scholarly journals A Novel Image Encryption Scheme Based on Collatz Conjecture

Entropy ◽  
2018 ◽  
Vol 20 (12) ◽  
pp. 901 ◽  
Author(s):  
Dora Ballesteros ◽  
Jimmy Peña ◽  
Diego Renza

Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to 8 . 57 × 10 506 ). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.

Author(s):  
Rana Saad Mohammed ◽  
Khalid Kadhim Jabbar ◽  
Hussien Abid Hilal

Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, the quality of the resulting image, and the time consumed. On the other hand, dealing with the color image under the spatial domain in this filed is considered as another challenge added to the proposed method that make it sensitivity and difficulty. The proposed method aims to encode a color image by dealing with the main color components of the red (R), green (G), and blue (B) components of a color image to strengthen the dependence of each component by modifying a two dimensional logistic- sine coupling map (2D- LSCM). This is to satisfy the statistical features and reduce time-consumption, and benefit from a mixing step of the second of advanced encryption standard (AES) candidates (serpent block cipher) and modified it to achieve in addition of confusion and diffusion processes. The experimental results showed that our proposed method had the ability to resist against statistical attacks and differential attacks. It also had a uniform histogram, a large key space, complex and faster, closer Shannon entropy to 8, and low correlation values between two adjacent pixels compared with other methods.


Author(s):  
K. Abhimanyu Kumar Patro ◽  
Mukesh Drolia ◽  
Akash Deep Yadav ◽  
Bibhudendra Acharya

In this present era, where everything is getting digitalized, information or data in any form, important to an organization or individual, are at a greater risk of being attacked under acts, commonly known as cyber-attack. Hence, a proper and more efficient cryptosystem is the prime need of the hour to secure the data (especially the image data). This chapter proposes an efficient multi-point crossover operation-based chaotic image encryption system to secure images. The multi-point crossover operation is performed on both the rows and columns of bit-planes in the images. The improved one-dimensional chaotic maps are then used to perform pixel-permutation and diffusion operations. The main advantage of this technique is the use of multi-point crossover operation in bit-levels. The multi-point crossover operation not only increases the security of cipher images but also increases the key space of the algorithm. The outcomes and analyses of various parameters show the best performance of the algorithm in image encryption and different common attacks.


2013 ◽  
Vol 24 (10) ◽  
pp. 1350071 ◽  
Author(s):  
PING PING ◽  
FENG XU ◽  
ZHI-JIAN WANG

Cellular automaton (CA) has a lot of inherent features, such as simple regular structure, local interaction, random-like behavior and massive parallelism, which make it a good candidate to design cryptosystems. Therefore, a number of CA-based image encryption systems have been proposed, though the drawbacks of small key space and weak security in one-dimensional (1D) CA cryptosystems are obvious. In this paper, a novel image encryption scheme is presented using a two-dimensional (2D) CA with nonlinear balanced rules. During the whole process of encryption, the confusion operation is performed by the nonlinear rule of CA, while the diffusion operation is achieved by the local interactions among cells. So confusion and diffusion are well integrated in our proposed scheme. The corresponding simulations and analyses illustrate that the scheme has quite prominent cryptographic properties as well as high security.


2021 ◽  
Vol 26 (2) ◽  
Author(s):  
Ekhlas K. Gbashi ◽  
Alaa kadhim Farhan

Image encryption is one of the primary approaches which is used to keep image information secure and safe. Recently, image encryption is turning its attention to combination with the field of DNA computing. In the presented study, a novel method of image encryption is suggested and implemented based on the DNA algorithm and Chaos theory, the most important principle in image encryption is breaking the correlation amongst pixels. This algorithm performs well against chosen cipher-text attacks. Furthermore, the proposed approach was implemented and analyzed for the Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), The performance of the encryption method is analyzed using the histogram, Shannon entropy and key space.


1976 ◽  
Vol 32 ◽  
pp. 109-116 ◽  
Author(s):  
S. Vauclair

This paper gives the first results of a work in progress, in collaboration with G. Michaud and G. Vauclair. It is a first attempt to compute the effects of meridional circulation and turbulence on diffusion processes in stellar envelopes. Computations have been made for a 2 Mʘstar, which lies in the Am - δ Scuti region of the HR diagram.Let us recall that in Am stars diffusion cannot occur between the two outer convection zones, contrary to what was assumed by Watson (1970, 1971) and Smith (1971), since they are linked by overshooting (Latour, 1972; Toomre et al., 1975). But diffusion may occur at the bottom of the second convection zone. According to Vauclair et al. (1974), the second convection zone, due to He II ionization, disappears after a time equal to the helium diffusion time, and then diffusion may happen at the bottom of the first convection zone, so that the arguments by Watson and Smith are preserved.


1980 ◽  
Vol 41 (C6) ◽  
pp. C6-28-C6-31 ◽  
Author(s):  
R. Messer ◽  
H. Birli ◽  
K. Differt

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


2020 ◽  
pp. 130-135
Author(s):  
D.N. Korotaev ◽  
K.N. Poleshchenko ◽  
E.N. Eremin ◽  
E.E. Tarasov

The wear resistance and wear characteristics of cluster-gradient architecture (CGA) nanostructured topocomposites are studied. The specifics of tribocontact interaction under microcutting conditions is considered. The reasons for retention of high wear resistance of this class of nanostructured topocomposites are studied. The mechanisms of energy dissipation from the tribocontact zone, due to the nanogeometry and the structural-phase structure of CGA topocomposites are analyzed. The role of triboactivated deformation and diffusion processes in providing increased wear resistance of carbide-based topocomposites is shown. They are tested under the conditions of blade processing of heat-resistant titanium alloy.


Author(s):  
Aarushi Shrivastava ◽  
Janki Ballabh Sharma ◽  
Sunil Dutt Purohit

Objective: In the recent multimedia technology images play an integral role in communication. Here in this paper, we propose a new color image encryption method using FWT (Fractional Wavelet transform), double random phases and Arnold transform in HSV color domain. Methods: Firstly the image is changed into the HSV domain and the encoding is done using the FWT which is the combination of the fractional Fourier transform with wavelet transform and the two random phase masks are used in the double random phase encoding. In this one inverse DWT is taken at the end in order to obtain the encrypted image. To scramble the matrices the Arnold transform is used with different iterative values. The fractional order of FRFT, the wavelet family and the iterative numbers of Arnold transform are used as various secret keys in order to enhance the level of security of the proposed method. Results: The performance of the scheme is analyzed through its PSNR and SSIM values, key space, entropy, statistical analysis which demonstrates its effectiveness and feasibility of the proposed technique. Stimulation result verifies its robustness in comparison to nearby schemes. Conclusion: This method develops the better security, enlarged and sensitive key space with improved PSNR and SSIM. FWT reflecting time frequency information adds on to its flexibility with additional variables and making it more suitable for secure transmission.


Sign in / Sign up

Export Citation Format

Share Document