3D Chaotic Functions for Image Encryption

This paper proposes the chaotic encryption algorithm based on 3D logistic map, 3D Chebyshev map, and 3D, 2D Arnolds cat map for color image encryption. Here the 2D Arnolds cat map is used for image pixel scrambling and 3D Arnold’s cat map is used for R, G, and B component substitution. 3D Chebyshev map is used for key generation and 3D logistic map is used for image scrambling. The use of 3D chaotic functions in the encryption algorithm provide more security by using the, shuffling and substitution to the encrypted image. The Chebyshev map is used for public key encryption and distribution of generated private keys.

[1]  Zhang Yunpeng,et al.  A Block Encryption Scheme Based on 3D Chaotic Arnold Maps , 2009, 2009 International Asia Symposium on Intelligent Interaction and Affective Computing.

[2]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[3]  Map , 1994, Imagining the Sacred Past.

[4]  Min Long,et al.  A Chaos-Based Data Encryption Algorithm for Image/Video , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[5]  Dr. Ranjan Bose,et al.  IMPLEMENTING SYMMETRIC CRYPTOGRAPHY USING CHAOS FUNCTIONS , 2002 .

[6]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[7]  Yueh-Min Huang,et al.  Image encryption algorithm based on chaotic maps , 2010, 2010 International Computer Symposium (ICS2010).

[8]  K. Ramar,et al.  Public key cryptosystems based on chaotic-Chebyshev polynomials , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.

[9]  Kannabiran Ganesan,et al.  Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps , 2008, 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation.

[10]  A. Senthil Arumugam,et al.  Image encryption algorithm based on improved 3d chaotic cat map , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[11]  Xiaojun Tong,et al.  A Multiple Chaotic Encryption Scheme for Image , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[12]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..