An Enhanced Image Cryptosystem 1- Dimensional Chaotic Map Based | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 12, Volume 27, Issue 1, January 2018, Page 213-236 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2018.64537 | ||||
View on SCiNiTO | ||||
Authors | ||||
Ayman M. Hemdan1; Osama S. Faragalla2; Osama Elshakankiry2; Ahmed Elmhalaway1 | ||||
1Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University | ||||
2Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, Kingdom of Saudi Arabia. | ||||
Abstract | ||||
This paper demonstrates three modified algorithms for Logistic map utilized for image cryptosystem. The original Logistic map has a small range for key space. The three modified algorithms increased Key space range due to the expansion of the original Logistic map parameter. According to an increase in the parameter range, the Key space range will be wider than in the original Logistic map, hence withstands brute-force attack. The modified algorithm presents a good evaluation analysis such as encryption quality and security analysis. | ||||
References | ||||
-stroke-width: 0px; "> [1] William Stallings ”Cryptography and Network Security Principles and Practices”, Fourth Edition, Prentice Hall, 16 Nov. 2005. [2] Debdeep Mukhopadhyay, Behrouz A. Forouzan ”Cryptography and Network Security”, 2nd Edition, Mcgraw Hill Education, 2011. [3] Kocarev, Ljupco, Lian, Shiguo ”Chaos-based Cryptography”, Springer 2011. [4] Di Xiao, Xiaofeng Liao, Pengcheng Wei “Analysis and improvement of a chaos-based image encryption algorithm”, Chaos, Solitons & Fractals, Vol. 40, Issue 5, p.2191-2199, June 2009 . [5] X. Shu-Jiang, W. Ying-Long, W. Ji-Zhi, and T. Min, “A novel image encryption scheme based on chaotic maps,” in Signal Processing, 2008. ICSP 2008. 9th International Conference on. IEEE, 2008, pp. 1014–1018.-size-adjust: auto; -webkit-text-strok[6] Gokavarapu S., Kumari S.V.,”A Novel Encryption Using One Dimensional Chaotic Maps “, 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, 2015. [7] Murillo-Escobar, Cruz-Hernández, Abundiz-Pérez & López-Gutiérrez ”Implementation of an improved chaotic encryption algorithm for realtime embedded systems by using a 32-bit microcontroller” Elsevier, Volume 45, Part B, Pages 297–309, September 2016 . [8] R. Clark Robinson ”An Introduction to Chaotic Dynamical Systems Continuous and Discrete”, Second Edition, Pearson Education, 2010. [9] Robert L. Devaney ”An Introduction to Chaotic Dynamical Systems”, Second Edition, Westview press, 2003. [10] N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006. [11] S.Haliuk, O. Krulikovskyi and L. Politanskyi, "Analysis of pixels permutations based on discretized Chirikov map," 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, 2016, pp. 519-521. [12] N.F. Elabady, H.M. Abdalkader, M.I. Moussa & S.F. Sabbeh, “ Image encryption based on new one-dimensional chaotic map”, ICET 2014- 2nd International Conference on Engineering and Technology, (2015), pp.851-892. [13] J.X. Chen, Z.L. Zhu, C. Fu & H. Yu, “A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism” Communications in Nonlinear Science and Numerical Simulation, vol. 20, (2015), pp.846-860 . [14] S. Rohith, K.N. Bhat, S. Hari & A. Nandini, “Image encryption and decryption using chaotic key sequence generate by sequence of logistic map and sequence of states of Linear Feedback Shift Register”, International Conference on Advances in Electronic, Computers and Communications, vol. 6, (2015), pp.1124-1130 . [15] A. Akhshani, A. Akhavan, S.-C. Lim, Z. Hassan, “An image encryption scheme based on quantum logistic map ", Commun Nonlinear Sci Numer Simulat, Elsevier, pp. 4653–4661, 2012. [16] Yue Wu, Joseph P. Noonan, Sos Agaian, “NPCR and UACI Randomness Tests for Image Encryption” Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011. [17] S. Kamali, R. Shakerian, M. Hedayati, and M. Rahmani, “A new modified version of advanced encryption standard based algorithm for image encryption,” in Electronics and Information Engineering (ICEIE), 2010 International Conference On, vol. 1. IEEE, 2010, pp. V1–141.xt-stroke-width: 0px; "> [18] H. Elkamchouchi and M. Makar, “Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block encrypteds,” in Radio Science Conference, 2005. NRSC 2005. Proceedings of the TwentySecond National. IEEE, 2005, pp. 277–284. [19] R. Gray, Entropy and information theory. Springer Verlag, 2010 . [20] Y. Zhou, L. Bao, and C. L. Philip Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014 . [21] Y. Zhou, Z. Hua, C.-M. Pun, and C. L. Philip Chen, “Cascade chaotic system with applications,” IEEE Transactions on Cybernetics, vol.45, no.9, pp. 2001–2012, 2015. [22] H.S. Kwok and W.K.S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation", Chaos, Solitons & Fractals, vol. 32, no. 4, pp. 1518-1529, 2007. [23] V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti, “On known-plaintext attacks to a compressed sensing-based encryption: a quantitative analysis,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2182–2195, 2015. | ||||
Statistics Article View: 139 |
||||