A Chaotic Image Encryption Algorithm Based on Rubik’s Cube Principle for Wireless Communication

Document Type : Original Article

Authors

1 Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Minufiya University.

2 Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University

Abstract

In this paper, we present a proposed technique for image
encryption that is based on a marriage between Rubik’s cube (puzzle method) and a chaotic algorithm with its different modes (CBC, CFB, and OFB). The OFDM system will be tested with its versions (Fast Fourier transform OFDM (FFT-OFDM), Discrete Cosine Transform OFDM (DCT-OFDM), and Discrete Wavelet Transform OFDM (DWT-OFDM)). A comparative study among mixed encryption algorithms with images transmitted via different OFDM versions is presented. In the simulation experiments, the Peak Signal-to-Noise Ratio (PSNR) of the decrypted image at the receiver, histogram, deviation, and bit error rate (BER) sensitivity are used as evaluation metrics for the decrypted image qualit

Keywords


[1] Li, S., Zheng, X., Mou, X., & Cai, Y. (2002). Chaotic encryption scheme for
real-time digital video. In Proceedings of SPIE (Vol. 4666, pp. 149160).
[2] Li, S., Mou, X., & Cai, Y. (2001). Improving security of a chaotic encryption
approach. Physics Letters A, 290(34), 127133.
[3] Lian, S., Sun, J., & Wang, Z. (2005). Security analysis of a chaos-based
image encryption algorithm. Physica A: Statistical and Theoretical Physics,
351(24), 645661.
[4] Pareek, N. K., Patidar, V., & Sud, K. K. (2005). Cryptography using multiple
one-dimensional chaotic maps. Communications in Nonlinear Science and
Numerical Simulation, 10(7), 715723.
[5] Chen, G., Zheng, X., & Li, S. (2004). Chaos-based encryption for digital
images and videos. Multimedia Security Handbook. Boca Raton, USA: CRC
Press.
[6] Piyush Kumar Shukla , Ankur Khare , Murtaza Abbas Rizvi , Shalini Stalin
and Sanjay Kumar , ' Applied Cryptography Using Chaos Function for Fast
Digital Logic-Based Systems in Ubiquitous Computing ', Entropy 2015, 17,
1387-1410; doi:10.3390/e17031387
[7] Ljupco Kocarev , "Chaos-based cryptography: A brief overview", IEEE
Xplore, September 2002.
[8] Ljupco Kocarev, Jose M. Amig, and Janusz Szczepanski, "Chaos-based
Cryptography: an overview", 2005 International Symposium on Nonlinear,
Theory and its Applications (NOLTA2005), Bruges, Belgium, October 18-21,
2005.
[9] H. Elkamchouchi and M. A. Makar, “Measuring encryption quality of Bitmap
images encrypted with Rijndael and KAMKAR block ciphers,” in Proceedings
Twenty second National Radio Science Conference (NRSC 2005), pp. C11,
Cairo, Egypt, Mar. 15,17, 2005.
[10] Ibrahim Eldokany, El-Sayed M. El-Rabaie, Said M. Elhalafawy, Mohamed
A. Zein Eldin, Mai H. Shahieen, Naglaa F. Soliman, Mohsen A. M. El-Bendary,
Mohammed Abd El-Naby, Faisal S. Al-kamali, Ibrahim F. Elashry, Fathi E. Abd

El-Samie, Efficient Transmission of Encrypted Images with OFDM in the
Presence of Carrier Frequency Offset, Wireless Pers Commun DOI
10.1007/s11277-015-2645-2, Springer Science+Business Media New York 2015.
[11] Andrews, J. G., Ghosh, A. & Muhamed, R. (2007). Fundamentals of
WiMAX understanding broadband wireless networking. In Prentice Hall
communications engineering and emerging technologies series (pp. 113145).
[12] Tan, P., & Beaulieu, N. C. (2005). Precise bit error probability analysis of
DCT OFDM in the presence of carrier frequency offset on AWGN channels. In
Proceedings of the IEEE Globcom 2005 (pp. 14291434).
[13] Lawrey, E. P. (2001). Adaptive techniques for multiuser OFDM. Ph.D.
thesis, James Cook University.
[14] Lawrey, E. (1997). The suitability of OFDM as a modulation technique for
wireless telecommunications, with a CDMA comparison. Bachelor thesis, James
Cook University.
[15] http://www.puzzles9.com/p/introduction-puzzle-is-problem-or.html
[16] M.Sirisha, SVVS Lakshmi, Pixel Transformation based on Rubik’s Cube
Principle, International Journal of Application or Innovation in Engineering &
Management (IJAIEM), Volume 3, Issue 5, May 2014.
[17] Z.-L. Zhu, W. Zhang, K.-W. Wong, and H. Yu, “A chaos based symmetric
image encryption scheme using a bit-level permutation,” Information Sciences,
vol. 181, no. 6, pp. 11711186, 2011.
[18] C. K. Huang and H. H. Nien, “Multi chaotic systems based pixel shuffle for
image encryption,” Optics Communications, vol. 282, no. 11, pp. 2123–2127,
2009.
[19] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme
based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp.
749761, 2004.
[20] X. Y. Wang, L. Yang, R. Liu, and A. Kadir, “A chaotic image encryption
algorithm based on perception model,” Nonlinear Dynamics, vol. 62, no. 3, pp.
615621, 2010.
[21] Y. Wang, K. W. Wong, X. Liao, and G. Chen, “A new chaos-based fast
image encryption algorithm,” Applied Soft Computing Journal, vol. 11, no. 1, pp.
514522, 2011.
[22] Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, “A
Secure Image Encryption Algorithm Based on Rubik's Cube Principle,” Journal
of Electrical and Computer Engineering, vol. 2012, Article ID 173931, 13 pages,
2012.