Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach

With the increase in use of digital technology, use of data items in the format of text, image and videos are also increases. To securely send this data, many users and smart applications have adapted the image encryption approach. But the existing concepts are based on general AES approach. There is need to securely send the data with the addition of some expert image encryption and key generation approach. In this paper, we are using Matrix Array Symmetric Key (MASK) for the key generation and Chaos based approach for the image encryption. The main function of MASK is to generate the key for the encryption and decryption. The encryption process involves the generation of key. We have considered the key of MASK-256 for the encryption having 16 rounds. Chaos based concept has been considered for the encryption of image. Here, permutationsubstitution based chaos based approach has been adopted for the image encryption. Moreover, in this approach, we have adapted the concept of partial encryption of image pixels instead of complete encryption so that in case of arrack, intruder can be confused with the partial encrypted image. In this approach, different image samples having different sizes have been considered. Further, concept is evaluated based on the parameters of Information Entropy, Elapsed Time, Precision, Recall and F-Measure.

[1]  Yiran Chen,et al.  A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .

[2]  M.I.Khalil Real-Time Encryption/Decryption of Audio Signal , 2016 .

[3]  Minal Govind Avasare,et al.  Image encryption using chaos theory , 2014, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).

[4]  Anjali Dadhich,et al.  Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptography and Cryptanalysis: State-of-the-art review , 2014 .

[5]  Safya Belghith,et al.  Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Lekshmi R. Nair,et al.  Matrix based Substitution and Diffusion Procedure for Fast Image Encryption , 2013 .

[8]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[9]  Chengqing Li,et al.  Cracking a hierarchical chaotic image encryption algorithm based on permutation , 2015, Signal Process..

[10]  Safya Belghith,et al.  Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms , 2017 .

[11]  Dan Boneh,et al.  Symmetric Cryptography in Javascript , 2009, 2009 Annual Computer Security Applications Conference.

[12]  A. P. Misra,et al.  Chaos-based image encryption using vertical-cavity surface-emitting lasers , 2017, Optik.

[13]  Muhammad Khurram Khan,et al.  Chaos-based secure satellite imagery cryptosystem , 2010, Comput. Math. Appl..

[14]  Ruisong Ye,et al.  A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture , 2014 .

[15]  Suman Deb,et al.  An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography , 2015, 2015 International Conference on Computational Intelligence and Networks.