Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation

This paper presents an implementation of 2D chaotic Baker map using different modes of operation in the fractional Fourier transform domain on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation: cipher block chain, cipher feedback, and output feedback, in which the initialization vector works as the main key. We examine its implementation for digital images along with its detailed security analysis. The security analysis includes the statistical analysis, the histogram analysis, the correlation coefficient metric, the maximum deviation metric, the irregular deviation metric, the noise immunity, the processing time, and the key space analysis. Experimental results verify and prove that the proposed image cryptosystem is highly secure from the cryptographic viewpoint, more immune to noise, has high key sensitivity, and takes less processing time.

[1]  Feng Huang,et al.  Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm , 2009 .

[2]  M. Gotz,et al.  Discrete-time chaotic encryption systems. I. Statistical design approach , 1997 .

[3]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[4]  Haldun M. Özaktas,et al.  Fractional Fourier domains , 1995, Signal Process..

[5]  Shujun Li,et al.  Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.

[6]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[7]  Yikui Zhai,et al.  Improving Image Encryption Using Multi-Chaotic Map , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[8]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[9]  F. H. Kerr,et al.  On Namias's fractional Fourier transforms , 1987 .

[10]  Haldun M. Özaktas,et al.  The fractional fourier transform , 2001, 2001 European Control Conference (ECC).

[11]  S. El-Rabaie,et al.  Homomorphic image encryption , 2009, J. Electronic Imaging.

[12]  Chung Jung Kuo,et al.  Novel image encryption technique and its application in progressive transmission , 1993, J. Electronic Imaging.

[13]  Neil Genzlinger A. and Q , 2006 .

[14]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[15]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[16]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[17]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[18]  Xiaofeng Liao,et al.  An Image Encryption Scheme Based on Chaotic Map , 2008, 2008 Fourth International Conference on Natural Computation.