Chaos theory based cryptography in digital image distribution

The amount of visual information available in digital format has grown exponentially in recent years due to the wide availability of digital equipments, changes in the way people socially interact by setting up community web pages, wide spread use of the Internet in all types of personal and business activities, pay-after-trial services of digital multimedia and developments in high speed transmission of digital images with high reliability. However, the wide accessibility of the Internet and its connected hosts and availability of technology to capture network traffic or penetrate hosts have made digital images vulnerable to unauthorized access while in storage and during transmission over a network. Hence users of the Internet and application that use or process digital images need to address security issues to protect commercial value of images and also ensure user privacy and other issues. The objective of the research presented in this paper focused on proposing an image encryption technique which is capable of encrypting an image effectively and securely with a predefined visibility level. The stipulated objective is achieved by employing 2D chaotic map called the Kaplan-Yorke map.

[1]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[2]  Martin Hasler,et al.  Synchronization of chaotic systems and transmission of information , 1998 .

[3]  Ralph Howard,et al.  Data encryption standard , 1987 .

[4]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[5]  Wolfgang A. Halang,et al.  Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey , 2007, ArXiv.

[6]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[7]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[8]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[9]  Osama S. Farag Allah,et al.  Encryption quality analysis of the RC5 block cipher algorithm for digital images , 2006 .

[10]  Osama S. Farag Allah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .

[11]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[12]  Guanrong Chen,et al.  Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme , 2004, PCM.

[13]  A. M. Young,et al.  Introduction to chaos-based communications and signal processing , 2000, 2000 IEEE Aerospace Conference. Proceedings (Cat. No.00TH8484).

[14]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.