Comparative Image Encryption Method Analysis Using New Transformed - Mapped Technique

Several traditional encryption schemes have been analysed and based on the literature survey, it has been found that chaotic sequences are very much useful to create randomness. In this paper, a new encryption scheme has been proposed with two phases. In the first phase the input image is transformed using a new transformation technique whereas in the second phase .Chirikov Standard Map is used for pixel shuffling and modified Logistic Map is used for diffusion. Chirikov standard map , decor relate the strong relationship among adjacent pixels hence employed to shuffle the pixel positions of the plain image. The modified logistic map is used for generating the random sequence which is completed the purpose of changing pixel values. Various images and standard lena image is used to demonstrate the validity of the proposed algorithm. The results of experiments show that the proposed algorithm for image cryptosystems provides a no correlation between the original image and cipher image. The scheme is key sensitive and shows impressive resistance against brute force attack and statistical attack.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Hong-Ye Gao,et al.  Wavelet analysis [for signal processing] , 1996 .

[3]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[4]  William Puech,et al.  A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.

[5]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[6]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[7]  Mayank Mishra,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .

[8]  P. Raviraj The Modified 2D-Haar Wavelet Transformation in Image Compression , 2007 .

[9]  Sunil Kumar Muttoo,et al.  DATA HIDING IN JPEG IMAGES , 2008 .

[10]  Guanrong Chen,et al.  On the security of a class of image encryption schemes , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[11]  Ahmad T. Al-Taani,et al.  A Novel Steganographic Method for Gray-Level Images , 2009 .

[12]  Musheer Ahmad,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2009 .

[13]  S. Mishra,et al.  Image Compression Using Wavelet Packet Tree , 2010 .

[14]  Musheer Ahmad,et al.  Chaotic image encryption algorithm based on frequency domain scrambling , 2010 .

[15]  Jun-jie Chen,et al.  A chaos-based digital image encryption scheme with an improved diffusion strategy. , 2012, Optics express.