Author : Rachit Jain 1
Date of Publication :7th April 2016
Abstract: This paper shows the study on image encryption scheme using different Chaotic Maps. The main purpose is security management in transmission and storage. There are various image encryption techniques which have been continuously studied to fulfill the demand of real-time secure image transmission through wireless networks and over the Internet. Conventional image encryption methods like data encryption standard (DES), has the weakness of low-level efficiency and high redundancy when the image is large. The chaos-based image encryption technique provides an efficient way to deal with the difficult problems of high security, pseudorandom property, topological transivity and fast image encryption. The objective of this paper is to compare Logistic map, Baker map and Arnold cat map image encryption techniques by visually, statistically and noise analysis to get an efficient approach of image encryption.
Reference :
-
[1] Ephin M, Judy Ann Joy and N. A. Vasanthi, “ Survey of Chaos based Image Encryption and Decryption Techniques ” , Amrita International Conference of Women in Computing (AICWIC’13) Proceedings published by International Journal of Computer Applications (IJCA).
[2] John Justin M, Manimurugan S , “A Survey on Various Encryption Techniques ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
[3] S.S.Maniccam, N.G. Bourbakis, “Lossless image compression and encryption using SCAN”, Pattern Recognition 34,1229- 1245,2001.
[4] Aloha Sinha, Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, Vol-2 I 8 (2203),229-234.
[5] Jiun-In Guo, Jui-Cheng Yen, “A new mirror-like image Encryption algorithm and its VLSI architecture”, Pattern Recognition and Image Analysis, vol.IO, no.2, pp.236-247, 2000.
[6] Guosheng Gu ,Guoqiang Han, “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.
[7] Huang-Pei Xiao Guo-Ji Zhang, “An Image Encryption Scheme Based On Chaotic Systems”, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006.
[8] Behnia S, Akhshani A, Mahmodi H, Akhavan A." A novel algorithm for image encryption based on mixture of chaotic maps." Chaos Soliton Fract 2008;35(2):408–19.
[9] F.Y. Sun, S.T. Liu, Z.Q. Li, Z.W. Lu, “A novel image encryption scheme based on spatial chaos map,” Chaos Solitons & Fractals, vol. 38, no. 3, pp. 631-640, 2008.
[10] V. Patidar, N.K. Pareek, K.K. Sud, “A new substitution-diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 7, pp. 3056- 3075, 2009.
[11] K.W. Wong, B.S.H. Kwok, C.H. Yuen, “An efficient diffusion approach for chaos-based image encryption,” Chaos Solitons & Fractals, vol. 41, no. 5, pp. 2652-2663, 2009.
[12]J. Fridrich, “Symmetric ciphers based on twodimensional chaotic maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
[13] Y. Honglei, W. Guang-shou, W. Ting, L. Diantao, Y. Jun, M. Weitao, F. Y. Shaolei, andM. Yuankao, “An image encryption algorithm based on two dimensional Baker map,” in Proc. ICICTA, 2009.
[14] Sui, L., Duan, K., Liang, J. Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt. Commun. 2015;343:140–149.
[15] Zhenwei Shang, Honge Ren, Jian Zhang. 2008.A Block Location Scrambling Algorithm of Digital Image Based on Arnold Transformation. The 9 th International Conference for Young Computer Scientists, 978-0-7695- 3398- 8/08/$25.00 © IEEE.
[16] Zhu Liehuang, Li Wenzhuo, Liao Lejian, LiHong. 2006. A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), 0-7695- 2745-0/06© IEEE.
[17] [Online] Medical image source: https://www.nlm.nih.gov/research/visible/mri.html
[18] [Online] Satellite image source:http://http://www.satimagingcorp.com/
[19] Zhai, Y., Lin, S., Zhang, "Improving image encryption using multi-chaotic map,” Proceedings of the Power Electronics and Intelligent Transportation System (PEITS), pp. 143–148, 2008.