[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3387168.3389111acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvispConference Proceedingsconference-collections
research-article

New Image Encryption Scheme Using Chaotic Maps

Published: 25 May 2020 Publication History

Abstract

Data on the Internet is always vulnerable to different types of attacks due to the public nature of the Internet, which is the only source of communication all over the world. To protect sensitive information, many encryption techniques like Gingerbreadman chaotic map and S8 permutation-based image encryption scheme are proposed. However, due to security issues in these techniques, 3D Logistic map based confusion and diffusion processes are employed which solve those security problems.3D Logistic map was used to eliminate the strong correlation between the plain text image pixels. A random matrix is created in the diffusion stage via a 3D Logistic map and XORed with the scrambled image. The final ciphertext image is extracted using existing Gingerbread-man chaotic map based S-Box. The proposed scheme is analyzed experimentally and statistically using key space analysis, information entropy analysis, and differential analysis. Results are also validated via the Number of Pixel Rate Change (NPRC) to ensure the security and robustness of the proposed scheme.

References

[1]
Ahmad, J., Larijani, H., Emmanuel, R., & Mannion, M. (2018, September). Secure Occupancy Monitoring System for IoT Using Lightweight Intertwining Logistic Map. In 2018 10th Computer Science and Electronic Engineering (CEEC) (pp. 208--213). IEEE.
[2]
Ahmad, J., Larijani, H., Emmanuel, R., & Mannion, A Javeed. Occupancy Detection in Non-residential Buildings -A Survey and Novel Privacy Preserved Occupancy Monitoring Solution. Applied Computing and Informatics, 2018.
[3]
A. U. Rehman, J. S. Khan, J. Ahmad, and S. O. Hwang, "A new image encryption scheme based on dynamic s-boxes and chaotic maps," 3D Research, vol. 7, no. 1, pp. 1--8, 2016.
[4]
A. Anees, A. M. Siddiqui, and F. Ahmed, "Chaotic substitution for highly autocorrelated data in encryption algorithm," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 9, pp. 3106- 3118, 2014.
[5]
C. Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29--37, 2012.
[6]
"Color image encryption using spatial bit-level permutation and high-dimension chaotic system," Optics Communications, vol. 284, no. 16, pp. 3895--3903, 2011.
[7]
F. A. Khan, J. Ahmed, J. S. Khan, J. Ahmad, M. A. Khan, S. O. Hwang, "A new technique for designing 8x 8 substitution box for image encryption applications", Computer Science and Electronic Engineering (CEEC) 2017. IEEE, pp. 7--12, 2017.
[8]
G. Sathishkumar, D. N. Sriraam et al., "Image encryption based on diffusion and multiple chaotic maps," arXiv preprint arXiv: 1103.3792, 2011.
[9]
G. Jakimoski, L. Kocarev et al., "Chaos and cryptography: block encryption ciphers based on chaotic maps," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 48, no. 2, pp. 163--169, 2001.
[10]
G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 08, pp. 2129--2151, 2006.
[11]
J. Ahmad, S. O. Hwang, "A secure image encryption scheme based on chaoti map and affine transformation," Multimedia Tools and Applications, Volume 75, Issue 21, pp 13951--13976, 2016.
[12]
J. Ahmad and S. O. Hwang, "A fast encryption/decryption scheme for biometric images using multiple chaotic maps," IMTIC'15 --- International Multi-Topic conference, p. 104.
[13]
J. S. Khan and J. Ahmad, "Chaos-based efficient selective image encryption," Multidimensional Systems and Signal Processing, pp. 1--19, 2018.
[14]
J. Ahmad and S. O. Hwang, "Chaos-based diffusion for highly autocorrelated data in encryption algorithms," Nonlinear Dynamics, vol. 82, no. 4, pp. 1839--1850, 2015.
[15]
J. Ahmad and F. Ahmed, "Efficiency analysis and security evaluation of image encryption schemes," International Journal of Video & Image Processing and Network Security, vol. 12, no. 4, pp. 18--31, 2012.
