Simple Permutation and Diffusion Operation Based Image Encryption Using Various One-Dimensional Chaotic Maps: A Comparative Analysis on Security

Author(s):  
Dasari Sravanthi ◽  
K. Abhimanyu Kumar Patro ◽  
Bibhudendra Acharya ◽  
M. Prasanth Jagapathi Babu
Author(s):  
K. Abhimanyu Kumar Patro ◽  
Mukesh Drolia ◽  
Akash Deep Yadav ◽  
Bibhudendra Acharya

In this present era, where everything is getting digitalized, information or data in any form, important to an organization or individual, are at a greater risk of being attacked under acts, commonly known as cyber-attack. Hence, a proper and more efficient cryptosystem is the prime need of the hour to secure the data (especially the image data). This chapter proposes an efficient multi-point crossover operation-based chaotic image encryption system to secure images. The multi-point crossover operation is performed on both the rows and columns of bit-planes in the images. The improved one-dimensional chaotic maps are then used to perform pixel-permutation and diffusion operations. The main advantage of this technique is the use of multi-point crossover operation in bit-levels. The multi-point crossover operation not only increases the security of cipher images but also increases the key space of the algorithm. The outcomes and analyses of various parameters show the best performance of the algorithm in image encryption and different common attacks.


Author(s):  
Mona F. M. Mursi ◽  
Hossam Eldin H. Ahmed ◽  
Fathi E. Abd El-Samie ◽  
Ayman H. Abd El-Aziem

In this paper, the authors propose an image encryption scheme based on the development of a Hénon chaotic map using fractional Fourier transform (FRFT) which is introduced to satisfy the necessity of high secure image. This proposed algorithm combines the main advantages of confusion and diffusion with (FRFT), it use Arnold Cat map for confusion and Hénon chaotic map or one of the proposed Hénon chaotic maps for diffusion. The proposed algorithm is compared with some image encryption algorithms based on Arnold Cat map, Baker chaotic map, Hénon chaotic map and RC6. The authors perform a comparison between them in several experimental tests as statistical analyses, processing time and security analysis. The authors find from these comparison tests that the proposed algorithm demonstrates good result even better than RC6 and other chaotic maps in some cases.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-23 ◽  
Author(s):  
Ibrahim Yasser ◽  
Fahmi Khalifa ◽  
Mohamed A. Mohamed ◽  
Ahmed S. Samrah

Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, such as speed, high security, affordable overheads for computation, and procedure power. In this paper, we propose a novel perturbation algorithm for data encryption based on double chaotic systems. A new image encryption algorithm based on the proposed chaotic maps is introduced. The proposed chaotification method is a hybrid technique that parallels and combines the chaotic maps. It is based on combination between Discrete Wavelet Transform (DWT) to decompose the original image into sub-bands and both permutation and diffusion properties are attained using the chaotic states and parameters of the proposed maps, which are then concerned in shuffling of pixel and operations of substitution, respectively. Security, statistical test analyses, and comparison with other techniques indicate that the proposed algorithm has promising effect and it can resist several common attacks. Namely, the average values for UACI and NPCR metrics were 33.6248% and 99.6472%, respectively. Additionally, unscrambling quality can fulfill security and execution prerequisites as evidenced by PSNR (9.005955) and entropy (7.999275) values. In sum, the proposed method has enough ability to achieve low residual intelligibility with high quality recovered data, high sensitivity, and high security performance compared to some other recent literature approaches.


Optik ◽  
2016 ◽  
Vol 127 (7) ◽  
pp. 3541-3545 ◽  
Author(s):  
Bin Wang ◽  
Yingjie Xie ◽  
Changjun Zhou ◽  
Shihua Zhou ◽  
Xuedong Zheng

Author(s):  
M.K MOHSINA ◽  
ROBIN ABRAHAM

The advent of wireless communications, both inside and outside the home-office environment has led to an Increased demand for effective encryption systems. The encryption of images is quite different from that of the texts due to the bulk data capacity and high redundancy of images. Traditional methods are difficult to handle the image encryption because of their small space of pseudo random sequence. At present, the chaotic maps have been widely used in image encryption for their extreme sensitivity to tiny changes of initial conditions. The chaos based algorithms have suggested a new and efficient way to deal with the problem of fast and highly secure image encryption. In this paper, we propose an algorithm in which two one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. We also use an external secret key of 96-bits. Thereby it significantly increases the resistance to statistical and differential attacks. The results of experiment, statistical analysis, correlation coefficient analysis and key sensitivity tests show that the algorithm is of great security and practicability.


2013 ◽  
Vol 24 (10) ◽  
pp. 1350071 ◽  
Author(s):  
PING PING ◽  
FENG XU ◽  
ZHI-JIAN WANG

Cellular automaton (CA) has a lot of inherent features, such as simple regular structure, local interaction, random-like behavior and massive parallelism, which make it a good candidate to design cryptosystems. Therefore, a number of CA-based image encryption systems have been proposed, though the drawbacks of small key space and weak security in one-dimensional (1D) CA cryptosystems are obvious. In this paper, a novel image encryption scheme is presented using a two-dimensional (2D) CA with nonlinear balanced rules. During the whole process of encryption, the confusion operation is performed by the nonlinear rule of CA, while the diffusion operation is achieved by the local interactions among cells. So confusion and diffusion are well integrated in our proposed scheme. The corresponding simulations and analyses illustrate that the scheme has quite prominent cryptographic properties as well as high security.


Sign in / Sign up

Export Citation Format

Share Document