An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.

[1]  H.M. Elkamchouchi,et al.  Measuring encryption quality for bitmap images encrypted with rijndael and KAMKAR block ciphers , 2005, Proceedings of the Twenty-Second National Radio Science Conference, 2005. NRSC 2005..

[2]  Zhang Han,et al.  A new image encryption algorithm based on chaos system , 2003, IEEE International Conference on Robotics, Intelligent Systems and Signal Processing, 2003. Proceedings. 2003.

[3]  Namita Tiwari,et al.  EFFECTIVE IMPLEMENTATION AND AVALANCHE EFFECT OF AES , 2012 .

[4]  A. Pisarchik,et al.  Image encryption with chaotically coupled chaotic maps , 2008 .

[5]  Rasul Enayatifar,et al.  Image encryption via logistic map function and heap tree , 2011 .

[6]  Ganapati Panda,et al.  Image Encryption by Novel Cryptosystem Using Matrix Transformation , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[7]  Kevin Curran,et al.  Securing information content using new encryption method and Steganography , 2008, 2008 Third International Conference on Digital Information Management.

[8]  Ruisong Ye,et al.  An Image Encryption Scheme with Efficient Permutation and Diffusion Processes , 2011 .

[9]  Abdennaceur Kachouri,et al.  Implementation of RC5 and RC6 block ciphers on digital images , 2011, Eighth International Multi-Conference on Systems, Signals & Devices.

[10]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[11]  Saleh Mesbah,et al.  Efficiency and Security of Some Image Encryption Algorithms , 2008 .

[12]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[13]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[14]  Thomas J. Carter,et al.  An introduction to information theory and entropy , 2007 .

[15]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[16]  Li Hong,et al.  A Novel Image Scrambling Algorithm for Digital Watermarking Based on Chaotic Sequences , 2006 .

[17]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[18]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[19]  Osama S. Farag Allah,et al.  Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems , 2007 .

[20]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[21]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[22]  Sachin Dhawan,et al.  A Review of Image Compression and Comparison of its Algorithms , 2011 .

[23]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[24]  Osama S. Farag Allah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .

[25]  M. Y. Siyal,et al.  A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme , 2010, 2010 Fourth Pacific-Rim Symposium on Image and Video Technology.

[26]  Guanrong Chen,et al.  Chaos-Based Image Encryption , 2005 .

[27]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[28]  Rik Van de Walle,et al.  Image scrambling without bandwidth expansion , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[29]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[30]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[31]  Long-Wen Chang,et al.  A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[32]  Jiye Liang,et al.  The Information Entropy, Rough Entropy And Knowledge Granulation In Rough Set Theory , 2004, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[33]  Mohsen Rahmani,et al.  A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.

[34]  S. K. Changchien,et al.  A new Pixel-Chaotic-Shuffle method for image encryption , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[35]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .