Image Cryptography using Complex Quadratic Map

Computer security holds three fundamental aspects namely confidentiality, integrity and availability. In order to deal with confidentiality, message encryption approach is one of the methods that adequate to secure the data. In this research, we propose complex quadratic map as an encryption method using a digital image as the plaintext. Our conducted experimental results conclude that complex quadratic map can be used as encryption method because it will approximately take 257 years for a supercomputer to crack the key, it also needs absolute error less than 10−15 in order to get adequate image decryption result which is challenging to be done by brute force approach.

[1]  Chinta Somswara Rao,et al.  IMPLEMENTATION OF OBJECT ORIENTED ENCRYPTION SYSTEM USING LAYERED CELLULAR AUTOMATA , 2011 .

[2]  Changda Wang,et al.  A Lightweight Encryption Method for Privacy Protection in Surveillance Videos , 2018, IEEE Access.

[3]  Suryadi Mt,et al.  Performance of Chaos-Based Encryption Algorithm for Digital Image , 2014 .

[4]  R. Devaney An Introduction to Chaotic Dynamical Systems , 1990 .

[5]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[6]  Son Bao Pham,et al.  Improving the Quality of Word Alignment by Integrating Pearson's Chi-Square Test Information , 2012, 2012 International Conference on Asian Language Processing.

[7]  Xin Zhang,et al.  Implementation of Mandelbrot set and Julia Set on SOPC platform , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[10]  Mohamed Elhoseny,et al.  An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.

[11]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[12]  Anuja Bhargava,et al.  Chaos based image encryption using two step iterated logistic map , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).

[13]  The Transition Between the Complex Quadratic Map and the Hénon Map , 2012 .

[14]  J. Perry,et al.  Chaos in real data : analysis of non-linear dynamics from short ecological time-series , 2000 .

[15]  Gholamreza Anbarjafari,et al.  Iterative back projection based image resolution enhancement , 2013, 2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP).

[16]  Michael B. Bonsall,et al.  Chaos in Real Data. The Analysis of Non‐Linear Dynamics from Short Ecological Time Series , 2001 .

[17]  Kalamullah Ramli,et al.  A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding , 2016, J. Inf. Hiding Multim. Signal Process..

[18]  N. Lazar,et al.  The ASA Statement on p-Values: Context, Process, and Purpose , 2016 .

[19]  K. Gopakumar,et al.  Private key encryption of speech signal based on three dimensional chaotic map , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).

[20]  Madhumita Panda Performance analysis of encryption algorithms for security , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[21]  S Arul Thileeban Encryption of images using XOR Cipher , 2016, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).

[22]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .