Image Encryption Based on Diffusion and Multiple Chaotic Maps

In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption technique using multiple chaotic based circular mapping. In this paper, first, a pair of sub keys is given by using chaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformation leads to diffusion process. Third, sub keys are generated by four different chaotic maps. Based on the initial conditions, each map may produce various random numbers from various orbits of the maps. Among those random numbers, a particular number and from a particular orbit are selected as a key for the encryption algorithm. Based on the key, a binary sequence is generated to control the encryption algorithm. The input image of 2-D is transformed into a 1- D array by using two different scanning pattern (raster and Zigzag ) and then divided into various sub blocks. Then the position permutation and value permutation is applied to each binary matrix based on multiple chaos maps. Finally the receiver uses the same sub keys to decrypt the encrypted images. The salient features of the proposed image encryption method are loss-less, good peak signal –to noise ratio (PSNR), Symmetric key encryption, less cross correlation, very large number of secret keys, and key-dependent pixel value replacement.

[1]  P. D. Sheba,et al.  Selective Combinational Encryption of Gray Scale Images using Orthogonal Polynomials based Transformation , 2008 .

[2]  Zhang Xin,et al.  Image encryption algorithm based on Henon chaotic system , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[3]  Rainer Laur,et al.  On the VLSI implementation of the international data encryption algorithm IDEA , 1995, Proceedings of ISCAS'95 - International Symposium on Circuits and Systems.

[4]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[5]  J.-C. Yeo,et al.  Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .

[6]  Xun Yi,et al.  Fast encryption for multimedia , 2001, IEEE Trans. Consumer Electron..

[7]  Zhengquan Xu,et al.  An Improved Image Encryption Algorithm based on Chaotic System , 2009, J. Comput..

[8]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[9]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[10]  Jiying Zhao,et al.  An Image Quality Evaluation Method Based on Digital Watermarking , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Jiun-In Guo,et al.  EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission , 2003 .

[12]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[13]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[14]  C. Wu,et al.  Studying chaos via 1-D maps-a tutorial , 1993 .

[15]  Eli Biham,et al.  Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.

[16]  Rik Van de Walle,et al.  Image scrambling without bandwidth expansion , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  C. J. Kuo,et al.  A new signal encryption technique and its attack study , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.

[18]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[19]  Li Shu,et al.  Multi-Map Orbit Hopping Chaotic Stream Cipher , 2006, ArXiv.

[20]  Kehar Singh,et al.  Analysis and Comparison of Image Encryption Algorithms , 2004 .

[21]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[22]  L. Chua,et al.  Chaos: A tutorial for engineers , 1987, Proceedings of the IEEE.