Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

New Chaotic Substation and Permutation Method for Image Encryption

Ekhlas Abbas Albahrani, Tayseer Karam Alshekly. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Ekhlas Abbas Albahrani, Tayseer Karam Alshekly
10.5120/ijais2017451698
Download full text
  1. Ekhlas Abbas Albahrani and Tayseer Karam Alshekly. New Chaotic Substation and Permutation Method for Image Encryption. International Journal of Applied Information Systems 12(4):33-39, July 2017. URL, DOI BibTeX

    @article{10.5120/ijais2017451698,
    	author = "Ekhlas Abbas Albahrani and Tayseer Karam Alshekly",
    	title = "New Chaotic Substation and Permutation Method for Image Encryption",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "July 2017",
    	volume = 12,
    	number = 4,
    	month = "July",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "33-39",
    	url = "http://www.ijais.org/archives/volume12/number4/994-2017451698",
    	doi = "10.5120/ijais2017451698",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.

Reference

  1. W.STALLINGS,” CRYPTOGRAPHY AND NETWORK SECURITY”, Prentice Hall, 2011.
  2. J.YU, YUAN LI, X. XIE, N. ZHOU, Z.ZHOU,” Image encryption algorithm by using the logistic map and discrete fractional angular transform”, Optica Applicata, Vol. XLVII, No. 1, 2017.
  3. Y.Suryanto, Suryadi, K.Ramli,” A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding”, Journal of Information Hiding and Multimedia Signal Processing, Volume 7, Number 4, July 2016.
  4. N.S.Ahmed,” Multi-Image Encryption Technique Based on Permutation of Chaotic System”, International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS Vol:16 No:01,2016.
  5. A.A.Avval, J.ayubi and F.Arab,” Digital Image Encryption Based On Multiple Chaotic Maps”, ACSIJ Advances in Computer Science: an International Journal, Vol. 5, Issue 1, No.19 , January 2016.
  6. A.ABDULGADER,M.ISMAIL, N.ZAINAL,TARIK IDBEAA,” ENHANCEMENT OF AES ALGORITHM BASED ON CHAOTIC MAPS AND SHIFT OPERATION FOR IMAGE ENCRYPTION”, Journal of Theoretical and Applied Information Technology, Vol.71 No.1, 10th January 2015.
  7. C.Song and Y.Qiao,” A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos”, Entropy 2015.
  8. R. Qiu, C. Zhu and S.Liu,” An chaos image encryption algorithm based on binary sequence and baker mapping”, International Industrial Informatics and Computer Engineering Conference,2015
  9. S.Zalipour, S.J.Mirabedini, A.Harounabadi,” A Novel Image Encryption Algorithm Based On Wavelet Transform and Hyper-Chaotic System”, International Journal of Review in Life Sciences, ISSN 2231-2935, 2015.
  10. C. D.CANNIÈRE, A.BIRYUKOV, AND B.PRENEEL,” An Introduction to Block Cipher Cryptanalysis”, IEEE, VOL. 94, NO. 2, FEBRUARY 2006
  11. T.Gao , Z. Chen ,” A new image encryption algorithm based on hyper-chaos”, Elsevier, 2008
  12. Sheela S.and S. V. Sathyanarayana “Application of chaos theory in data security-a survey”, ACCENTS Transactions on Information Security,Vol 2(5), 2017.
  13. Dr. E.A. Albhrany, T.K. Alshekly” A New Key Stream Generator Based on 3D Henon map and 3D Cat map”, International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January-2017
  14. W.Liu , K.Sun, C.Zhu “A fast image encryption algorithm based on chaotic map”, ElsevierLtd,2016
  15. A.C. Dascalescu, R. Boriga, and M.I.Mihailescu,” A novel chaos-based image encryption scheme”, Annals of the University of Craiova, Mathematics and Computer Science Series Volume 41(1), 2014.
  16. Geeta, A. Papola,” AN ALGORITHM TO SECURE AN IMAGE USING LOGISTIC CHAOTIC MAPPING WITH SHUFFLING”, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET), Volume 5, Issue 9, September (2014).
  17. W.Yao, F.Wu, X. Zhang, Z.Zheng, Z.Wang,W.Wang, W.Qiu,” A Fast Color Image Encryption Algorithm Using 4-Pixel Feistel Structure”, PLOS ONE, November 8, 2016.
  18. P. Tiwari?, M. Kumar?, A. K. Jaiswal, and R. Saxena,” Chaos Based Information Securty in Multimedia Communication”, International Journal of Current Engineering and Technology, 2014.

Keywords

Image encryption, chaotic map, Block Cipher, hyper-chaotic, Bernoulli map