Image encryption technique based on chaotic system and hash function

Internet is an extensively used medium to share information in the form of text, audio, videos and images. Sharing of information in a large network at a long distance demands security to protect the information from unauthorized access. Network security plays an essential role in securing the information on an unreliable network. For securing the data on network, many encryption schemes have been found out and new innovative encryption schemes has been in demand because e-commerce, e-banking and multimedia applications are being accessed on internet on daily basis. Recently, cryptographic coding techniques are mostly used in securing the information on an unreliable network from unauthorized access. Several cryptographic techniques have been found by the researchers for securing and safely transmitting the information on an unreliable network. Among all the cryptographic techniques Image Encryption techniques is widely used to share images on an unreliable network. The objective of this paper is to represent the few encryption techniques which is used for the encrypting the image on an unreliable network. This paper proposes a new encryption technique to encrypt the image. The proposed method encrypts the image using Chaotic System, Wavelet Transform, along with that the fingerprint of the image is created using Hash Function which is to be transmitted to the receiver. The proposed method along with the privacy also maintains integrity of the image.

[1]  P. Venkata Krishna,et al.  A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology , 2014, IEEE Journal of Biomedical and Health Informatics.

[2]  Gaurav Bhatnagar,et al.  Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.

[3]  Li Xinwu A New Model of Printer Color Management Based on Legendre Neural Network , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[4]  Yun-Ru Cao,et al.  Image encryption research based on chaotic sequences and wavelet transform , 2010, 2010 International Conference on Audio, Language and Image Processing.

[5]  Guoqiang Han,et al.  An Enhanced Chaos Based Image Encryption Algorithm , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[6]  Yanling Hao,et al.  Research on Data Encryption Technology Based on Chaos Theory , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[7]  Qi Han,et al.  Parallel Hash function construction based on chaotic maps with changeable parameters , 2011, Neural Computing and Applications.

[8]  Predrag Janicic,et al.  Logical Analysis of Hash Functions , 2005, FroCoS.

[9]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[10]  Subariah bt. Ibrahim,et al.  Enhanced chaotic image encryption algorithm based on Baker's map , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[11]  Qiang Wang,et al.  Digital Image Encryption Research Based on DWT and Chaos , 2008, 2008 Fourth International Conference on Natural Computation.

[12]  Yanling Hao,et al.  Research on Data Encryption Technology Based on Chaos Theory , 2007 .