scholarly journals An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map

Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 656 ◽  
Author(s):  
Priya Ramasamy ◽  
Vidhyapriya Ranganathan ◽  
Seifedine Kadry ◽  
Robertas Damaševičius ◽  
Tomas Blažauskas

Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.

2019 ◽  
Vol 8 (4) ◽  
pp. 1615-1629

Document imaging is one of the most important technology used to preserve, retrieve and to transmit old documents over the internet. Since open network threatens the security of such documents from being intercepted, the proposed scheme intends to provide enhanced security for such documents. The proposed hybrid algorithm includes Elliptic Curve Cryptography (ECC), and mixed chaotic system. The ECC encrypts the plain image based on the elliptic points generated by selecting a prime number. The mixed chaotic map includes twodimensional logistic map and three-dimensional Lorenz map. The 2D logistic map is used for confusing the ECC encrypted image and 3D Lorenz map is used for diffusing the confused image. The two levels of confusion, first with byte level and second with bit level are introduced. The two levels of diffusion, first level with Lorenz map and second level with Fibonacci sequences are introduced. Better net pixel change rate and unified average change intensity with flat histogram and low correlation are achieved in this method. The key Sensitivity, Entropy, Mean Square Error, and Peak Signal to Noise Ratio analysis reveal that the proposed method is resistant to any external invasion. The encryption and decryption speed is increased by using programming techniques. The robustness of the algorithm is also checked and found to be robust against noise and loss of information.


The world has developed far beyond our expectations with the essence of technology, which has a profound effect on recent ways of data transmission. Data can be transmitted in many ways, but not so efficiently and securely as digital data. Imagery data is very vital these days considered these are used everywhere around the world. This paper mainly emphasizes on the prime issue i.e. “making the system more secure”. Therefore securing the image is a principal factor of this paper as the present issue that is ongoing now with data theft which is predominantly in an image. So, this paper mainly focuses on how to proliferate the sensitivity to the attacks and securing the image which is an integration of different algorithms of diffusion and shuffling based on chaotic logistic maps. A new approach for the proposed algorithm was generated. A few basic examinations like NPCR (Number of Pixel Change Rate), Histogram investigations, UACI (Unified Average Change of Intensity) and PSNR (Peak Signal to Noise Ratio) are performed against various test images of size 256 × 256×3. Results obtained from the analysis endorses that it offers a high level of security. This proves the credibility for this algorithm for the future usage in the real world.


2019 ◽  
Vol 29 (1) ◽  
pp. 1246-1260 ◽  
Author(s):  
Ankita Bisht ◽  
Mohit Dua ◽  
Shelza Dua ◽  
Priyanka Jaroli

Abstract The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number sequence for the three channels. The parameters of ACM are generated with the help of Logistic-Sine map and Logistic-Tent map. The intensity values of scrambled pixels are altered by Tent-Sine map. One-dimensional and two-dimensional logistic maps are used for alternate logistic map implementation. The performance and security parameters histogram, correlation distribution, correlation coefficient, entropy, number of pixel change rate, and unified averaged changed intensity are computed to show the potential of the proposed encryption technique.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Shamsa Kanwal ◽  
Saba Inam ◽  
Omar Cheikhrouhou ◽  
Kinza Mahnoor ◽  
Atef Zaguia ◽  
...  

Due to the growing of the use of Internet and communication media, image encryption is rapidly increased. Image sharing through unsafe open channels is vulnerable for attacking and stealing. For protecting the images from attacks, encryption techniques are required. Recently, new and efficient chaos-based techniques have been suggested to develop secure image encryption. This study presents a novel image encryption framework based on integrating the chaotic maps and color codes. Three phases are involved in the proposed image encryption technique. Piecewise chaotic linear map (PWLCM) is used in the first phase for permuting the digital image. In the second phase, substitution is done using Hill cipher which is the mixing of color codes with the permuted image. The third phase is implemented by XORing, a sequence generated by the chaotic logistic map (CLM). The proposed approach enhances the diffusion ability of the image encryption making the encrypted images resistant to the statistical differential attacks. The results of several analyses such as information entropy, histogram correlation of adjacent pixels, unified average changing intensity (UACI), number of pixel change rate (NPCR), and peak signal-to-noise ratio (PSNR) guarantee the security and robustness of the proposed algorithm. The measurements show that the proposed algorithm is a noble overall solution for image encryption. Thorough comparison with other image encryption algorithms is also carried out.


Photonics ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 208
Author(s):  
Xiangqing Wang ◽  
Jie Zhang ◽  
Bo Wang ◽  
Kongni Zhu ◽  
Haokun Song ◽  
...  

