Text-to-Image Encryption and Decryption Using Piece Wise Linear Chaotic Maps

Generally, if an image is received as a Cipher, it is assumed that the data (to be sent) might be an image, but text can also be encrypted in the format of an image. So to confuse the attacker, this paper proposes a technique that encrypts the text into image using piecewise linear chaotic map (PWLCM). A text file can be taken as input and the proposed algorithm will convert it into a cipher image, which can then be converted back by the decryption process. The advantage of this scheme is that it is quite secure and hard to break. Also, PWLCM Maps is the simplest among chaotic maps. At first, the text is converted from 7-bit ASCII to its double equivalent and then padding is done to get the required matrix to form a structure for the image to which the text will be converted. After that permutation is done to the matrix bits and then diffusion occurs at two stages, first for the rows and then for the columns. Both permutation and diffusion are done using PWLCM map.

[1]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[2]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[3]  K. Abhimanyu Kumar Patro,et al.  A Simple, Secure and Time Efficient Multi-way Rotational Permutation and Diffusion Based Image Encryption by Using Multiple 1-D Chaotic Maps , 2017 .

[4]  Ansi Ieee,et al.  IEEE Standard for Binary Floating Point Arithmetic , 1985 .

[5]  Ahmad Abusukhon,et al.  BLOCK CIPHER ENCRYPTION FOR TEXT-TO-IMAGE ALGORITHM , 2013 .

[6]  Xiangjun Wu,et al.  A robust and lossless DNA encryption scheme for color images , 2017, Multimedia Tools and Applications.

[7]  Ahmad Abusukhon,et al.  Analyzing the Efficiency of Text-to-Image Encryption Algorithm , 2012 .

[8]  Anurag Jain,et al.  An Enhanced Text to Image Encryption Technique using RGB Substitution and AES , 2013 .

[9]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[10]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[11]  Bibhudendra Acharya,et al.  Secure multi-level permutation operation based multiple colour image encryption , 2018, J. Inf. Secur. Appl..

[12]  Di Xiao,et al.  An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules , 2014, Multimedia Tools and Applications.

[13]  M. Brindha,et al.  A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem , 2016, Appl. Soft Comput..