A fractal-based image encryption system

被引:43
作者
Abd-El-Hafiz, Salwa Kamal [1 ]
Radwan, Ahmed G. [1 ]
Haleem, Sherif H. Abdel [1 ]
Barakat, Mohamed L. [2 ]
机构
[1] Cairo Univ, Fac Engn, Engn Math Dept, Giza 12613, Egypt
[2] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
关键词
CHAOS; ALGORITHM;
D O I
10.1049/iet-ipr.2013.0570
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.
引用
收藏
页码:742 / 752
页数:11
相关论文
共 36 条
[1]  
Abd-El-Hafiz S.K., 2011, P INT C SOFTW ENG, P88
[2]   A Metrics-Based Data Mining Approach for Software Clone Detection [J].
Abd-El-Hafiz, Salwa K. .
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, :35-41
[3]  
Addison P.S., 1997, Fractals and chaos. An illustrated course, Vfirst
[4]  
Agaian S.S., 2006, P IEEE REG 5 C SAN A, P312
[5]   Using IFS as an Encryption method [J].
Al-Saidi, Nadia M. G. ;
Rushdan, Muhammad Sd. .
2009 INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTER, PROCEEDINGS, 2009, :275-278
[6]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[7]   A chaotic block cipher algorithm for image cryptosystems [J].
Amin, Mohamed ;
Faragallah, Osama S. ;
Abd El-Latif, Ahmed A. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) :3484-3497
[8]  
[Anonymous], P IROS 2008 WORKSH G
[9]  
Avalos Pedro A. Hernandez, 2009, Proceedings of the Tenth Mexican International Conference on Computer Science (ENC 2009), P339, DOI 10.1109/ENC.2009.58
[10]   Generalized Hardware Post-processing Technique for Chaos-Based Pseudorandom Number Generators [J].
Barakat, Mohamed L. ;
Mansingka, Abhinav S. ;
Radwan, Ahmed G. ;
Salama, Khaled N. .
ETRI JOURNAL, 2013, 35 (03) :448-458