A secured Transmission of data using 3D chaotic map encryption and data hiding technique

被引:0
作者
Kharat, Pradeep H. [1 ]
Shriramwar, S. S. [1 ]
机构
[1] Priyadarshini Coll Engn, Dept Elect & Telecommun Engn, Nagpur, Maharashtra, India
来源
2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC) | 2015年
关键词
encryption; correlation; algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transmission of important data like text, images, video, etc over the internet is increases now days hence it's necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties such as higher data capacity and high similarity between pixels. The older encryption techniques such as AES, DES, RTS are not suitable for highly secure data transmission on wireless media. Thus we combine the chaotic theory and cryptography to form an valuable technique for information security. In the first stage, a user encrypts the original input image using chaotic map theory. After that data-hider compresses the LSB bits of the encrypted image using a data-hiding key to make space for accommodate some more data. In now day's image encryption is chaos based for some unique characteristics such as correlation between neighboring pixels, sensitivity to initial conditions, non-periodicity, and control parameters. There are number of image encryption algorithms based on chaotic maps have been implemented some of them are time consuming, complex and some have very little key space. In this paper we implement three non linier differential chaos based encryption technique where for the first time 3 differential chaoses is used for position permutation and value transformation technique. In the data hiding phase, data which is in the binary forms embedded into encrypted image by using least significant bit algorithm. We tabulate correlation coefficient value both horizontal and vertical position for cipher and original image and compare performance of our Method with some existing methods. We also discuss about different types of attack, key sensitivity, and key space of our proposed approach. The given approach is very simple, fast, accurate and it have been applied together as a double algorithm in order to serve best results in highly unsecure and complex environment. Each of these algorithms are been discussed one by one below.
引用
收藏
页码:1243 / 1247
页数:5
相关论文
共 25 条
[1]  
Abdlrudha H. H., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P220
[2]   Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2012, 61 (04) :876-887
[3]   A new encryption algorithm for image cryptosystems [J].
Chang, CC ;
Hwang, MS ;
Chen, TS .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) :83-91
[4]  
Chen DM, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P2792, DOI 10.1109/ICYCS.2008.519
[5]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[6]  
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[7]  
Faraoun K, 2010, INT ARAB J INF TECHN, V7, P231
[8]  
Jui-Cheng Yen, 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461), P430, DOI 10.1109/SIPS.1999.822348
[9]  
Khade PN., 2012, IJCSI Int J Comput Sci Iss, V9, P323
[10]  
Kocarev L., IEEECIRCUITS SYSTEMS, V1, P6