Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys

被引:12
作者
Ahmad, Musheer [1 ]
Ahmad, Tanvir [1 ]
机构
[1] Jamia Millia Islamia, Fac Engn & Technol, Dept Comp Engn, New Delhi 110025, India
关键词
multimedia security; chaotic systems; shuffling; diffusion; image encryption;
D O I
10.1504/IJCNDS.2014.057991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid exchange of multimedia data over worldwide available internet and shared networks has encouraged its unauthorised access, illegal usage, disruption, alteration. Therefore, it demands efficient methods to provide security to multimedia contents for ensuring authorised access, preventing illegal disruption, alteration, etc. To meet the aforesaid needs, the authors propose an efficient encryption method to secure the multimedia colour imagery. Complex dynamic responses of multiple high-order chaotic systems are utilised to carry out image pixels shuffling and diffusion processes under the control of secret key. The pixels diffusion is done by randomly picking the actual encryption keys out of nine hybridised keys that are extracted from complex sequences of Chen, Rossler and Chua chaotic systems. Eventually, a high encryption effect is turned up in the encrypted multimedia colour images. Moreover, the shuffling and diffusion processes are made plain-image information dependent to resist the potential chosen-plaintext, chosen-ciphertext and known-plaintext attacks. The simulation results validate that the proposed method has great encryption performance and practicableness.
引用
收藏
页码:113 / 128
页数:16
相关论文
共 29 条
[1]  
Ahmad M, 2011, COMM COM INF SC, V169, P257
[2]   A Multi-Level Blocks Scrambling Based Chaotic Image Cipher [J].
Ahmad, Musheer ;
Farooq, Omar .
CONTEMPORARY COMPUTING, PT 1, 2010, 94 :171-+
[3]   Two-level chaos-based video cryptosystem on H.263 codec [J].
Chen, Zengqiang ;
Ip, W. H. ;
Chan, C. Y. ;
Yung, K. L. .
NONLINEAR DYNAMICS, 2010, 62 (03) :647-664
[4]   Chaotic scrambling for wireless analog video [J].
Corron, Ned J. ;
Reed, Billy R. ;
Blakely, Jonathan N. ;
Myneni, Krishna ;
Pethel, Shawn D. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (09) :2504-2513
[5]   Image encryption for secure Internet multimedia applications [J].
Dang, PP ;
Chau, PM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) :395-403
[6]   A new hardware efficient stream cipher based on hash functions [J].
Deepthi, P. P. ;
Sathidevi, P. S. ;
Lakshmi, V. S. .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) :340-361
[7]  
Francia GA, 2009, PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, P104
[8]  
Fu C, 2007, ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, P189
[9]  
Furht B, 2005, MULTIMEDIA SECURITY
[10]   Chaotic Progressive Access Control for JPEG2000 Images Repositories [J].
Hamdi, Mohamed ;
Boudriga, Noureddine .
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,