek, R.; Varacha, P. Analysis of the Fractal Structures For the Information Encrypting Process. Int. J. Comput. 2012, 6, 224--231.
[15]
Kashanian, H.; Davoudi, M.; Khorramfar, H. Image Encryption using chaos functions and fractal key. Int. J. Comput. Sci. Netw. Secur. IJCSNS 2016, 16, 87.
[16]
Kumar, S. Public key cryptographic system using Mandelbrot sets. In Military Communications Conference, 2006. MILCOM 2006. IEEE; IEEE, 2006; pp. 1--5.
[17]
Mandelbrot, B. B. Fractal aspects of the iteration of z→ Λz (1-z) for complex Λ and z. Ann. N. Y. Acad. Sci. 1980, 357, 249--259.
[18]
Mandelbrot, B. B. The fractal geometry of nature; WH freeman New York, 1983; Vol. 173;.
[19]
Meligy, A. M.; Diab, H. A.; El-Danaf, M. S. Chaos Encryption Algorithm using Key Generation from Biometric Image. Int. J. Comput. Appl. 2016, 149.
[20]
Michelitsch, M.; Rössler, O. E. Spiral structures in Julia sets and related sets. In Spiral symmetry; World Scientific, 1992; pp. 129--134.
[21]
Michelitsch, M.; Rössler, O. E. The "burning ship" and its quasi-Julia sets. Comput. Graph. 1992, 16, 435--438.
[22]
Mikhail, M.; Abouelseoud, Y.; ElKobrosy, G. Two-Phase Image Encryption Scheme Based on FFCT and Fractals Available online: https://www.hindawi.com/journals/scn/2017/7367518/abs/ (accessed on Nov 9, 2017).
[23]
Oğrraş, H.; Türk, M. A Robust Chaos-Based Image Cryptosystem with an Improved Key Generator and Plain Image Sensitivity Mechanism. J. Inf. Secur. 2017, 08, 23--41.
[24]
Pickover, C. A. Computers, Pattern, Chaos, and Beauty: Graphics from an Unseen World; Courier Corporation, 2001; ISBN 978-0-486-41709-7.
[25]
Rozouvan, V. Modulo image encryption with fractal keys. Opt. Lasers Eng. 2009, 47, 1--6.
[26]
Sattari, S.; Akkasi, A.; Lari, R. A.; Khodaparasti, M. Cryptography in social networks using wavelet transform, fractals and chaotic functions. Int. Res. J. Appl. Basic Sci. Sci. Explor. Publ. ISSN 2015, 1627--1635.
[27]
Shaw, J.; Saha, O.; Chaudhuri, A. An Approach for Secured Transmission of Data using Fractal based Chaos. In IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing; Citeseer, 2012; pp. 13--17.
[28]
Sivakumar, T.; Venkatesan, R. Image encryption based on pixel shuffling and random key stream. Int. J. Comput. Inf. Technol. 2014, 3.
[29]
Sun, Y.; Chen, L.; Xu, R.; Kong, R. An image encryption algorithm utilizing Julia Sets and Hilbert Curves. PloS One 2014, 9, e84655.
[30]
Sun, Y.; Kong, R.; Wang, X.; Bi, L. An image encryption algorithm utilizing Mandelbrot set. In Chaos-Fractals Theories and Applications (IWCFTA), 2010 International Workshop on; IEEE, 2010; pp. 170--173.
[31]
Sun, Y.; Xu, R.; Chen, L.; Hu, X. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Process. 2015, 9, 173--183.
[32]
Wu, Y.; Noonan, J. P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. JSAT 2011, 31--38.
[33]
Zhang, Q.; Zhou, S.; Wei, X. An efficient approach for DNA fractal-based image encryption. Appl Math Inf Sci 2011, 5, 445--459.

Cited By

View all
  • (2024)On the viscosity approximation type iterative method and its non-linear behaviour in the generation of Mandelbrot and Julia setsNumerical Algorithms10.1007/s11075-023-01644-496:1(211-236)Online publication date: 1-May-2024
  • (2022)A Novel Chaotic map to improve security Image Based on Mandelbrot Fractals2022 International Conference on Data Science and Intelligent Computing (ICDSIC)10.1109/ICDSIC56987.2022.10075702(58-64)Online publication date: 1-Nov-2022
  • (2022)An Application of Viscosity Approximation Type Iterative Method in the Generation of Mandelbrot and Julia FractalsAequationes mathematicae10.1007/s00010-022-00908-z97:2(257-278)Online publication date: 20-Aug-2022
  • Show More Cited By

Index Terms

  1. Cryptographic Key Generation Using Burning Ship Fractal

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICVISP 2018: Proceedings of the 2nd International Conference on Vision, Image and Signal Processing
    August 2018
    402 pages
    ISBN:9781450365291
    DOI:10.1145/3271553
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 August 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Burning ship fractal
    2. Hilbert transformation
    3. Keystream generator
    4. PRNG

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICVISP 2018

    Acceptance Rates

    Overall Acceptance Rate 186 of 424 submissions, 44%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)On the viscosity approximation type iterative method and its non-linear behaviour in the generation of Mandelbrot and Julia setsNumerical Algorithms10.1007/s11075-023-01644-496:1(211-236)Online publication date: 1-May-2024
    • (2022)A Novel Chaotic map to improve security Image Based on Mandelbrot Fractals2022 International Conference on Data Science and Intelligent Computing (ICDSIC)10.1109/ICDSIC56987.2022.10075702(58-64)Online publication date: 1-Nov-2022
    • (2022)An Application of Viscosity Approximation Type Iterative Method in the Generation of Mandelbrot and Julia FractalsAequationes mathematicae10.1007/s00010-022-00908-z97:2(257-278)Online publication date: 20-Aug-2022
    • (2020)Performance comparison in simulation of Mandelbrot set fractals using NumbaTHE 5TH INTERNATIONAL CONFERENCE ON INDUSTRIAL, MECHANICAL, ELECTRICAL, AND CHEMICAL ENGINEERING 2019 (ICIMECE 2019)10.1063/5.0000636(030007)Online publication date: 2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media