With the increase in the popularity of cloud computing and big data applications, the amount of sensitive data transmitted through optical networks has increased dramatically. Furthermore, optical transmission systems face various security risks at the physical level. We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. The SNR varies with time because the fiber channel is affected by many physical characteristics, such as dispersion, polarization, scattering, and amplifier noise. The extracted SNR of the optical fiber channel can be used as the basis of key generation. Alice and Bob can obtain channel characteristics by measuring the SNR of the optical fiber channel and generate the consistent key by quantization coding. The security and consistency of the key are guaranteed by the randomness and reciprocity of the channel. The simulation results show that the key generation rate (KGR) can reach 25 kbps, the key consistency rate (KCR) can reach 98% after key post-processing, and the error probability of Eve’s key is ~50%. In the proposed scheme, the equipment used is simple and compatible with existing optic fiber links.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


Information security is an important task on multimedia and communication world. During storing and sharing maintaining a strategic distance from the outsider access of information is the difficult one. There are many encryption algorithms that can provide data security. In this paper two of the encryption algorithms namely AES and RSA are implemented for color images. AES (Advanced Encryption Standard) is a symmetric key block cipher published in December 2001 by NSIT (National Institute of Standards and Technology). RSA (Rivest-Shamir-Adleman) is an asymmetric key block cipher. It uses two separate keys, one for encryption called the public key and other for decryption called the private key. Both the implementation and analysis are done in Matlab. The quality and security level of both the algorithms is analysed based on various criteria such as Histogram analysis, Correlation analysis, Entropy analysis, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity), PSNR (Peak Signal-to-Noise Ratio).


2020 ◽  
Vol 10 (19) ◽  
pp. 6662
Author(s):  
Ji-Won Baek ◽  
Kyungyong Chung

Since the image related to road damage includes objects such as potholes, cracks, shadows, and lanes, there is a problem that it is difficult to detect a specific object. In this paper, we propose a pothole classification model using edge detection in road image. The proposed method converts RGB (red green and blue) image data, including potholes and other objects, to gray-scale to reduce the amount of computation. It detects all objects except potholes using an object detection algorithm. The detected object is removed, and a pixel value of 255 is assigned to process it as a background. In addition, to extract the characteristics of a pothole, the contour of the pothole is extracted through edge detection. Finally, potholes are detected and classified based by the (you only look once) YOLO algorithm. The performance evaluation evaluates the distortion rate and restoration rate of the image, and the validity of the model and accuracy of the classification. The result of the evaluation shows that the mean square error (MSE) of the distortion rate and restoration rate of the proposed method has errors of 0.2–0.44. The peak signal to noise ratio (PSNR) is evaluated as 50 db or higher. The structural similarity index map (SSIM) is evaluated as 0.71–0.82. In addition, the result of the pothole classification shows that the area under curve (AUC) is evaluated as 0.9.


2013 ◽  
Vol 11 (02) ◽  
pp. 1250024 ◽  
Author(s):  
ALEXANDRA HERZOG ◽  
BJÖRN VOSS ◽  
DANIELA KEILBERG ◽  
EDINA HOT ◽  
LOTTE SØGAARD-ANDERSEN ◽  
...  

The extraction of fluorescence intensity profiles of single cells from image data is a common challenge in cell biology. The manual segmentation of cells, the extraction of cell orientation and finally the extraction of intensity profiles are time-consuming tasks. This article proposes a routine for the segmentation of single rod-shaped cells (i.e. without neighboring cells in a distance of the cell length) from image data combined with an extraction of intensity distributions along the longitudinal cell axis under the aggravated conditions of (i) a low spatial resolution and (ii) lacking information on the imaging system i.e. the point spread function and signal-to-noise ratio. The algorithm named cipsa transfers a new approach from particle streak velocimetry to cell classification interpreting the rod-shaped as streak-like structures. An automatic reduction of systematic errors such as photobleaching and defocusing is included to guarantee robustness of the proposed approach under the described conditions and to the convenience of end-users unfamiliar with image processing. Performance of the algorithm has been tested on image sequences with high noise level produced by an overlay of different error sources. The developed algorithm provides a user-friendly, stand-alone procedure.


Author(s):  
Kshiramani Naik ◽  
Arup Kumar Pal

In this paper, an image encryption scheme based on reversible integer wavelet transform (IWT) with chaotic logistic map is designed. The proposed cryptosystem is applicable to encipher both the medical and natural images in lossless and lossy manners, respectively. Initially, the original image is transformed with the multilevel of IWT, then the image data set is divided into low sub-band (approximation part) and high sub-bands (detail part). The approximation part gets confused with the chaotic logistic map followed by the bit plane decomposition. Next, the individual bit planes are further diffused with several binary key metrics, generated using a chaotic logistic map. The proposed key schedule derives several large size of binary key metrics from a small size of key. Based on the type of applications, the detail part is considered for lossless/lossy compression. The lossless/lossy compressed detail part is further considered only for confusion process using the logistic map for the sake of enhancing the security level. Finally, the cipher image obtained after inverse IWT is significantly dissimilar than original image. The scheme has been tested on several standard medical and natural images and the experimental results substantiate that a small size of key is enough to protect the content of images completely. The security analysis reveals that the proposed scheme is suitable for protecting the image data effectively.


Sign in / Sign up

Export Citation Format

Share Document