Chaos Image Encryption using Pixel shuffling

The advent of wireless communications, both inside and outside the home-office envi- ronment has led to an increased demand for effective encryption systems. The beauty of encryp- tion technology comes out in more pronounced way when there is no absolute relation between cipher and original data and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be more random and non-predictable, they can be made utilized in achieving the encryption. The transposition technology of encryption systems requires scramble- ness behaviour in order to achieve the encryption of the data. This scrambleness behaviour can be derived from the randomness property of chaos which can be better utilized in the techniques like transposition system. In wireless communication systems, bandwidth utilization is an impor- tant criterion. In order to use encryption system in wireless communication; key space plays an important role for the efficient utilization of the bandwidth. In this paper we present a chaos- based encryption algorithm for images. This algorithm is based on pixel scrambling where in the randomness of the chaos is made utilized to scramble the position of the data. The position of the data is scrambled in the order of randomness of the elements obtained from the chaotic map and again rearranged back to their original position in decryption process. The same algoritm is tested with two different maps and performance analysis is done to select best suited map for en- cription.

[1]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[2]  Henry Leung,et al.  Secure communication using a chaos based signal encryption scheme , 2001, IEEE Trans. Consumer Electron..

[3]  Victor Grigoras,et al.  Chaos encryption method based on large signal modulation in additive nonlinear discrete-time systems , 2006 .

[4]  Li Chuanmu,et al.  A New Image Encryption Scheme based on Hyperchaotic Sequences , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[5]  K. Deergha Rao,et al.  Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI Realization , 2007, 2007 15th International Conference on Digital Signal Processing.

[6]  Kwok-Wo Wong,et al.  Performing Compression and Encryption Simultaneously using Chaotic Map , 2008 .

[7]  Qiang Wang,et al.  Digital Image Encryption Research Based on DWT and Chaos , 2008, 2008 Fourth International Conference on Natural Computation.

[8]  M. Usama,et al.  Classical and chaotic encryption techniques for the security of satellite images , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[9]  V. Chandrasekaran,et al.  Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[10]  Xiaomin Wang,et al.  An image scrambling encryption using chaos-controlled Poker shuffle operation , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[11]  C. K. Huang,et al.  Hybrid image encryption using multi-chaos-system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[12]  Yuan-Biao Zhang,et al.  Image Encryption Algorithm Based on S-boxes Substitution and Chaos Random Sequence , 2009, 2009 International Conference on Computer Modeling and Simulation.

[13]  Zhang Xin,et al.  Image encryption algorithm based on Henon chaotic system , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[14]  N. Xuan,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[15]  Canyan Zhu,et al.  Image encryption algorithm based on chaotic mapping , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[16]  Ying Shen,et al.  Encryption algorithms using chaos and CAT methodology , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[17]  Tianjie Cao,et al.  Survey: Image Encryption using Chaotic Cryptography Schemes , 2011 .