Open Access
Subscription Access
Image Encryption Techniques Using Fractal Function:A Review
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Keywords
Image Encryption, Fractal, Chaotic Function, Scrambling, NIST Test Suite.
User
Font Size
Information
- Huntress G. B., 2004“Encryption using Fractal Key”, United States Patent 6782101.
- Khan M. & Shah T., 2014“A Literature Review on Image Encryption Techniques”, © 3D Research Centre Kwangwoon University and Springer-Verlag Berlin Heidelberg, 5(4), DOI 10.1007/s13319-014-0029-0, Page 1.
- Abed F. S., 2011 “A New Approach to Encoding and Hiding Information in an Image”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 3, ISSN (Online): 1694-0814.
- Sun Y, Chen L, Xu R, Kong R, 2014“An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves”. PLoS ONE, 9(1): e84655. doi:10.1371/journal.pone.0084655.
- Zhang Q., Zhou S. and Wei X.,2011 “An Efficient Approach for DNA Fractal-based Image Encryption”, Applied Mathematics & Information Sciences, 5(3), pp 445-459.
- SomarajS. and Hussain M. A., 2015 “Performance and Security Analysis for Image Encryption using Key Image”, Indian Journal of Science and Technology, Vol 8(35), DOI: 10.17485/ijst/2015/v8i35/73141.
- Stallings W., 1999 “Cryptography and Network Security: Principles and Practice”. Upper Saddle River, N.J: Prentice Hall, ISBN:0136097049 9780136097044.
- Rivest R. L., Shamir A. and Adleman L., 1978“A method for obtaining digital signatures and public key cryptosystems”, Communication of the ACM, 21: pp 120-126.
- Boneh D., 1999 “Twenty years of attacks on the RSA cryptosystem”, American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203-213.
- Diffie W., Hellman M., 1976 “New Directions in Cryptography”, IEEE Transactions on Information Theory, 22(6): 644-654 doi-10.1109/TIT, 1055638.
- Pickover C. “Computers, Pattern, Chaos, and Beauty”, St. Martin’s Press, NewYork, 1990.
- Julia G., 1918 "Mémoire sur l'itération des fonctions rationnelles." Journal de MathématiquesPures et Appliquées 1: 47-246 (Translated in English by Alessandro Rosa in 2001).
- Mandelbrot B. B. “The Fractal Geometry of Nature”, W. H. Freeman, New York, 1983.
- Devaney R. L., 1992 “A First Course in Chaotic Dynamical Systems: Theory and Experiment”, Addison-Wesley, MR1202237 Zbl 0768.58001.
- Barnsley M. “Fractals everywhere”, Academic Press Professional, Inc., San Diego, CA, 1988.
- Crownover, R. M., “Introduction to Fractals and Chaos”, Jones &Barlett Publishers, 1995.
- Jonathan F. “An Introduction to Julia sets”,2009.
- Zakeri, S., 2006 “On biaccessible points of the Mandelbrot set”. Proceedings of the American Mathematical Society, 134(8), pp 2239-2250.
- Negi D., Negi A., Agarwal S., 2016 “The Complex Key Cryptosystem”, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 11, Number 1, pp 681-684.
- Fractal Cryptology , New Mexico High School, Supercomputing Challenge Final Report April 2, 2003 , Team Members: Brandi Howell Anna Reese Michael Basile Team Sponsor: Paula Avery Project Mentor: Garth Reese.
- Motyl I., Jasek R., Varacha P., 2012 “Analysis of the Fractal Structures for the Information Encrypting Process”, International Journal of Computers, Issue 4, Volume 6, pp 224-231.
- Abd-El-Hafiz1 S. K., Radwan A. G.Haleem S. H. A., Barakat M. L., 2014 “A fractal-based image encryption system”IET Image Processing, Vol. 8, Issue 12, pp. 742–752 doi:10.1049/ietipr.2013.0570
- Sun YY, Xu R., Chen L., Hu X., 2014 “Image Compression and Encryption Scheme Using Fractal Dictionary and Julia Set”, IET Image Processing, Vol. 9, Issue. 3, pp. 173–183 doi:10.1049/iet-ipr.2014.0224
- Alia, M. A. and Samsudin A. B., 2007 “New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets”, International Journal of Computer Science and Network Security, VOL.7 No.2, pp 302-307.
- Alia, M. A. and Samsudin A. B., 2007“A new public-key cryptosystem based on mandelbrot and julia fractal sets”. Asian Journal of Information Technology, 6(5): pp 567-575.
- Rozouvan V., 2009 “Modulo image encryption with fractal keys”, Optics and Lasers in Engineering, 47(1), pp.1-6.
- Nadia M. G. AL-Saidi and Said M. R. M., 2009“A New Approach in Cryptographic Systems Using Fractal Image Coding”, Journal of Mathematics and Statistics, 5 (3):ISSN 1549-3644, pp183-189.
- Nadia M. G. AL-Saidi and Said M. R. M., 2010 “A New Public Key Cryptosystem Based on IFS”, International Journal of Cryptology Research, 2(1): pp 1-13.
- Nadia M. G. AL-Saidi and Said M. R. M., et al., 2011“Efficiency Analysis for Public Key Systems Based on Fractal Functions”, Journal of Computer Science, 7 (4): pp 526-532, ISSN 1549-3636.
- Sun YY, Kong RQ, Wang XY,et al.,2010 “An Image Encryption Algorithm Utilizing Mandelbrot Set”. International Workshop on Chaos-Fractal Theories and Applications, pp170–173.
- Shaw J., Saha O., Chaudhuri A.,2012 “An Approach for Secured Transmission of Data using Fractal based Chaos” IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing, CTNGC(4): pp 13-17.
- Hala B. Wahab A., Sarab S. A., 2013 “Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image”, Iraqi Journal of Science, Vol 54, No.4, pp: 955-964.
- Negi A., Agarwal S., 2014 “A Key Agreement Protocol Based on Superior Fractal Sets”, Journal of Mathematical and Computational Science, Vol 4, No 2, pp 471-478, ISSN: 1927-5307.
- Mann W. R., 1953“Mean value methods in iterations”, Proc. Amer. Math. Soc., 4, pp 506-510.
- Sattari S., Akkasi A., Lari R. A., et al., 2015“Cryptography in social networks using wavelet transform, fractals and chaotic functions”, International Research Journal of Applied and Basic Sciences, Science Explorer Publications, ISSN 2251-838X / Vol, 9 (9): 1627-1635.
- Feasibility Study on Random Number Generators for Symmetric Key Cryptography, Chapter 6, pp 156-204.
- Ali M. Meligy, HossamDiab, Marwa S. El-Danaf,2016“Chaos Encryption Algorithm using Key Generation from Biometric Images”, International Journal of Computer Applications (0975 – 8887) Volume 149 – No.11.
- Wang W., Tan H., Pang Y., Li Z., Ran P. and Wu J.,2016 “A Novel Encryption Algorithm Based on DWT and Multichaos Mapping”, Hindawi Publishing Corporation Journal of Sensors Volume Article ID 2646205, 7 pages,http://dx.doi.org/10.1155/2016/2646205.
- Kashanian H., Davoudi M. and Khorramfar H., 2016 “Image Encryption using chaos functions and fractal key”, International Journal of Advanced Biotechnology and Research (IJBR) ISSN 0976-2612, Online ISSN 2278–599X, Vol-7, Special Issue-Number4, pp1075-1082.
Abstract Views: 408
PDF Views: 199