Robust Image Encryption Method With Cipher Stream Chaining Process

A new image encryption algorithm that uses one dimensional logistic map combined with perceptron model is proposed. The algorithm uses logistic map to produce pseudo random sequences, which are used sequences of keys to specify the weights of the perceptron. The, perceptron is used to encrypt the pixels of the image. The approach is also equipped with the novel Cipher Stream Chaining Process (CSCP), making it highly sensitive to given image. Our work is evaluated against histogram analysis, information entropy, key sensitivity analysis. Experiment results show that, the cipher image does not give out any information on the plain image and the algorithm is highly sensitive to plain image and key.

[1]  Ding Qun,et al.  A New Digital Chaotic Sequence Generator Based on Logistic Map , 2011, 2011 Second International Conference on Innovations in Bio-inspired Computing and Applications.

[2]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[3]  Ed Dawson,et al.  An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks , 2010, AISC.

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[6]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[7]  S. Rohith,et al.  Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.

[8]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[9]  Min Long,et al.  A Chaos-Based Data Encryption Algorithm for Image/Video , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[10]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[11]  Balasubramanian Raman,et al.  Combinational domain encryption for still visual data , 2011, Multimedia Tools and Applications.

[12]  Xingyuan Wang,et al.  Image encryption using Game of Life permutation and PWLCM chaotic system , 2012 .

[13]  P. Nandakumar,et al.  A Triple-Key chaotic image encryption method , 2011, 2011 International Conference on Communications and Signal Processing.

[14]  L. Kulkarni,et al.  An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher , 2015 .