Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography

In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a thirdparty attack. Images are used in various areas like biometric authentication, medical science, military, etc., where they are being stored or transferred over the network and the safety of such images are very important. The newest movement in encryption is chaos-based, which is a better encryption technique than AES, DES, RSA, etc. It consists of different property such as sensitive independence on original situation, non-periodicity, non-convergence, etc. In recent times, many chaos-based image encryption algorithms have been proposed, but most of them are not sufficient to provide full protection to data. In this chapter, a survey of different chaos-based image encryption techniques is discussed. Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography

[1]  Kun Li,et al.  A new chaotic secure communication system , 2003, IEEE Trans. Commun..

[2]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[3]  Sirma Yavuz,et al.  Designing chaotic S-boxes based on time-delay chaotic system , 2013 .

[4]  Safwan El Assad,et al.  Chaos based improvement of the security of ZigBee and Wi-Fi networks used for industrial controls , 2011, International Conference on Information Society (i-Society 2011).

[5]  Phyllis Schumacher,et al.  Predictive Modeling for Imbalanced Big Data in SAS Enterprise Miner and R , 2018 .

[6]  Marius Iulian Mihailescu,et al.  New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography , 2014 .

[7]  Kwok-Wo Wong,et al.  Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[8]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[9]  Ruisong Ye,et al.  An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems , 2015 .

[10]  Deyun Chen,et al.  A Parallel Encryption Algorithm Based on Piecewise Linear Chaotic Map , 2013 .

[11]  Sanjay Kumar,et al.  Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing , 2015, Entropy.

[12]  Xinhua Wu,et al.  A new digital anti-counterfeiting scheme based on chaotic cryptography , 2012, 2012 International Conference on ICT Convergence (ICTC).

[13]  T. Hamsapriya,et al.  A Secure Key for Cloud using Threshold Cryptography in Kerberos , 2013 .

[14]  Imran Raza Khan,et al.  An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems , 2015 .

[15]  Xingyuan Wang,et al.  Image encryption using Game of Life permutation and PWLCM chaotic system , 2012 .

[16]  Shujiang Xu,et al.  A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map , 2010 .

[17]  B. Subramanyan,et al.  Image Encryption Based on AES Key Expansion , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[18]  P. Poonguzhali,et al.  Secured patient information transmission using reversible watermarking and DNA encrytion for medical images , 2015 .

[19]  Bin Wang,et al.  Splicing Model and Hyper–Chaotic System for Image Encryption , 2016 .

[20]  Sanjay Silakari,et al.  Secure and Fast Chaos based Encryption System using Digital Logic Circuit , 2014 .

[21]  Xiaoyu Niu,et al.  Characteristics analysis and application of the encryption algorithm based on dual-chaos theory , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.

[22]  Bhaskar Mondal,et al.  A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..

[23]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[24]  Ercan Solak,et al.  Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps , 2008 .

[25]  Amir Akhavan,et al.  A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.

[26]  Sayed Nouh,et al.  Performance Analysis of Chaotic Encryption Using a Shared Image as a Key , 2011 .

[27]  Zhen Ji,et al.  Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[28]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[29]  Zhiliang Zhu,et al.  Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.

[30]  Zhu Wang,et al.  An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps , 2015, Entropy.

[31]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[32]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[33]  Dragan Lambić,et al.  Security analysis and improvement of a block cipher with dynamic S-boxes based on tent map , 2015 .

[34]  Shujun Li,et al.  Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .

[35]  Kwok-Wo Wong,et al.  Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[36]  Safya Belghith,et al.  Cryptanalysis of a multi-chaotic systems based image cryptosystem , 2010 .

[37]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[38]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[39]  Joseph Zambreno,et al.  A chaotic encryption scheme for real-time embedded systems: design and implementation , 2013, Telecommun. Syst..

[40]  Jing Pan,et al.  The Research of Chaos-based SMS Encryption in Mobile Phone , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[41]  Zhiliang Zhu,et al.  A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System , 2016, Entropy.

[42]  Ljiljana M. Rajić,et al.  Correlation between the Results of Sequential Extraction and Effectiveness of Immobilization Treatment of Lead- and Cadmium-Contaminated Sediment , 2010, TheScientificWorldJournal.

[43]  Jyoti Grover Vehicular Fog Computing Paradigm: Scenarios and Applications , 2018 .

[44]  Changliang Xia,et al.  Chaotic Dynamics Characteristic Analysis for Matrix Converter , 2013, IEEE Transactions on Industrial Electronics.

[45]  Roland Schmitz,et al.  Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..

[46]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[47]  Laurent Larger,et al.  Chaos shift keying with an optoelectronic encryption system using chaos in wavelength , 2001 .

[48]  Xiaoling Huang,et al.  A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM , 2012 .

[49]  Chun-Liang Lin,et al.  Text encryption using ECG signals with chaotic Logistic map , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[50]  Teh-Lu Liao,et al.  Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization , 2005 .

[51]  Elankovan Sundararajan,et al.  A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map , 2014, TheScientificWorldJournal.

[52]  Soo-Chang Pei,et al.  Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .

[53]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[54]  Ismail Mansour,et al.  Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[55]  Craig Gentry Computing on the edge of chaos: Structure and randomness in encrypted computation , 2014, Electron. Colloquium Comput. Complex..

[56]  Rogelio Hasimoto-Beltran A generalized chaotic encryption system for multimedia applications , 2007 .

[57]  William L. Ditto,et al.  Principles and applications of chaotic systems , 1995, CACM.

[58]  Y. Mu,et al.  Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.

[59]  Marius Iulian Mihailescu,et al.  A novel chaos-based image encryption scheme , 2014 .

[60]  Xingyuan Wang,et al.  Novel image encryption algorithm based on cycle shift and chaotic system , 2015 .

[61]  Minvydas Ragulskis,et al.  Dynamic visual cryptography based on chaotic oscillations , 2014, Commun. Nonlinear Sci. Numer. Simul..

[62]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[63]  Yuxia Li,et al.  A Color Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System , 2014, Entropy.

[64]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[65]  K. Jayashree,et al.  Fog Computing Qos Review and Open Challenges , 2018 .

[66]  Chuandong Li,et al.  A secure communication scheme based on symbolic dynamics , 2004, 2004 International Conference on Communications, Circuits and Systems (IEEE Cat. No.04EX914).

[67]  Yu-Long Qiao,et al.  A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos , 2015, Entropy.

[68]  Elankovan A. Sundararajan,et al.  ImgFS: a transparent cryptography for stored images using a filesystem in userspace , 2015, Frontiers of Information Technology & Electronic Engineering.