Journal of Information Security

Volume 2, Issue 4 (October 2011)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

New Approach for Fast Color Image Encryption Using Chaotic Map

HTML  Download Download as PDF (Size: 2562KB)  PP. 139-150  
DOI: 10.4236/jis.2011.24014    8,414 Downloads   16,161 Views  Citations

Affiliation(s)

.

ABSTRACT

Image encryption using chaotic maps has been established a great way. The study shows that a number of functional architecture has already been proposed that utilize the process of diffusion and confusion. However, permutation and diffusion are considered as two separate stages, both requiring image-scanning to obtain pixel values. If these two stages are mutual, the duplicate scanning effort can be minimized and the encryption can be accelerated. This paper presents a technique which replaces the traditional preprocessing complex system and utilizes the basic operations like confusion, diffusion which provide same or better encryption using cascading of 3D standard and 3D cat map. We generate diffusion template using 3D standard map and rotate image by using vertically and horizontally red and green plane of the input image. We then shuffle the red, green, and blue plane by using 3D Cat map and standard map. Finally the Image is encrypted by performing XOR operation on the shuffled image and diffusion template. Theoretical analyses and computer simulations on the basis of Key space Analysis, statistical analysis, histogram analysis, Information entropy analysis, Correlation Analysis and Differential Analysis confirm that the new algorithm that minimizes the possibility of brute force attack for decryption and very fast for practical image encryption

Share and Cite:

K. Gupta and S. Silakari, "New Approach for Fast Color Image Encryption Using Chaotic Map," Journal of Information Security, Vol. 2 No. 4, 2011, pp. 139-150. doi: 10.4236/jis.2011.24014.

