A Hybrid Security System Based on Bit Rotation and Chaotic Maps

2019 ◽  
Vol 14 (2) ◽  
pp. 152-157 ◽  
Author(s):  
Majdi Al-qdah

Background: This paper presents an image security system by combining bit rotation with block based chaotic maps cryptography. Methods: The system uses permutation technique that divides the image into blocks before applying right/left rotation of bits to the pixel values based on a randomly generated key. Then, the image blocks are fused together. A scrambling operation followed by chaotic map is applied on the rotated image to diffuse the image pixels using another randomly generated key. The chaotic map scatters all the pixel positions in the image. The decryption is the complete reversal operation of the encryption process. Results & Conclusion: The performance of the proposed technique is evaluated using several metrics: Histograms of both original and cipher images, correlation of adjacent pixels and correlation between the original and cipher images, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR). The results indicate a very secure technique to protect all types of images.

2010 ◽  
Vol 34-35 ◽  
pp. 1735-1738
Author(s):  
Feng Huang ◽  
Xing Ping Liu

The paper designs an image security system. It includes four parts: keys generation, permutation, diffusion and decryption. Using six decimal numbers as the key, it can get three new keys: key1, key2 and key3 from the origin key in keys generation. The permutation used a new chaotic map to shuffles the image pixels by key1 and key2. The diffusion used the logistic map to flat the histogram of the ciphered image. The key3 is the parameters of the logistic map. The results of simulation show the validity of security system. Analysis shows that it can be used in real-time image encryption applications with high speed.


2017 ◽  
Vol 26 (06) ◽  
pp. 1750103 ◽  
Author(s):  
Pankaj Garg ◽  
Singara Singh Kasana ◽  
Geeta Kasana

A Reversible Data Hiding technique by using histogram shifting and modulus operator is proposed in which secret data is embedded into blocks of the cover image. These blocks are modified by using modulus operator to increase the number of peak points in the histogram of the cover image which further increases its embedding capacity. Secret data is embedded in the original cover blocks of the cover image by using peak points of the predicted blocks, which are generated by using modulus operator. Peak Signal to Noise Ratio and PSNR-Human Visual System are used to show the human visual acceptance of the proposed technique. Experimental results show that the embedding capacity is high as compared to the capacity of existing RDH techniques, while distortion in marked images is also less as compared to distortion produced by these existing techniques.


2021 ◽  
Vol 10 (1) ◽  
pp. 160-170
Author(s):  
Amal Hameed Khaleel ◽  
Iman Qays Abduljaleel

In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and k-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (binary representation scrambling BiRS) and the second relied on k-means using the proposed algorithm (block representation scrambling BlRS). The objective test used statistical analysis measures (signal-to-noise-ratio, segmental signal-to-noise-ratio, frequency-weighted signal-to-noise ratio, correlation coefficient, log-likelihood ratio) applied to evaluate the proposed system. Via MATLAB simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.


Author(s):  
Aliaa Sadoon Abd ◽  
Ehab Abdul Razzaq Hussein

Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies and hackers. They can be used separately or together. Encryption involves the basic principle of instantaneous conversion of valuable information into a specific form that unauthorized persons will not understand to decrypt it. While steganography is the science of embedding confidential data inside a cover, in a way that cannot be recognized or seen by the human eye. This paper presents a high-resolution chaotic approach applied to images that hide information. A more secure and reliable system is designed to properly include confidential data transmitted through transmission channels. This is done by working the use of encryption and steganography together. This work proposed a new method that achieves a very high level of hidden information based on non-uniform systems by generating a random index vector (RIV) for hidden data within least significant bit (LSB) image pixels. This method prevents the reduction of image quality. The simulation results also show that the peak signal to noise ratio (PSNR) is up to 74.87 dB and the mean square error (MSE) values is up to 0.0828, which sufficiently indicates the effectiveness of the proposed algorithm.


