An Image Encryption Scheme Using Chaotic Baker Map

2020 ◽  
Vol 17 (5) ◽  
pp. 2130-2135
Author(s):  
S. Saravanan ◽  
M. Sivabalakrishnan

In this paper, we propose a new image encryption method based on Chaos Baker map and Lanczos algorithm. Two levels of security are achieved to enhance the level of image security. In the first level, the Chaotic Baker map is a randomization technique used to make the pixels more shuffled. A pseudo-random generator is used with the second-level Lanczos algorithm which is applied to generate eigenvalues and eigenvectors. The proposed method resists various attacks: plaintext attacks, maximum deviation, correlation analysis and key sensitivity. Experimental results show that this method has better time complexity when protecting images.

Recently, security for the image is becoming very important. Image Encryption is the only choice in protecting the digital image by transforming the image into an unreadable format. There are many methods used to protect against unauthorized access. This research proposes a framework for image encryption using Chaos Baker map with SHA-1 algorithm. The Chaotic Baker map is a randomization technique used to make the pixels more shuffled. Key generation is essential part of image encryption, which will be carried out by SHA-1 algorithm. Experimental results show that the proposed method is well suited for high security, key sensitivity and resists various attacks.


2013 ◽  
Vol 31 (15) ◽  
pp. 2533-2539 ◽  
Author(s):  
Ahmed M. Elshamy ◽  
Ahmed N. Z. Rashed ◽  
Abd El-Naser A. Mohamed ◽  
Osama S. Faragalla ◽  
Yi Mu ◽  
...  

2020 ◽  
Vol 32 ◽  
pp. 03009
Author(s):  
Vishwanath Chikkareddi ◽  
Anurag Ghosh ◽  
Preksha Jagtap ◽  
Sahil Joshi ◽  
Jeel Kanzaria

One of the important application of image encryption is storing confidential and important images on a local device or a database in such a way that only the authorized party can view or perceive it. The current image encryption technique employs the genetic algorithm to increase confusion in the image, but compromises in time and space complexity. The other method employs chaos or pseudo random number generating systems which have fast and highly sensitive keys but fails to make the image sufficiently noisy and is risky due to its deterministic nature. We propose a technique which employs the non-deterministic, optimizing power of genetic algorithm and the space efficiency and key sensitivity of chaotic systems into a unified, efficient algorithm which will retain the merits of both the methods whereas tries to minimize their demerits in a software system. The encryption process proceeds in two steps, generating two keys. First, an encryption sequence is generated using Lorenz Chaotic system of differential equation. The seed values used are the user’s actual key having key sensitivity of 10-14. Second, the encrypted image’s genetic encryption sequence is generated which will result in an encrypted image with entropy value greater than 7.999 thus ensuring the image is very noisy. Proposed technique uses variations of Lorenz system seed sets to generate all random mutations and candidate solutions in Genetic encryption. Since only the seed sets leading to desired solution is stored, space efficiency is higher compared to storing the entire sequences. Using this image encryption technique we will ensure that the images are hidden securely under two layers of security, one chaotic and other non-deterministic.


2017 ◽  
Vol 10 (6) ◽  
pp. 221-229 ◽  
Author(s):  
Sandhya Halagowda ◽  
◽  
Sudha Lakshminarayana ◽  

2019 ◽  
Vol 68 (11) ◽  
pp. 110502
Author(s):  
Si-Xing Xi ◽  
Na-Na Yu ◽  
Xiao-Lei Wang ◽  
Qiao-Fen Zhu ◽  
Zhao Dong ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document