Evaluation of Chaotic Map Lattice Systems for Image Encryption

被引:0
作者
Chapaneri, Santosh [1 ]
Chapaneri, Radhika [2 ]
Sarode, Tanuja [2 ]
机构
[1] Univ Mumbai, St Francis Inst Technol, Dept Elect & Telecommun Engn, Bombay, Maharashtra, India
[2] Univ Mumbai, Thadomal Shahani Engn Coll, Dept Comp Engn, Bombay, Maharashtra, India
来源
2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA) | 2014年
关键词
Image Encryption; Chaos; PWLCM; Chaotic Map Lattice; Diffusion; Scrambling; Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, the performance of Chaotic Map Lattice (CML) systems used for the purpose of digital image encryption is evaluated. The design and security flaws of CML and its variants are analyzed and overcome by the proposed modified CML-M cryptosystem. The proposed algorithm achieves semantic security due to probabilistic encryption and makes use of pixel diffusion to enhance the strength of security. We evaluate the CML variants and proposed algorithm using various randomness tests and the ability to resist cryptanalytic attacks. Evaluation results demonstrate that the proposed algorithm achieves better security and removes the flaws of previous CML cryptosystems
引用
收藏
页码:59 / 64
页数:6
相关论文
共 23 条
[1]   Digital Image Scrambling Using 2D Cellular Automata [J].
Abu Dalhoum, Abdel Latif ;
Mahafzah, Basel A. ;
Awwad, Aiman Ayyal ;
Aldamari, Ibrahim ;
Ortega, Alfonso ;
Alfonseca, Manuel .
IEEE MULTIMEDIA, 2012, 19 (04) :28-36
[2]   Digital Image Encryption Based on Chaotic Map for Secure Transmission [J].
Ahmad, Musheer ;
Gupta, Chanki ;
Varshney, Ankit .
2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, :292-295
[3]   An image encryption scheme based on quantum logistic map [J].
Akhshani, A. ;
Akhavan, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (12) :4653-4661
[4]   On the security of a new image encryption scheme based on chaotic map lattices [J].
Arroyo, David ;
Rhouma, Rhouma ;
Alvarez, Gonzalo ;
Li, Shujun ;
Fernandez, Veronica .
CHAOS, 2008, 18 (03)
[5]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[6]  
Chapaneri R., 2013, IEEE INDICON C DEC
[7]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[8]  
Etemadi Borujeni S., 2011, SPRINGER J TELEC MAY, P1
[9]  
Huang F, 2006, IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, P125
[10]  
Keshari Sudhir, 2011, INT J COMPUTER SCI E, V2, P132