A Chaotic Image Encryption Algorithm Based on Rubik’s Cube Principle for Wireless Communication | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 7, Volume 27, Issue 2, July 2018, Page 151-164 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2018.63185 | ||||
View on SCiNiTO | ||||
Authors | ||||
Mai Helmy1; El-Sayed M. EL-Rabaie1; Ibrahim Eldokany1; F. E. Abd ElSamie2 | ||||
1Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Minufiya University. | ||||
2Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University | ||||
Abstract | ||||
In this paper, we present a proposed technique for image encryption that is based on a marriage between Rubik’s cube (puzzle method) and a chaotic algorithm with its different modes (CBC, CFB, and OFB). The OFDM system will be tested with its versions (Fast Fourier transform OFDM (FFT-OFDM), Discrete Cosine Transform OFDM (DCT-OFDM), and Discrete Wavelet Transform OFDM (DWT-OFDM)). A comparative study among mixed encryption algorithms with images transmitted via different OFDM versions is presented. In the simulation experiments, the Peak Signal-to-Noise Ratio (PSNR) of the decrypted image at the receiver, histogram, deviation, and bit error rate (BER) sensitivity are used as evaluation metrics for the decrypted image qualit | ||||
Keywords | ||||
OFDM; Rubik's cube; Chaotic map; the Cipher Block Chaining (CBC) mode; the Cipher Feedback mode (CFB) mode; and the Output Feed Back (OFB) mode | ||||
References | ||||
[1] Li, S., Zheng, X., Mou, X., & Cai, Y. (2002). Chaotic encryption scheme for real-time digital video. In Proceedings of SPIE (Vol. 4666, pp. 149–160). [2] Li, S., Mou, X., & Cai, Y. (2001). Improving security of a chaotic encryption approach. Physics Letters A, 290(3–4), 127–133. [3] Lian, S., Sun, J., & Wang, Z. (2005). Security analysis of a chaos-based image encryption algorithm. Physica A: Statistical and Theoretical Physics, 351(2–4), 645–661. [4] Pareek, N. K., Patidar, V., & Sud, K. K. (2005). Cryptography using multiple one-dimensional chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 10(7), 715–723. [5] Chen, G., Zheng, X., & Li, S. (2004). Chaos-based encryption for digital images and videos. Multimedia Security Handbook. Boca Raton, USA: CRC Press. [6] Piyush Kumar Shukla , Ankur Khare , Murtaza Abbas Rizvi , Shalini Stalin and Sanjay Kumar , ' Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing ', Entropy 2015, 17, 1387-1410; doi:10.3390/e17031387 [7] Ljupco Kocarev , "Chaos-based cryptography: A brief overview", IEEE Xplore, September 2002. [8] Ljupco Kocarev, Jose M. Amig, and Janusz Szczepanski, "Chaos-based Cryptography: an overview", 2005 International Symposium on Nonlinear, Theory and its Applications (NOLTA2005), Bruges, Belgium, October 18-21, 2005. [9] H. Elkamchouchi and M. A. Makar, “Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers,” in Proceedings Twenty second National Radio Science Conference (NRSC 2005), pp. C11, Cairo, Egypt, Mar. 15,17, 2005. [10] Ibrahim Eldokany, El-Sayed M. El-Rabaie, Said M. Elhalafawy, Mohamed A. Zein Eldin, Mai H. Shahieen, Naglaa F. Soliman, Mohsen A. M. El-Bendary, Mohammed Abd El-Naby, Faisal S. Al-kamali, Ibrahim F. Elashry, Fathi E. Abd El-Samie, Efficient Transmission of Encrypted Images with OFDM in the Presence of Carrier Frequency Offset, Wireless Pers Commun DOI 10.1007/s11277-015-2645-2, Springer Science+Business Media New York 2015. [11] Andrews, J. G., Ghosh, A. & Muhamed, R. (2007). Fundamentals of WiMAX understanding broadband wireless networking. In Prentice Hall communications engineering and emerging technologies series (pp. 113–145). [12] Tan, P., & Beaulieu, N. C. (2005). Precise bit error probability analysis of DCT OFDM in the presence of carrier frequency offset on AWGN channels. In Proceedings of the IEEE Globcom 2005 (pp. 1429–1434). [13] Lawrey, E. P. (2001). Adaptive techniques for multiuser OFDM. Ph.D. thesis, James Cook University. [14] Lawrey, E. (1997). The suitability of OFDM as a modulation technique for wireless telecommunications, with a CDMA comparison. Bachelor thesis, James Cook University. [15] http://www.puzzles9.com/p/introduction-puzzle-is-problem-or.html [16] M.Sirisha, SVVS Lakshmi, Pixel Transformation based on Rubik’s Cube Principle, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 5, May 2014. [17] Z.-L. Zhu, W. Zhang, K.-W. Wong, and H. Yu, “A chaos based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. [18] C. K. Huang and H. H. Nien, “Multi chaotic systems based pixel shuffle for image encryption,” Optics Communications, vol. 282, no. 11, pp. 2123–2127, 2009. [19] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004. [20] X. Y. Wang, L. Yang, R. Liu, and A. Kadir, “A chaotic image encryption algorithm based on perception model,” Nonlinear Dynamics, vol. 62, no. 3, pp. 615–621, 2010. [21] Y. Wang, K. W. Wong, X. Liao, and G. Chen, “A new chaos-based fast image encryption algorithm,” Applied Soft Computing Journal, vol. 11, no. 1, pp. 514–522, 2011. [22] Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle,” Journal of Electrical and Computer Engineering, vol. 2012, Article ID 173931, 13 pages, 2012. | ||||
Statistics Article View: 314 |
||||