scholarly journals Triple layer image security using bit-shift, chaos, and stream encryption

2020 ◽  
Vol 9 (3) ◽  
pp. 980-987
Author(s):  
Ajib Susanto ◽  
De Rosal Ignatius Moses Setiadi ◽  
Eko Hari Rachmawanto ◽  
Ibnu Utomo Wahyu Mulyono ◽  
Christy Atika Sari ◽  
...  

One popular image security technique is image encryption. This research proposes an image encryption technique that consists of three encryption layers, i.e. bit-shift encryption, chaos-based encryption, and stream encryption. The chaos algorithm used is Arnold's chaotic map, while the stream cipher algorithm used is RC4. Each layer has different cryptology characteristics in order to obtain safer image encryption. The characteristics of cryptology are permutation, confusion, diffusion, and substitution. The combination of the proposed encryption method aims to secure images against various attacks, especially attacks on statistics and differentials. The encryption method testing is done by various measuring instruments such as statistical analysis, i.e. entropy information, avalanche effect, and histogram, differential analysis, i.e. UACI and NPCR, visual analysis using PSNR and SSIM, and bit error ratio. Based on the results of experiments that the encryption method that we propose can work excellently based on various measurement instruments. The decryption process can also work perfectly this is evidenced by the ∞ value based on PSNR, and zero value based on SSIM and BER.

2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Hui Ren ◽  
Jun Wang ◽  
Qiong-Hua Wang

We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.


Optik ◽  
2021 ◽  
pp. 167286
Author(s):  
Qiqi Cun ◽  
Xiaojun Tong ◽  
Zhu Wang ◽  
Miao Zhang

Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 171 ◽  
Author(s):  
Yujie Wan ◽  
Shuangquan Gu ◽  
Baoxiang Du

In order to obtain chaos with a wider chaotic scope and better chaotic behavior, this paper combines the several existing one-dimensional chaos and forms a new one-dimensional chaotic map by using a modular operation which is named by LLS system and abbreviated as LLSS. To get a better encryption effect, a new image encryption method based on double chaos and DNA coding technology is proposed in this paper. A new one-dimensional chaotic map is combined with a hyperchaotic Qi system to encrypt by using DNA coding. The first stage involves three rounds of scrambling; a diffusion algorithm is applied to the plaintext image, and then the intermediate ciphertext image is partitioned. The final encrypted image is formed by using DNA operation. Experimental simulation and security analysis show that this algorithm increases the key space, has high sensitivity, and can resist several common attacks. At the same time, the algorithm in this paper can reduce the correlation between adjacent pixels, making it close to 0, and increase the information entropy, making it close to the ideal value and achieving a good encryption effect.


2012 ◽  
Vol 468-471 ◽  
pp. 2908-2911
Author(s):  
Yu Chen

Information security in Electronic commerce is a very important, and image is one of the important information. Classic image encryption algorithms include Arnold cat transformation, magic square transformation, Hilbert transformation, and the Arnold cat transformation is widely applied and has the best scrambling effect effectively. It puts forward an algorithm of image encryption based on Arnold cat and chaotic map. The experiment results show that the key quantities and scrambling effect are improved obviously, and it is rapid and security.


2011 ◽  
Vol 279 ◽  
pp. 456-460
Author(s):  
Jian Hua Song ◽  
Qun Ding

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper, the sequence was generated using chaotic system, combined with high efficiency and better security in transform domain. An image encryption method based on Tent chaotic map in DCT domain was proposed. The simulation results show that this method has characteristics such as high efficiency and good safety, and has a certain practicality and objectivity.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2116
Author(s):  
Mustafa Kamil Khairullah ◽  
Ammar Ahmed Alkahtani ◽  
Mohd Zafri Bin Bin Baharuddin ◽  
Ammar Al-Jubari

Chaotic maps that can provide highly secure key sequences and ease of structure implementation are predominant requirements in image encryption systems. One Dimensional (1D) chaotic maps have the advantage of a simple structure and can be easily implemented by software and hardware. However, key sequences produced by 1D chaotic maps are not adequately secure. Therefore, to improve the 1D chaotic maps sequence security, we propose two chaotic maps: 1D Improved Logistic Map (1D-ILM) and 1D Improved Quadratic Map (1D-IQM). The proposed maps have shown higher efficiency than existing maps in terms of Lyapunov exponent, complexity, wider chaotic range, and higher sensitivity. Additionally, we present an efficient and fast encryption method based on 1D-ILM and 1D-IQM to enhance image encryption system performance. This paper also introduces a key expansion method to reduce the number of chaotic map iteration needs, thereby decreasing encryption time. The security analyses and experimental results are confirmed that 2D Correlation Coefficient (CC) Information Entropy (IE), Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Absolute Error (MAE), and decryption quality are able to meet the encryption security demands (CC = −0.00139, IE = 7.9990, NPCR = 99.6114%, UACI = 33.46952% and MAE = 85.3473). Furthermore, the proposed keyspace reaches 10240, and the encryption time is 0.025s for an image with a size of 256 × 256. The proposed system can yield efficacious security results compared to obtained results from other encryption systems.


Author(s):  
Abeer F. Shimal ◽  
Baydaa H. Helal ◽  
Ashwaq T. Hashim

<p>This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.</p>


Sign in / Sign up

Export Citation Format

Share Document