Cited by

[1] Chaotic based multimedia encryption: a survey for network and internet security
Hazaimeh, AA Abu-Ein, MM Al-Nawashi… - Bulletin of Electrical …, 2022
[2] A generalized Arnold's Cat Map transformation for image scrambling
Multimedia Tools and Applications, 2022
[3] Chaos-based cryptography
2021
[4] Development & Analysis of Cryptographic Schemes for Visual Content
2020
[5] Analisis Integritas Data Pada Kriptografi Citra Digital Menggunakan Penggabungan Arnold's Cat Map dan Bernoulli Map
2020
[6] Recent Advancements in Chaos-Based Image Encryption Techniques: A Review
2020
[7] An Effective Encryption Scheme Based on Chaotic Maps Applied to Digital Image
2020
[8] A novel discrete image encryption algorithm based on finite algebraic structures
2020
[9] Image Encryption Techniques based on Chaotic Map
2019
[10] Cifrado de vídeos transmitidos en tiempo real utilizando el atractor de Lorenz
2019
[11] The creation of maze in order to hide data, and the proposal of method based on AES data encryption algorithm
El-Cezeri Journal of Science and …, 2019
[12] A secure image encryption method using scan pattern and random key stream derived from laser chaos
Optics & Laser Technology, 2019
[13] Image Compression-Encryption Scheme Based on 2D DWT, SPIHT and Qi Hyper-chaos
2019
[14] Algorithm for Image Transfer Using Dynamic Chaos
2019 IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), 2019
[15] A Selective Image Encryption Scheme Based on 2D DWT, Henon Map and 4D Qi Hyper-Chaos
2019
[16] A new method for image encryption by 3D chaotic map
2018
[17] PENGGUNAAN METODE HENON MAP DAN CHAOS LOGISTIC MAP (CLM) DALAM ENKRIPSI CITRA DIGITAL 24-BIT
2017
[18] Kaos tabanlı bir görüntü şifreleme algoritması ve donanımsal ortamda gerçekleştirilmesi/A chaos-based image encryption algorithm with its hardware …
2017
[19] A Novel Chaotic based Optical Color Image Encryption
International Journal of Computer Applications, 2017
[20] Design of image encryption algorithm based on different chaotic mapping
2017
[21] Survey on CHAOS Based Image Encryption Techniques
2017
[22] Chaos based image encryption using two step iterated logistic map
2016
[23] Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security.
2016
[24] Introduction to 3D Chaotic Map for Image Encryption
2016
[25] A Chaotic Cryptosystem for Color Image with Dynamic Look-Up Table
Image and Signal Processing, 2016
[26] An interlaced secure algorithm for RGB image encryption in wavelet packet domain
International Journal of Wavelets, Multiresolution and Information Processing, 2016
[27] Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map
American Journal of Signal Processing, 2016
[28] IMAGE ENCRYPTION USING CHAOTIC MAPS OF VARIOUS DIMENSIONS: REVIEW
International Journal of Research in Engineering and Technology, 2016
[29] Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security
2016
[30] Randomized passcode generation for Scan based hybrid symmetric cryptosystem
International Journal of Advanced Studies in Computers, Science and Engineering, 2016
[31] HAF Technique for Documents and Archaeologist Images Encryption
International Journal of Sciences:Basic and Applied Research, 2016
[32] Using hyper chaos in secure video transmission
2016
[33] EFFICIENT CHAOS-BASED CRYPTOSYSTEM FOR REAL TIME APPLICATIONS.
Acta Technica Napocensis. Electronica-Telecomunicatii, 2016
[34] Improving Image Encryption Using 3D Cat Map and Turing Machine
International Journal of Advanced Computer Science and Applications, 2016
[35] EFFICIENT CHAOS-BASED CRYPTOSYSTEM FOR REAL TIME APPLICATIONS
Acta Technica Napocensis, 2016
[36] Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map
2016
[37] Analysis of the use of some statistical measures in deciding about the efficiency of an image encryption algorithm
2016
[38] A COMPARATIVE STUDY OF IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC MAPS
2015
[39] Randomized Passcode Generation For Triple-Stegging Using DWT And ECC
International Journal of Computer Science Issues (IJCSI), 2015
[40] Security analysis of a three-dimensional rotation-based image encryption
IET Image Processing, 2015
[41] A Novel Image Encryption Approach Using Block Based Transformation and Random Phase Encoding.
International Journal of Applied Engineering Research, 2015
[42] An Ethical Approach of Block Based Image Encryption Using Chaotic Map
International Journal of Security and Its Applications, 2015
[43] Шифрование изображений при использовании хаотической динамики и элементы линейного криптоанализа
2015
[44] Survey of 3D Chaotic Map Techniques for Image Encryption
2015
[45] Fast And Secure Image Encryption System For Real Time Applications And Mobile Communications
journal of kerbala university, 2015
[46] Security analysis of a three‐dimensional rotation‐based image encryption
IET Image Processing, 2015
[47] A novel image encryption using calligraphy based scan method and random number
2015
[48] A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number.
2015
[49] Maze Based Image Encryption Algorithm
2015
[50] A ROBUST IMAGE ENCRYPTION METHOD BASED ON BIT PLANE DECOMPOSITION AND MULTIPLE CHAOTIC MAPS
Thesis, 2014
[51] Cryptographic Primitives for Multimedia Security
INROADS-An International Journal of Jaipur National University, 2014
[52] A Novel Image Encryption Method with Z-Ordering based Scan and Random Number
International Journal of Computer Applications, 2014
[53] A header encryption of ultrasound image using absolute-value chaotic map
Biomedical Engineering International Conference (BMEiCON), 2014 7th, 2014
[54] An RGB image encryption using diffusion process associated with chaotic map
Journal of Information Security and Applications, 2014
[55] A Lossless physical-layer encryption scheme in medical Picture Archiving and Communication Systems using highly-robust chaotic signals
Biomedical Engineering International Conference (BMEiCON), 2014 7th, 2014
[56] Robust digital image cryptosystem based on nonlinear dynamics of compound sine and cosine chaotic maps for private data protection
Advanced Communication Technology (ICACT), 2014 16th International Conference on. IEEE, 2014
[57] Image encryption using chaotic maps in hybrid domain
International Journal of Communication and Computer Technologies, 2014
[58] A Novel Image Encryption Method with Z-Order Curve and Random Number
T Sivakumar, R Venkatesan - International Journal of Computer Applications, 2014
[59] A partial encryption scheme using absolute-value chaotic map for secure electronic health records
Information and Communication Technology, Electronic and Electrical Engineering (JICTEE), 2014 4th Joint International Conference on. IEEE, 2014
[60] Globalization and ICT Innovation Policy: Absorption Capacity in developing Countries
ICACT Transactions on Advanced Communications Technology (TACT), 2014
[61] Image Encryption Using Chaotic Maps: A Survey
Signal and Image Processing (ICSIP), 2014 Fifth International Conference on. IEEE, 2014
[62] A Fast Image Encryption Algorithm Based on Chaotic Maps and the Linear Diophantine Equation
Computer Science, 2014
[63] Image Encryption and Chaotic Synchronization Based on Chaotic Maps and Fractional Order Chaotic Systems
Doctoral dissertation, 2014
[64] A new simple digital image cryptography technique based on multi-scroll chaotic Delay Differential Equation
Knowledge and Smart Technology (KST), 2013 5th International Conference on. IEEE, 2013
[65] Symmetric cryptosystem based on generalized key scheme
2013
[66] Enkripsi citra berbasis algoritma Cipher Block Chaining (CBC) dan Chaotic Tent Map (CTM)
2013
[67] Digital medical image cryptosystem based on infinite-dimensional chaotic delay differential equation for secure telemedication applications
2012
[68] THE NOVEL IMAGE DIFFUSION ALGORITHM BASED ON THE PSEUDO RANDOM BLOCK.
Journal of Theoretical & Applied Information Technology, 2012
[69] A New Image Encryption Approach using Block-Based on Shifted Algorithm
International Journal of Computer Science and Network Security (IJCSNS), 2011

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.