2020 ◽  
Vol 5 (20) ◽  
pp. 42-47
Author(s):  
Vivek Ranjan ◽  
Kailash Patidar ◽  
Rishi Kushwaha

In our approach the combination of RC4 and Blowfish algorithms with chaos mapping (RC4BC) has been presented for the image encryption. In the first phase image dataset has been considered. Then weight values have been calculated based on the image pixels. It has been calculated based on the attribute pixel, corelated pixels and the analytical factors of the edges. Then substitution has been performed through RC4 encryption mechanism. The substitution has been performed based on 8 sub blocks for the first time. After that different random substation has been applied based on the reallocation of bytes up to 16 rounds. Final substitution has been performed by the blowfish and chaos mapping. By this method the pixels of the images are rotated and shuffled with the XOR operation along with 16-byte reshuffling in each iteration. A total of 50 rounds have been considered for the shuffling, rotation and mapping. Then for comparative analysis peak signal to noise ratio (PSNR) and mean square error (MSE) have been calculated. Our results show that it is efficient in terms of MSE and PSNR values.


2018 ◽  
Vol 4 (2) ◽  
pp. 87
Author(s):  
Yuri Ariyanto ◽  
Rizky Ardiansyah ◽  
Bias Paris

Seiring dengan kemajuan teknologi, serangan terjadi pada industri photography di mana banyak penyalahgunaan foto yang memiliki hak cipta tanpa seijin pemilik foto tersebut. Karena itulah dibuat sebuah aplikasi yang berfungsi untuk menyisipkan watermark dengan menggunakan metode DFT (Discrete Fourier Transform). Metode tersebut adalah metode matematika yang sering digunakan dalam bidang elektronika dan komputer. Metode ini secara khusus digunakan untuk menyelesaikan masalah yang berhubungan dengan frekuensi, sehingga metode ini dapat digunakan dalam bidang citra digital. Metode ini diterapkan untuk melakukan penyisipan dan ekstraksi watermark pada citra penampung. Watermark tersebut disisipkan kedalam frekuensi domain pada gambar dan akan menghasilkan output citra ber-watermark atau embeded image. Hal ini adalah untuk mencegah penyalahgunaan hak cipta, namun watermark tersebut tidak nampak secara fisik. Hal ini dilakukan selain memberikan jaminan keamanan terhadap gambar, tapi juga tidak mengurangi estetika pada gambar tersebut. Analisa yang dilakukan adalah tingkat keberhasilan proses insertion dan extraction, serangan pada citra, uji kemiripan dengan pengujian NPCR (Number of Pixel of Change Rate), UACI (Unified Averaged Changed Intensity), dan PSNR (Peak Signal-to-Noise Ratio) pada proses insertion dan extraction. DFT disimpulkan aman terhadap serangan berupa cropping, resize, dan editing. Selain itu, dihasilkan nilai presentase perubahan yang rendah pada pengujian NPCR & UACI dan nilai yang tinggi pada pengujian PSNR.


2008 ◽  
Vol 18 (01) ◽  
pp. 251-261 ◽  
Author(s):  
SOHRAB BEHNIA ◽  
AFSHIN AKHSHANI ◽  
HADI MAHMODI ◽  
AMIR AKHAVAN

In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them have encountered many problems such as small key space and weak security. In the present paper, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps is proposed. These maps which are defined as ratios of polynomials of degree N, have interesting properties such as invariant measure, ergodicity, variable chaotic region with respect to the control parameters and ability to construct composition form of maps. We have used a composition of chaotic map to shuffle the position of image pixels. Another composition of chaotic map is used in diffusion process. According to the performed analysis, the introduced algorithm can satisfy the required performances such as high level security, large key space and the acceptable encryption speed.


2013 ◽  
Vol 753-755 ◽  
pp. 2247-2251
Author(s):  
Rong Huang ◽  
Hui Qing Zhu ◽  
Chong Wang

A de-interlacing method for video surveillance in intelligent substation is presented in this paper. Firstly, a framework for performance evaluation is proposed so that the subjective performance of de-interlacing will not matter in applications such as video compression. Then pre-filtering is performed to remove potential noise, and a hierarchical structure is introduced for same-parity field pictures or opposite-parity field pictures to get more reliable optical flow results for compression. Finally the optical flow results are used to improve the accuracy of block-based methods for each partition of the to-be-interpolated image and the final motion vectors are determined. Experimental results show that the proposed solution can achieve both better peak signal-to-noise ratio (PSNR) performance and visual effects.


2020 ◽  
pp. 2371-2384
Author(s):  
Sarab M. Hameed ◽  
Ibtisam A. Taqi

Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA image to produce the cipher image.  The experimental results prove that the proposed method surpassed the other methods in terms of Mean Square Error (MSE), Peak Signal-To-Noise Ratio (PSNR), entropy, and correlation coefficient.


Sign in / Sign up

Export Citation Format

Share Document