Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission

Summary Robust and secure transmission strategy for high-quality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission scheme that combines chaotic encryption and turbo coding technique into one processing step is proposed. In the proposed scheme, selective encryption algorithm based on two-dimensional chaotic map is utilized for data security. Furthermore, error correction technique based on turbo coding is employed as channel coding for data communication in order to solve the problem of channel’s limited bandwidth and throughput. Simulation results show that the proposed scheme achieves high degree of robustness against channel impairments and wide varieties of attacks. In addition, it improves image quality with acceptable data rates. Keyword Error correction code, Image transmission, DWT, Image encryption

[1]  Jinhong Luo,et al.  Research of Chaos Encryption Algorithm Based on Logistic Mapping , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[2]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[3]  Fuyan Sun,et al.  A novel image encryption scheme based on spatial chaos map , 2008 .

[4]  Alain Glavieux,et al.  Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .

[5]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[6]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[7]  Vera Pless Review: F. J. MacWilliams and N. J. A. Sloane, The theory of error-correcting codes. I and II , 1978 .

[8]  K. Deergha Rao A robust and secure scheme for image communication over wireless channels , 2005, 2005 IEEE 7th CAS Symposium on Emerging Technologies: Circuits and Systems for 4G Mobile Wireless Communications.

[9]  V. Jeoti,et al.  On Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[10]  James E. Fowler,et al.  An Overview on Wavelets in Source Coding, Communications, and Networks , 2007, EURASIP J. Image Video Process..

[11]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[12]  K. P. Subbalakshmi,et al.  On the Design of Error-Correcting Ciphers , 2006, EURASIP J. Wirel. Commun. Netw..

[13]  Dong-Wook Kim,et al.  WAVELET DOMAIN IMAGE ENCRYPTION BY SUBBAND SELECTION AND DATA BIT SLELECTION , 2003 .

[14]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[15]  Guo-Qiang Han,et al.  The Application of Chaos and DWT in Image Scrambling , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[16]  Volkan Ozduran,et al.  A COMBINED ENCRYPTION AND ERROR CORRECTION SCHEME:AES-TURBO , 2009 .

[17]  S. El-Rabaie,et al.  Homomorphic image encryption , 2009, J. Electronic Imaging.

[18]  Li Chuanmu,et al.  A New Image Encryption Scheme based on Hyperchaotic Sequences , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[19]  Syed Shameem,et al.  Secure Image Transmission over Wireless Channels , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[20]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[21]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[22]  Danilo Gligoroski,et al.  Cryptcoding - Encryption and Error-Correction Coding in a Single Step , 2006, Security and Management.

[23]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[24]  S. Darwish,et al.  A robust and secure scheme for image transmission over wireless channels , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.