CFP last date
15 May 2024
Reseach Article

New Chaotic Substation and Permutation Method for Image Encryption

by Ekhlas Abbas Albahrani, Tayseer Karam Alshekly
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 4
Year of Publication: 2017
Authors: Ekhlas Abbas Albahrani, Tayseer Karam Alshekly
10.5120/ijais2017451698

Ekhlas Abbas Albahrani, Tayseer Karam Alshekly . New Chaotic Substation and Permutation Method for Image Encryption. International Journal of Applied Information Systems. 12, 4 ( July 2017), 33-39. DOI=10.5120/ijais2017451698

@article{ 10.5120/ijais2017451698,
author = { Ekhlas Abbas Albahrani, Tayseer Karam Alshekly },
title = { New Chaotic Substation and Permutation Method for Image Encryption },
journal = { International Journal of Applied Information Systems },
issue_date = { July 2017 },
volume = { 12 },
number = { 4 },
month = { July },
year = { 2017 },
issn = { 2249-0868 },
pages = { 33-39 },
numpages = {9},
url = { https://www.ijais.org/archives/volume12/number4/994-2017451698/ },
doi = { 10.5120/ijais2017451698 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:08:09.093724+05:30
%A Ekhlas Abbas Albahrani
%A Tayseer Karam Alshekly
%T New Chaotic Substation and Permutation Method for Image Encryption
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 12
%N 4
%P 33-39
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.

References
  1. W.STALLINGS,” CRYPTOGRAPHY AND NETWORK SECURITY”, Prentice Hall, 2011.
  2. J.YU, YUAN LI, X. XIE, N. ZHOU, Z.ZHOU,” Image encryption algorithm by using the logistic map and discrete fractional angular transform”, Optica Applicata, Vol. XLVII, No. 1, 2017.
  3. Y.Suryanto, Suryadi, K.Ramli,” A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding”, Journal of Information Hiding and Multimedia Signal Processing, Volume 7, Number 4, July 2016.
  4. N.S.Ahmed,” Multi-Image Encryption Technique Based on Permutation of Chaotic System”, International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS Vol:16 No:01,2016.
  5. A.A.Avval, J.ayubi and F.Arab,” Digital Image Encryption Based On Multiple Chaotic Maps”, ACSIJ Advances in Computer Science: an International Journal, Vol. 5, Issue 1, No.19 , January 2016.
  6. A.ABDULGADER,M.ISMAIL, N.ZAINAL,TARIK IDBEAA,” ENHANCEMENT OF AES ALGORITHM BASED ON CHAOTIC MAPS AND SHIFT OPERATION FOR IMAGE ENCRYPTION”, Journal of Theoretical and Applied Information Technology, Vol.71 No.1, 10th January 2015.
  7. C.Song and Y.Qiao,” A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos”, Entropy 2015.
  8. R. Qiu, C. Zhu and S.Liu,” An chaos image encryption algorithm based on binary sequence and baker mapping”, International Industrial Informatics and Computer Engineering Conference,2015
  9. S.Zalipour, S.J.Mirabedini, A.Harounabadi,” A Novel Image Encryption Algorithm Based On Wavelet Transform and Hyper-Chaotic System”, International Journal of Review in Life Sciences, ISSN 2231-2935, 2015.
  10. C. D.CANNIÈRE, A.BIRYUKOV, AND B.PRENEEL,” An Introduction to Block Cipher Cryptanalysis”, IEEE, VOL. 94, NO. 2, FEBRUARY 2006
  11. T.Gao , Z. Chen ,” A new image encryption algorithm based on hyper-chaos”, Elsevier, 2008
  12. Sheela S.and S. V. Sathyanarayana “Application of chaos theory in data security-a survey”, ACCENTS Transactions on Information Security,Vol 2(5), 2017.
  13. Dr. E.A. Albhrany, T.K. Alshekly” A New Key Stream Generator Based on 3D Henon map and 3D Cat map”, International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January-2017
  14. W.Liu , K.Sun, C.Zhu “A fast image encryption algorithm based on chaotic map”, ElsevierLtd,2016
  15. A.C. Dascalescu, R. Boriga, and M.I.Mihailescu,” A novel chaos-based image encryption scheme”, Annals of the University of Craiova, Mathematics and Computer Science Series Volume 41(1), 2014.
  16. Geeta, A. Papola,” AN ALGORITHM TO SECURE AN IMAGE USING LOGISTIC CHAOTIC MAPPING WITH SHUFFLING”, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET), Volume 5, Issue 9, September (2014).
  17. W.Yao, F.Wu, X. Zhang, Z.Zheng, Z.Wang,W.Wang, W.Qiu,” A Fast Color Image Encryption Algorithm Using 4-Pixel Feistel Structure”, PLOS ONE, November 8, 2016.
  18. P. Tiwari?, M. Kumar?, A. K. Jaiswal, and R. Saxena,” Chaos Based Information Securty in Multimedia Communication”, International Journal of Current Engineering and Technology, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Image encryption chaotic map Block Cipher hyper-chaotic Bernoulli map