A Fast Image Encryption by Bit-Chaotic-Shuffle Based on Chaotic Systems

2012 ◽  
Vol 424-425 ◽  
pp. 761-764
Author(s):  
Chuan Kuei Huang ◽  
Hsiau Hsian Nien ◽  
Shu Li Hsu ◽  
Siang Shang Tu

Due to rapid developments in computer networking and communi- cation technology, users have begun to use personal computers to transmit images through the internet. However, this activity puts users at risk of hacker attacks and theft. Although single pixel position shuffling can eliminate an image’s contour, it cannot hide the characteristics of the grey-level spectrum. Because the dynamic trajectories of a chaotic system are highly sensitive to the initial values of the system, applying chaotic-ciphering to the image will result in a good encryption effect, and significantly enhance the key space of the encrypted image. For these reasons, this paper propose a novel and simple Bit-Chaotic-Shuffle (BCS) technique for encryption on color images that is based on multi chaotic systems. This technique not only eliminates image contours, but also disorders the characteristics of the RGB-level spectrum. This encryption method also adopts three chaotic systems in which the key space reaches 10137, thoroughly preventing decryption by an exhaustive attack. This paper further applies the correction coefficient and Mean Square Error (MSE) methods to prove the encryption and the high security performance of the proposed encryption system

2021 ◽  
Vol 26 (3) ◽  
Author(s):  
Hayder Abood Qasim

With rapid evaluation of technologies, huge amount of critical information can exchange over unsecure network every day, secure and fast encryption schemes become more and more urgent need to provide the desirable confidentiality and thwart unauthorized access, lately and for many reasons, chaotic based encryption algorithms become more and more popular technique due to exceptionally superior characteristics such as simplicity, resistance attacks and high speed, in this paper the advantages of two nonlinear hyper-chaotic systems will utilized to strength the  proposed encryption algorithm, the random sequences generated from systems will used to position scramble and value change of the plaintext, the main features of such method are efficiency, large key space, low computational overhead, and simple design as well as the experimental results demonstrate that the proposed method have more ability to thwart attacks.  


2019 ◽  
Vol 8 (1) ◽  
pp. 2
Author(s):  
Mehdi Lotfi ◽  
Hossein Kheiri ◽  
Azizeh Jabbari

Introduction:  In this paper, an encryption algorithm for the security of medical images is presented, which has extraordinary security. Given that the confidentiality of patient data is one of the priorities of medical informatics, the algorithm can be used to store and send medical image.Material and Methods:  In this paper, the solutions of chaotic differential equations are used to generate encryption keys. This method is more than other methods used in encoding medical images, resistant to statistics attacks, low encryption and decryption time and very high key space. In the proposed algorithm, unlike other methods that use random key generation, this method uses the production of solutions of the chaotic differential equations in a given time period for generating a key. All simulations and coding are done in MATLAB software.Results:   Chaotic Differential Equations have two very important features that make it possible to encode medical images. One is the unpredictability of the system's behavior and the other is a severe sensitivity to the initial condition.Conclusion: These two features make the method resistant to possible attacks to decode the concept of synchronization chaotic systems. Using the results of the method, medical information can be made safer than existing ones.


2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Hui Ren ◽  
Jun Wang ◽  
Qiong-Hua Wang

We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.


PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0242110
Author(s):  
Dejian Fang ◽  
Shuliang Sun

Image encryption is an effective method for protecting private images during communication. In this paper, a novel image encryption method is proposed based on a 5D hyperchaotic system. Since a 5D hyperchaotic system can generate more complex dynamic behavior than a low-dimensional system, it is used in this paper to generate pseudorandom number sequences. The generated sequences are processed to obtain new sequences. The randomness of the new sequences is improved by recombination and rearrangement. The experimental results and theoretical analysis show that the method possesses a large key space and can resist differential attacks, statistical analysis, entropy analysis, clipping attacks and noise attacks. Therefore, it is very secure and can be used for secure communication.


