Open Access Open Access  Restricted Access Subscription Access

Symmetric Key Chaotic Image Encryption Using Circle Map


Affiliations
1 Department of Physics, National Institute of Technology, Durgapur, Pin-713209, India
2 Department of IT, National Institute of Technology, Durgapur, Pin-713209, India
 

The security of information and digital images has become a major issue during the last three decades. A large number of algorithms for data and image encryptions are reported in the literature. However, many of the proposed algorithms are not suitable in the fields of application, because they are cryptographically weak. In the present work, a novel algorithm for encoding digital images by using a circle map with 3 parameters has been proposed. In this article different images are used for testing the validity of the proposed algorithm. The algorithm has increased the strength of security of the image encryption against cipher-text-only, chosen-plaintext and chosen-cipher-text attacks. The analysis of cryptographic strength has also been performed to confirm the fact. The results of several experimental tests, such as, key space analysis, key sensitivity analysis and statistical analysis show that the proposed algorithm for image cryptosystems provides an efficient and secure way for image encryption. A comparison in terms of correlation between the initial and transformed images, number of pixels change rate (NPCR) and unified average changing intensity (UACI) is also done.

Keywords

Circle Map, Chaos, Lyapunov Exponent, Anti-differential Attack, NPCR, UACI
User

  • Ahmed HEH, Kalash HM and Allah OSF (2006) An efficient Chaos-based feedback stream cipher (ECBFSC) for image encryption. SITIS. pp110-121.
  • Alexopoulos C, Bourbakis NG and Ioannou N (1995) Image encryption method using a class of fractals. J. Elec. Imaging. 4, 251-259.
  • Álvarez G, Montoya F, Romera M and Pastor G (2000) Cryptanalysis of chaotic encryption system. Phys. Lett. A. 306, 191-196.
  • Álvarez G, Montoya F, Romera M and Pastor G (2004) Breaking parameter modulated chaotic secure communication. Chaos Solitons Fractals. 21, 783- 787.
  • Amin M, Faragallah OS and El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun. Nonlinear Sci. Numer. Simulat. 15, 3484-3497.
  • Bourbakis N and Alexopoulos C (1992) Picture data encryption using scan patterns. Pattern Recog. 25, 567–581.
  • Chen G, Mao Y, and Chui CK (2004) A symmetric image encryption based on 3D chaotic maps. Chaos Solitions Fractals. 21, 749-761.
  • Cheng H and Li X (2000) Partial encryption of compressed images and videos. IEEE Trans. Signal proc. 48, 2439-2451.
  • Dang PP and Chau PM (2000) Image encryption for secure internet multimedia applications. IEEE trans. consumer elec. 46, 395-403.
  • Fei P, Qiu SS and Min L (2005) An image encryption algorithm based on mixed chaotic dynamic systems and external keys. IEEE int. conf. commun. circuits & systems. pp:1135-1139.
  • Fridrich j (1998) Symmetric ciphers based on twodimensional chaotic maps. Int. J. Bifurcation Chaos. 8, 1259-1284.
  • Giesl J and Vlcek K (2009) Image encryption based on strange attractor. ICGST-GVIP J. 9, 19-26.
  • Jan JK and Tseng YM (1996) On the security of image encryption method. Information Proc. Letts. 60, 261- 265.
  • Ker-Chang H and Liu JL (1997) A linear quadtree compression scheme for image encryption. Signal Proc. Image Commun. 10, 279-290.
  • Kocarev L, Jakimoski G, Stojanovski T and Parlitz U (1998) From chaotic maps to encryption schemes. Proc. IEEE int. symposium circuits & systems. 4, 514- 517.
  • Li S and Zheng X (2002) Cryptanalysis of a Chaotic image encryption method. Proc. IEEE int. conf. circuits & systems. 2, 708-711.
  • Mao Y, Chen G and Chui CK (2004) A novel fast image encryption scheme based on 3D chaotic Baker maps. Int. J. Bifurcation Chaos. 14, 3613-3624.
  • Miyamoto M, Tanaka K and Sugimura T (1999) Truncated Baker transformation and its extension to image encryption. Proc. SPIE. 3814, 13-25.
  • Rhouma R and Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyperchaos. Phys. Letts. A. 372, 5973-5978.
  • Yen JC and Guo JI (2000) A new chaotic key-based design for image encryption decryption. Proc. IEEE Int. Conf. Circuits Systems. 4, 49-52.

Abstract Views: 514

PDF Views: 195




  • Symmetric Key Chaotic Image Encryption Using Circle Map

Abstract Views: 514  |  PDF Views: 195

Authors

D. Chattopadhyay
Department of Physics, National Institute of Technology, Durgapur, Pin-713209, India
M. K. Mandal
Department of Physics, National Institute of Technology, Durgapur, Pin-713209, India
D. Nandi
Department of IT, National Institute of Technology, Durgapur, Pin-713209, India

Abstract


The security of information and digital images has become a major issue during the last three decades. A large number of algorithms for data and image encryptions are reported in the literature. However, many of the proposed algorithms are not suitable in the fields of application, because they are cryptographically weak. In the present work, a novel algorithm for encoding digital images by using a circle map with 3 parameters has been proposed. In this article different images are used for testing the validity of the proposed algorithm. The algorithm has increased the strength of security of the image encryption against cipher-text-only, chosen-plaintext and chosen-cipher-text attacks. The analysis of cryptographic strength has also been performed to confirm the fact. The results of several experimental tests, such as, key space analysis, key sensitivity analysis and statistical analysis show that the proposed algorithm for image cryptosystems provides an efficient and secure way for image encryption. A comparison in terms of correlation between the initial and transformed images, number of pixels change rate (NPCR) and unified average changing intensity (UACI) is also done.

Keywords


Circle Map, Chaos, Lyapunov Exponent, Anti-differential Attack, NPCR, UACI

References





DOI: https://doi.org/10.17485/ijst%2F2011%2Fv4i5%2F30070