[16]
J. S. Khan, J. Ahmad, and M. A. Khan, "Td-ercs map-based confusion and diffusion of autocorrelated data," Nonlinear Dynamics, pp. 1--15, 2016.
[17]
J. W. Yoon and H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 3998--4006, 2010.
[18]
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018, August). Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 12--16). IEEE.
[19]
Khan, J. S., Ahmad, J., Abbasi, S. F., & Kayhan, S. K. (2018, September). DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC) (pp. 24--29). IEEE.
[20]
L. Zhang, X. Liao, and X. Wang, "An image encryption approach based on chaotic maps," Chaos, Solitons & Fractals, vol. 24, no. 3, pp. 759--765, 2005.
[21]
M. Khan and Z. Asghar, "A novel construction of substitution box for image encryption applications with gingerbreadman chaotic map and s8 permutation," Neural Computing and Applications, pp. 1--7.
[22]
R. Rhouma and S. Belghith, "Cryptanalysis of a new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 38, pp. 5973--5978, 2008.
[23]
R. Matthews, "On the derivation of a chaotic encryption algorithm," Cryptologia, vol. 13, no. 1, pp. 29--42, 1989.
[24]
S. F. Abbasi, J. Ahmad, J. S. Khan, M. A. Khan, and S. A. Sheikh, "Visual meaningful encryption scheme using intertwinning logistic map," in Science and Information Conference. Springer, 2018, pp. 764--773.
[25]
S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, and A. Akhavan, "A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps," Physics Letters A, vol. 366, no. 4, pp. 391--396, 2007.
[26]
S. Mazloom and A. M. Eftekhari-Moghadam, "Color image encryptionbased on coupled nonlinear chaotic map," Chaos, Solitons & Fractals, vol. 42, no. 3, pp. 1745--1754, 2009.
[27]
T. Gao and Z. Chen, "A new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 4, pp. 394--400, 2008.
[28]
X. Wang, X. Wang, J. Zhao, and Z. Zhang, "Chaotic encryption algorithm based on alternant of stream cipher and block cipher," Nonlinear Dynamics, vol. 63, no. 4, pp. 587--597, 2011.
[29]
X.-Y. Wang, L. Yang, R. Liu, and A. Kadir, "A chaotic image encryption algorithm based on perceptron model," Nonlinear Dynamics, vol. 62, no. 3, pp. 615--621, 2010.
[30]
X. Tong and M. Cui, "Image encryption scheme based on 3d baker with dynamical compound chaotic sequence cipher generator," Signal processing, vol. 89, no. 4, pp. 480--491, 2009.
[31]
Y.-Q. Zhang and X.-Y. Wang, "A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice," Information Sciences, vol. 273, pp. 329--351, 2014.
[32]
Y. Li, X. Li, X. Jin et al., "An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map," in Applications and Techniques in Information Security, vol. 557 of Communications in Computer and Information Science, pp. 3--13, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015.
[33]
Z. Habib, J. S. Khan, J. Ahmad, M. A. Khan, F. A. Khan, "Secure speech communication algorithm via dct and td-ercs chaotic map", Electrical and Electronic Engineering (ICEEE) 2017 4th International Conference on. IEEE, pp. 246--250, 2017.

Index Terms

  1. New Image Encryption Scheme Using Chaotic Maps

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICVISP 2019: Proceedings of the 3rd International Conference on Vision, Image and Signal Processing
    August 2019
    584 pages
    ISBN:9781450376259
    DOI:10.1145/3387168
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 May 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 3D Logistic
    2. Gingerbreadman chaotic map
    3. NPCR
    4. S-Box
    5. UACI

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICVISP 2019

    Acceptance Rates

    ICVISP 2019 Paper Acceptance Rate 126 of 277 submissions, 45%;
    Overall Acceptance Rate 186 of 424 submissions, 44%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 68
      Total Downloads
    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media