Author(s):  
Xia Zhou ◽  
Dongpeng Zhou ◽  
Xiu Liu ◽  
Jinde Cao ◽  
Changfeng Xue

The stability and boundedness for delayed impulsive SDEs driven by fBm are studied in this paper. Two kinds of noises, i.e, additive fBm noise and mul-tiplicative fBm noise are both taken into consideration. By using stochastic Lyapunov technique and impulsive control theory, sufficient criteria for pth moment exponential stability and mean square ultimate boundedness are derived, for two kinds of fBm driven delayed impulsive SDEs, respectively. As application, the obtained results are used to do practical synchronization w.r.t. a class of chaotic systems, in which the response system is perturbed by additive fBm noises. Finally, A Chua chaotic oscillator is given to verify the validity and applicability of the derived results.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3925
Author(s):  
Ali Akbar Kekha Javan ◽  
Mahboobeh Jafari ◽  
Afshin Shoeibi ◽  
Assef Zare ◽  
Marjane Khodatars ◽  
...  

In this paper, a novel medical image encryption method based on multi-mode synchronization of hyper-chaotic systems is presented. The synchronization of hyper-chaotic systems is of great significance in secure communication tasks such as encryption of images. Multi-mode synchronization is a novel and highly complex issue, especially if there is uncertainty and disturbance. In this work, an adaptive-robust controller is designed for multimode synchronized chaotic systems with variable and unknown parameters, despite the bounded disturbance and uncertainty with a known function in two modes. In the first case, it is a main system with some response systems, and in the second case, it is a circular synchronization. Using theorems it is proved that the two synchronization methods are equivalent. Our results show that, we are able to obtain the convergence of synchronization error and parameter estimation error to zero using Lyapunov’s method. The new laws to update time-varying parameters, estimating disturbance and uncertainty bounds are proposed such that stability of system is guaranteed. To assess the performance of the proposed synchronization method, various statistical analyzes were carried out on the encrypted medical images and standard benchmark images. The results show effective performance of the proposed synchronization technique in the medical images encryption for telemedicine application.


2013 ◽  
Vol 284-287 ◽  
pp. 2992-2997 ◽  
Author(s):  
Xiao Wei Li ◽  
Dong Hwan Kim ◽  
Sung Jin Cho ◽  
Seok Tae Kim

Three dimensional (3-D) images encryption schemes can provide feasible and secure for images encryption due to the 3-D properties of images. In this paper, we present a novel 3-D images encryption algorithm by combining use of integral imaging (II) and maximum-length cellular automata (MLCA) as the secret key ciphering for 3D image encryption technique. In this proposed algorithm, a lenslet array first decomposes the 3-D object into 2-D elemental images (EIs) via the pick-up process of II. We encrypt the 2-D EIs with an encryption method based on linear and complemented MLCA. Decryption process is the opposite of operation encryption process: The 2-D EIs is recovered by the MLCA key, 3-D object is reconstructed by the recovered EIs via computational integral imaging (CII) reconstruction. To verify the usefulness of the proposed algorithm, we carry out the computational experiments and present the experimental results for various attacks. Experimental results show that the proposed algorithm can improve the performance of encryption against various attacks due to large key space in MLCA and 3-D characteristic of data redundancy.


2021 ◽  
Vol 10 (4) ◽  
pp. 2100-2109
Author(s):  
Amal Abdulbaqi Maryoosh ◽  
Zahraa Salah Dhaif ◽  
Raniah Ali Mustafa

In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The proposed scheme was based on multiple stages of confusion and diffusion. The diffusion process was implemented twice, first, by permuting the pixels of the plain image by using an Arnold cat map and, the second time by permuting the plain image pixels via the proposed permutation algorithm. The confusion process was performed many times, by performing the XOR operation between the two resulted from permuted images, subtracted a random value from all pixels of the image, as well as by implementing the mix column on the resulted image, and by used the Lorenz key to obtain the encrypted image. The security analysis tests that used to exam the results of this encryption method were information entropy, key space analysis, correlation, histogram analysis UACI, and NPCR have shown that the suggested algorithm has been resistant against different types of attacks.


Sign in / Sign up

Export Citation Format

Share Document