A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps

The chaos based cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. This paper introduces an efficient chaos-based stream cipher, composing two chaotic logistic maps and a large enough external secret key for image encryption. The external secret key is used to derive the initial conditions for the chaotic maps, and is employed with the two chaotic maps to confuse the relationship between the cipher image and the plain image. In the encryption phase, the pixels are encrypted using an iterative cipher module based feedback and data-dependent inputs mechanism for mixing the current encryption parameters with previously encrypted information. To make the cipher more robust against any attack, the secret key is modified after encryption of each pixel of the plain image. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

[1]  Zine-Eddine Abid,et al.  Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems , 2008, Int. J. Netw. Secur..

[2]  Kai Wang,et al.  On the security of 3D Cat map based symmetric image encryption scheme , 2005 .

[3]  Jiun-In Guo,et al.  A new image encryption algorithm and its VLSI architecture , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[4]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[5]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[6]  Chen Gang,et al.  Ergodic matrix in image encryption , 2002, Other Conferences.

[7]  Jorge Nakahara Analysis of Venkaiah et al.'s AES Design , 2009, Int. J. Netw. Secur..

[8]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[9]  Henry Ker-Chang Chang,et al.  A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..

[10]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[11]  J.-C. Yeo,et al.  Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .

[12]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[13]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[14]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[15]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[16]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[17]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[18]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[19]  Fangjun Huang A New General Transparency Model for Block-based Watermarking Method , 2008, Int. J. Netw. Secur..

[20]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[21]  M. Baptista Cryptography with chaos , 1998 .