An Enhanced Image Cryptosystem 1- Dimensional Chaotic Map Based

Document Type : Original Article

Authors

1 Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University

2 Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, Kingdom of Saudi Arabia.

Abstract

This paper demonstrates three modified algorithms for Logistic map utilized for image cryptosystem. The original Logistic map has a small range for key space. The three modified algorithms increased Key space range due to the expansion of the original Logistic map parameter. According to an increase in the parameter range, the Key space range will be wider than in the original Logistic map, hence withstands brute-force attack. The modified algorithm presents a good evaluation analysis such as encryption quality and security analysis.

-stroke-width: 0px; "> [1] William Stallings ”Cryptography and Network Security Principles and
Practices”, Fourth Edition, Prentice Hall, 16 Nov. 2005.
[2] Debdeep Mukhopadhyay, Behrouz A. Forouzan ”Cryptography and
Network Security”, 2nd Edition, Mcgraw Hill Education, 2011.
[3] Kocarev, Ljupco, Lian, Shiguo ”Chaos-based Cryptography”, Springer
2011.
[4] Di Xiao, Xiaofeng Liao, Pengcheng Wei “Analysis and improvement of a
chaos-based image encryption algorithm”, Chaos, Solitons & Fractals,
Vol. 40, Issue 5, p.2191-2199, June 2009 .
[5] X. Shu-Jiang, W. Ying-Long, W. Ji-Zhi, and T. Min, “A novel image
encryption scheme based on chaotic maps,” in Signal Processing, 2008.
ICSP 2008. 9th International Conference on. IEEE, 2008, pp. 10141018.-size-adjust: auto; -webkit-text-strok[6] Gokavarapu S., Kumari S.V.,”A Novel Encryption Using One Dimensional
Chaotic Maps “, 49th Annual Convention of the Computer Society of India
(CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337.
Springer, 2015.
[7] Murillo-Escobar, Cruz-Hernández, Abundiz-Pérez & López-Gutiérrez
Implementation of an improved chaotic encryption algorithm for realtime embedded systems by using a 32-bit microcontroller” Elsevier,
Volume 45, Part B, Pages 297309, September 2016 .
[8] R. Clark Robinson ”An Introduction to Chaotic Dynamical Systems
Continuous and Discrete”, Second Edition, Pearson Education, 2010.
[9] Robert L. Devaney ”An Introduction to Chaotic Dynamical Systems”,
Second Edition, Westview press, 2003.
[10] N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic
logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934,
2006.
[11] S.Haliuk, O. Krulikovskyi and L. Politanskyi, "Analysis of pixels
permutations based on discretized Chirikov map," 2016 13th International
Conference on Modern Problems of Radio Engineering,
Telecommunications and Computer Science (TCSET), Lviv, 2016, pp.
519-521.
[12] N.F. Elabady, H.M. Abdalkader, M.I. Moussa & S.F. Sabbeh, “ Image
encryption based on new one-dimensional chaotic map”, ICET 2014-
2nd International Conference on Engineering and Technology, (2015),
pp.851-892.
[13] J.X. Chen, Z.L. Zhu, C. Fu & H. Yu, “A fast chaos-based image encryption
scheme with a dynamic state variables selection mechanism
Communications in Nonlinear Science and Numerical Simulation, vol. 20,
(2015), pp.846-860 .
[14] S. Rohith, K.N. Bhat, S. Hari & A. Nandini, “Image encryption and
decryption using chaotic key sequence generate by sequence of
logistic map and sequence of states of Linear Feedback Shift
Register”, International Conference on Advances in Electronic, Computers
and Communications, vol. 6, (2015), pp.1124-1130 .
[15] A. Akhshani, A. Akhavan, S.-C. Lim, Z. Hassan, “An image encryption
scheme based on quantum logistic map ", Commun Nonlinear Sci Numer
Simulat, Elsevier, pp. 46534661, 2012.
[16] Yue Wu, Joseph P. Noonan, Sos Agaian, “NPCR and UACI Randomness
Tests for Image Encryption” Journal of Selected Areas in
Telecommunications (JSAT), April Edition, 2011.
[17] S. Kamali, R. Shakerian, M. Hedayati, and M. Rahmani, “A new modified
version of advanced encryption standard based algorithm for image
encryption,” in Electronics and Information Engineering (ICEIE), 2010
International Conference On, vol. 1. IEEE, 2010, pp. V1141.
xt-stroke-width: 0px; "> [18] H. Elkamchouchi and M. Makar, “Measuring encryption quality for bitmap
images encrypted with rijndael and kamkar block encrypteds,” in Radio
Science Conference, 2005. NRSC 2005. Proceedings of the TwentySecond National. IEEE, 2005, pp. 277284.
[19] R. Gray, Entropy and information theory. Springer Verlag, 2010 .
[20] Y. Zhou, L. Bao, and C. L. Philip Chen, “A new 1D chaotic system for
image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014 .
[21] Y. Zhou, Z. Hua, C.-M. Pun, and C. L. Philip Chen, “Cascade chaotic
system with applications,” IEEE Transactions on Cybernetics, vol.45, no.9,
pp. 20012012, 2015.
[22] H.S. Kwok and W.K.S. Tang, "A fast image encryption system based on
chaotic maps with finite precision representation", Chaos, Solitons &
Fractals, vol. 32, no. 4, pp. 1518-1529, 2007.
[23] V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti, “On
known-plaintext attacks to a compressed sensing-based encryption: a
quantitative analysis,” IEEE Transactions on Information Forensics and
Security, vol. 10, no. 10, pp. 21822195, 2015.