A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map

Image encryption has been a popular research field in recent decades. This paper presents a novel scheme for the preview of the encrypted image. Using the scheme can preview the encrypted-image before decryption. So we can get to know that this image is really needed before decryption. Using the scheme can save a lot of unnecessary decryption time. To the best of our knowledge, this work is the first attempt to present such a scheme in the field of image encryption. We present the design and implementation of the scheme. The design of the proposed scheme is efficient. The experiments results show that the suggested scheme satisfies the requirement. It provides the necessary properties for a secure image encryption scheme. These characteristics make it a suitable candidate for using in cryptographic applications.

[1]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[2]  Akif Akgul,et al.  Chaos-based engineering applications with a 3D chaotic system without equilibrium points , 2015, Nonlinear Dynamics.

[3]  Manish Kumar,et al.  A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography , 2016, Signal Process..

[4]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[5]  Zhiliang Zhu,et al.  An image encryption algorithm based on compound homogeneous hyper-chaotic system , 2017, Nonlinear Dynamics.

[6]  Li Li,et al.  A new image encryption scheme based on cyclic elliptic curve and chaotic system , 2012, Multimedia Tools and Applications.

[7]  Frank Y. Shih,et al.  Image Segmentation , 2007, Encyclopedia of Biometrics.

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  Shiguo Lian,et al.  A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..

[10]  Guodong Ye,et al.  Chaotic image encryption algorithm using wave-line permutation and block diffusion , 2015, Nonlinear Dynamics.

[11]  Tony F. Chan,et al.  A Multiphase Level Set Framework for Image Segmentation Using the Mumford and Shah Model , 2002, International Journal of Computer Vision.

[12]  Yan Zhang,et al.  Optical image encryption with spatially incoherent illumination. , 2013, Optics letters.

[13]  Ahmed A. Abd El-Latif,et al.  A chaotic block cipher algorithm for image cryptosystems , 2010 .

[14]  Chin-Chen Chang,et al.  Digital watermarking of images using neural networks , 2000, J. Electronic Imaging.

[15]  K. Ikeda,et al.  Optical Turbulence: Chaotic Behavior of Transmitted Light from a Ring Cavity , 1980 .

[16]  Leo Grady,et al.  Random Walks for Image Segmentation , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Chun Qi,et al.  From Local Geometry to Global Structure: Learning Latent Subspace for Low-resolution Face Image Recognition , 2015, IEEE Signal Processing Letters.

[18]  Rin-ichiro Taniguchi,et al.  Hypercolumn model: A combination model of hierarchical self-organizing maps and neocognitron for image recognition , 2000, Systems and Computers in Japan.

[19]  X. Tong,et al.  A new algorithm of the combination of image compression and encryption technology based on cross chaotic map , 2013 .

[20]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[21]  Ghazali Sulong,et al.  Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption , 2015, Nonlinear Dynamics.

[22]  Said Bouchkaren,et al.  A New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata , 2016, Int. J. Netw. Secur..

[23]  Amir Akhavan,et al.  A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.

[24]  Shengen Yan,et al.  Deep Image: Scaling up Image Recognition , 2015, ArXiv.

[25]  Guangchun Luo,et al.  An image encryption scheme based on chaotic tent map , 2016, Nonlinear Dynamics.

[26]  Laurent Larger,et al.  Ikeda-based nonlinear delayed dynamics for application to secure optical transmission systems using chaos , 2004 .

[27]  Gareth Funka-Lea,et al.  Graph Cuts and Efficient N-D Image Segmentation , 2006, International Journal of Computer Vision.

[28]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[29]  N. Deckard Book Review: Elementary Statistics: A Step by Step Approach, 9thed. , 2016 .

[30]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[31]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[32]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[33]  Hung-I Hsiao,et al.  Color image encryption using chaotic nonlinear adaptive filter , 2015, Signal Process..

[34]  Min-Shiang Hwang,et al.  A reversible data hiding method by histogram shifting in high quality medical images , 2013, J. Syst. Softw..

[35]  M. Yaghoobi,et al.  A new image encryption method: parallel sub-image encryption with hyper chaos , 2011, Nonlinear Dynamics.

[36]  Amir Akhavan,et al.  A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps , 2006, 2006 International Conference on Image Processing.

[37]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[38]  M. Aswatha Kumar,et al.  Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p) , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[39]  T. Aaron Gulliver,et al.  Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher , 2015 .

[40]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[41]  Hung-I Hsiao,et al.  Fingerprint image cryptography based on multiple chaotic systems , 2015, Signal Process..

[42]  Stephanie Boehm,et al.  Chaos Making A New Science , 2016 .

[43]  Amir Akhavan,et al.  A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..

[44]  Rengarajan Amirtharajan,et al.  Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach , 2017, Int. J. Netw. Secur..

[45]  K. Ikeda Multiple-valued stationary state and its instability of the transmitted light by a ring cavity system , 1979 .