A secure image cryptosystem via multiple chaotic maps

Author(s):  
Mayada T. Wazi ◽  
Dalia S. Ali ◽  
Nadia M. G. Al-Saidi ◽  
Nawras A. Alawn

This work focused on introducing a new two-dimensional (2D) chaotic system. It is combined of some existing maps, the logistic, iterative chaotic map with infinite collapse, and Henon maps; we called it 2D-LCHM. The assessment of the actual performance of 2D-LCHM presents its sensitivity to a tiny change in the initial condition. Besides, its dynamics behavior is very complicated. It also has hyperchaotic properties and good ergodicity. The proposed system is occupied with designing a new image encryption system. Changing the image pixels’ locations is the primary step in the encryption process. The original image is splitting into four blocks to create four different keys based on 2D-LCHM; this reduces the computation time and increases the complexity. To obtain the encryption image, we have to repeat the partitioning process several times for each block. The encryption image’s efficiency is shown through some performance analysis such as; image histogram, the number of pixels changes rate (NPCR), the unified average changing intensity (UACI), pixels correlation, and entropy. The proposed system is compared with some efficient encryption algorithms in terms of chaocity attributes and image performance; the analysis result showed consistent improvement.

Author(s):  
Shafali Agarwal

The chapter intends to propose a hybrid cryptosystem based on a chaotic map and a fractal function. The sequential order of process execution provides a computationally less expensive and simple approach that still designed a secure cryptosystem. A one-dimensional Ricker map and its modified form are employed to initially shuffle the image pixels twice, and also a pseudo-random sequence is generated using both maps. The algorithm implemented a sequence of pixel confusion-diffusion steps using the image rotation and a transcendental anti-Mandelbrot fractal function (TAMFF) and its Mann-iterated fractal function (Sup-TAMFF). Finally, the pixel value of an image obtained in the last step and the recent two pixels of the encrypted image is XORed with the corresponding pseudo-random matrix value to get the cipher image. Subsequently, various performance tests are conducted to verify the suitability of the given method to be used in real-world information transmission.


2019 ◽  
Vol 31 (4) ◽  
pp. 613-633 ◽  
Author(s):  
Sylvia Breukers ◽  
Tracey Crosbie ◽  
Luc van Summeren

If the designers of technologies intended to reduce or shift energy consumption are not sensitive to how people live and work in buildings, a gap occurs between the expected and actual performance of those technologies. This paper explores this problem using the concepts of ‘design logic’ (designers’ ideas, values, intentions and user representations) and the ‘user logic’ (related in this case to how building occupants currently live and work in a building). The research presented unpacks the ‘design logic’ embedded in DR approaches planned for implementation at four blocks of buildings in a Horizon 2020 funded project, called “Demand Response in Blocks of Buildings” (DR-BoB). It discusses how the ‘user logic’ may differ from the ‘design logic’ and the potential impact of this on the performance of the technologies being implemented to reduce or shift energy consumption. The data analysed includes technical working documents describing the implementation scenarios of DR at four pilot sites, interviews and workshops conducted with the project team and building occupants during the first phases of the project. The analysis presented identifies how expectations about building occupants and their behaviours are built into the DR scenarios (to be tested during the project demonstrations). Initial findings suggest that building occupants’ energy use practices and routines may be different from those expectations. The paper illustrates how the concepts of ‘design logic’ and ‘user logic’ can be used to identify mismatches before technologies are implemented. The paper concludes with recommendations for improving the design and implementation of DR.


2010 ◽  
Vol 34-35 ◽  
pp. 1735-1738
Author(s):  
Feng Huang ◽  
Xing Ping Liu

The paper designs an image security system. It includes four parts: keys generation, permutation, diffusion and decryption. Using six decimal numbers as the key, it can get three new keys: key1, key2 and key3 from the origin key in keys generation. The permutation used a new chaotic map to shuffles the image pixels by key1 and key2. The diffusion used the logistic map to flat the histogram of the ciphered image. The key3 is the parameters of the logistic map. The results of simulation show the validity of security system. Analysis shows that it can be used in real-time image encryption applications with high speed.


Author(s):  
Varre Divya Sai Manikanta

Abstract: Encryption Algorithms are necessary part of the data sharing today as every bit of data need encryption so that it could be transferred from one place to another without the fear of data leaking. Every lost bit of data puts the system to danger. Encryption algorithms compose of necessary steps involving a key that helps converting plain text to cipher text. All the steps must be performed carefully to ensure that the data encrypted is found back. Thus, many algorithms are made to run sequentially and in serial. This makes the algorithm to take much computation time. Keywords: Parallelize, encryption algorithms, multi-threading.


Author(s):  
Yahia Alemami ◽  
Mohamad Afendee Mohamed ◽  
Saleh Atiewi ◽  
Mustafa Mamat

There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional cryptography built on top of mathematical structures. This research focuses on the protection of speech recording by encrypting it with multiple encryption algorithms, including chaotic maps (Logistic Map and Sine Maps).


2013 ◽  
Vol 325-326 ◽  
pp. 1502-1507 ◽  
Author(s):  
Xuan Fang ◽  
Cai Qiong ◽  
Lan Fang

Due to the single chaotic map on finite precisions chaotic characteristics emerge degradation,the length of cycle become shorter, the Hash algorithm constructed by it is easily forecast, the security is not strong.In this paper, the nonlinear devices in the traditional block cipher S-box is used to construct variable parameters Hash algorithm composed of multiple chaotic maps. By using the original message, intermediate values of iteration and number of iterations as the input of the S-box, output of S-box is used to determine the parameters of chaotic maps, on this account to change the chaotic mapping function for each round. By execute text testing, statistical analysis and collision analysis for this algorithm through simulation experiments, the experimental results show that this generalized chaotic Hash algorithm has good sensitivity of the information, low possibility of collision,good safety and operational efficiency.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1392
Author(s):  
Ahmed A. Abd El-Latif ◽  
Bassem Abd-El-Atty ◽  
Akram Belazi ◽  
Abdullah M. Iliyasu

Chaotic systems are vital in designing contemporary cryptographic systems. This study proposes an innovative method for constructing an effective substitution box using a 3-dimensional chaotic map. Moreover, bouyed by the efficiency of the proposed chaos-based substitution boxes’ effectiveness, we introduce a new chaos-based image cryptosystem that combines the adeptness of Gray codes, a non-linear and sensitive hyper-chaotic system, and the proposed S-box. The generated secret key emanating from the cryptosystem is correlated to the input image to produce a unique key for each image. Extensive experimental outcomes demonstrate the utility, effectiveness, and high performance of the resulting cryptosystem.


Sign in / Sign up

Export Citation Format

Share Document