scholarly journals A Combination of Block-Based Chaos with Dynamic Iteration Pattern and Stream Cipher for Color Image Encryption

2020 ◽  
Vol 13 (6) ◽  
pp. 131-141
Author(s):  
Fikri Budiman ◽  
◽  
De Setiadi ◽  

This research proposes an encryption method on images using a combination of chaotic methods, streams, and hash functions. SHA-1 is used as a hash function to encrypt key inputs to be more secure and can produce more dynamic keys at chaotic and stream encryption stages. Chaos encryption is done by dividing the image into small blocks where each encrypted block differs based on a dynamic key pattern based on chaotic keys. At the last stage, all blocks are made as whole images again to be encrypted by the stream method. Tests carried out on standard RGB images and Indonesian batik images. Encryption quality measurements using entropy, histogram analysis, UACI, NPCR, SSIM, PSNR, and the avalanche effect. Based on the results of trials the proposed method is proven to be resistant to various attacks such as statistics as evidenced by the average entropy value of 7.9996, avalanche effect value of 50.0366 and a relatively uniform histogram, while differential attack as evidenced by the value of UACI 33.5716 and NPCR 99.6082 where this value is very close to ideal. Also visually the results of the encryption look very chaotic and very different from the original image, which is evidenced by the value of PSNR 8.0191 and SSIM 0.0081. The decryption process can also be done perfectly wherein the resulting infinity value on PSNR and value 1 on SSIM.

2019 ◽  
Vol 68 (11) ◽  
pp. 110502
Author(s):  
Si-Xing Xi ◽  
Na-Na Yu ◽  
Xiao-Lei Wang ◽  
Qiao-Fen Zhu ◽  
Zhao Dong ◽  
...  

2008 ◽  
Vol 281 (17) ◽  
pp. 4254-4260 ◽  
Author(s):  
Fan Ge ◽  
Linfei Chen ◽  
Daomu Zhao

Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.


Author(s):  
Anand B. Joshi ◽  
Dhanesh Kumar ◽  
D. C. Mishra

Security of digital data is an important task in the present era. In this paper, we propose a new scheme of digital image encryption and decryption method based on three-dimensional (3D) Arnold cat map (ACM) and elliptic curve. In this proposed encryption method, we have applied 3D ACM on the digital color image which performs the dual encryption first, it performs the permutation and second, it performs the substitution of image pixels. After that, elliptic curve cryptography (ECC) is used to encrypt the image, for this a mapping method is proposed to convert the pixels of the image as points on the elliptic curve. Further, a mapping inverting method is proposed for decryption and then 3D inverse Arnold cat map (iACM) is applied to get the original image. The statistical and security analyses are done on various images and the experimental results show the robustness of the proposed method.


2017 ◽  
Vol 89 ◽  
pp. 72-79 ◽  
Author(s):  
Lili Yao ◽  
Caojin Yuan ◽  
Junjie Qiang ◽  
Shaotong Feng ◽  
Shouping Nie

Author(s):  
Qian Zhao ◽  
Fengdong Sun ◽  
Wenhui Li ◽  
Peixun Liu

In this paper, we proposed an all-weather flame detection algorithm which could make full use of active infrared cameras presently installed in many public places for surveillance purposes. Firstly, according to the different spectral imaging results in day and night, we propose a video type classification algorithm (VTCA) via imaging clues. VTCA could help us select different flame visual features in color image and infrared image. Secondly, we use a generic YCbCr-color-space-based chrominance model to extract regions of interest (ROI) of flame. Thirdly, two flame dynamic features are used to verify the candidate ROIs, which are common flame flicker feature and an improved block-based PCA in consecutive frames. The experimental results show that the proposed flame detection model has been successfully applied to various situations, including day and night, indoor and outdoor on our test video datasets, and it gives a better performance compared with other state-of-the-art methods.


2012 ◽  
Vol 182-183 ◽  
pp. 1839-1843
Author(s):  
Xian Zhe Luo ◽  
Nan Run Zhou ◽  
Qing Min Zhao ◽  
Jian Hua Wu

Based on the theory that a color image can be decomposed into three primary components and each one can be seen as a gray image, we propose a color image encryption method with multiple-order discrete fractional cosine transform (MODFrCT), which is a kind of encryption with the secrecy of pixel value and pixel position simultaneously. The complex number mode that has a real part and an imaginary one is used in this encryption method to save the transmission channel. Human vision is more sensitive to the Y component than to other two components in YCbCr color space and this color format is used for encrypting the color image. Chaos is introduced to scramble the image phases both in spatial and transformation domains. The numerical simulations demonstrate the validity and efficiency of this scheme and the robustness of the method against occlusion attack is examined.


Sign in / Sign up

Export Citation Format

Share Document