An Improved Chaotic Image Encryption Algorithm

被引:0
作者
Al-Khasawneh, Mahmoud Ahmad [1 ,2 ]
Shamsuddin, Siti Mariyam [3 ]
Hasan, Shafaatunnur [3 ]
Abu Bakar, Adamu [4 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Johor Baharu, Malaysia
[2] Al Madinah Int Univ, Fac Comp & Informat Technol, Shah Alam, Malaysia
[3] Univ Teknol Malaysia, Ibnu Sina Inst Sci & Ind Res, UTM Big Data Ctr, Johor Baharu, Malaysia
[4] Int Islamic Univ, Kulliyyah Informat & Commun Technol, Gombak, Selangor, Malaysia
来源
2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE) | 2018年
关键词
Encryption techniques; Chaotic dynamical system; Satellite image cryptosystem; Symmetric key cryptosystem; SCHEME; CRYPTOGRAPHY; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. In past works, chaos-based cryptosystems applied the chaotic dynamical system with the linkage to the harmonization of two chaotic systems and controls. Good performances have resulted but there were several downsides pertaining to the single rule usage by each, impacting security, privacy and dependability of the techniques mentioned. Serious problems were also documented in their usage in satellite imagery. As a possible solution, a novel chaos-based symmetric method of key cryptosystem is proposed in this paper. This method employs external secret key that Logistic, Henon and Gauss iterated maps have previously expanded. For creating the secret key matrix for image encryption, these maps are merged. Here, simple logical XOR and multiple key generation processes were applied. Assessment to the method is performed on the satellite images dataset, and security is evaluated through the experimental analysis. As evidenced, the chaos-based satellite image cryptosystem demonstrates appropriateness for satellite image encryption and decryption in the preservation of security and dependability of the storage and transmission process.
引用
收藏
页数:7
相关论文
共 38 条
[1]   Cryptanalysis of an image encryption algorithm based on DNA encoding [J].
Akhavan, A. ;
Samsudin, A. ;
Akhshani, A. .
OPTICS AND LASER TECHNOLOGY, 2017, 95 :94-99
[2]   A novel scheme for image encryption based on 2D piecewise chaotic maps [J].
Akhshani, A. ;
Behnia, S. ;
Akhavan, A. ;
Abu Hassan, H. ;
Hassan, Z. .
OPTICS COMMUNICATIONS, 2010, 283 (17) :3259-3266
[3]   New approach to chaotic encryption [J].
Alvarez, E ;
Fernández, A ;
García, P ;
Jiménez, J ;
Marcano, A .
PHYSICS LETTERS A, 1999, 263 (4-6) :373-375
[4]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[5]  
[Anonymous], 1997, Handbook of Applied Cryptography
[6]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[7]  
Ephin M., 2013, AMR INT C WOM COMP A
[8]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[9]   A new image encryption algorithm based on hyper-chaos [J].
Gao, Tiegang ;
Chen, Zengqiang .
PHYSICS LETTERS A, 2008, 372 (04) :394-400
[10]   A note on chaotic secure communication systems [J].
Jiang, ZP .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 2002, 49 (01) :92-96