A multilevel distributed image based encryption for full integrity
- 36 Downloads
Abstract
Sending and receiving information in today’s world has become easy. Recent advancements in the technology have made the world shrink. The transfer of data hence has become effortless. At one touch of the ‘send’ button, the data is made available to the required receiver. This has put the sender and receiver at ease to communicate. Ensuring the safety of the data being transmitted and also that it is in the right hands are the prime aspects of the communication process. Anyone who is interested in knowing the information may mess about the data. Hence it is required to protect the information from the unauthorized user. The very intention of this work is to provide enough security to the confidential color images that are to reach only the legitimate receiver. This paper focuses on the essential quantum of work required to ensure that the confidential images are out of harm’s way. It also is a sincere effort to accomplish the same using not very complicated techniques and to make use of a combination of simple algorithms like tent map and logistic map. The goal of the work is achieved with exertion which employs the technique of splitting the image into required number of appropriate blocks followed by the implementation of the vital processes: confusion and diffusion to achieve the mission. Confusion involves shuffling of the blocks and diffusion is implemented using a random sequence. This technique applied has helped to reach the least amount of correlation between the pixels in the ciphered image. The lesser is the degree of association between the nearby pixels in the encrypted image, higher is the efficiency of the encryption. The method implemented in this work is a simple version of the combination of tent map and logistic map and is trouble free and at the same time gives the required security to the image so that no unauthenticated user can make out the data even if he manages to get the ciphered adaptation of it.
Keywords
Confusion Diffusion Random sequence Image division Legitimate user Combination of logistic and tent mapMathematics subject classification
68P25Notes
References
- 1.Abuturab MR An Asymmetric Color Image Cryptosystem Based on Schur Decomposition in Gyrator Transform Domain. Opt Lasers Eng 582014:39–47. https://doi.org/10.1016/j.optlaseng.2014.01.025 CrossRefGoogle Scholar
- 2.Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel Tolerant Image Encryption Scheme. Wirel Pers Commun 77:2771–2791. https://doi.org/10.1007/s11277-014-1667-5 CrossRefGoogle Scholar
- 3.Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547. https://doi.org/10.1007/s11042-016-4206-4 CrossRefGoogle Scholar
- 4.Beloucif A, Noui O, Noui L (2016) Design of a Tweakable Image Encryption Algorithm Using Chaos-Based Schema. Int J Inf Comput Secur 8(3):205–220. https://doi.org/10.1504/IJICS.2016.079183 CrossRefGoogle Scholar
- 5.Brindha M, Ammasai Gounden NG, Sriram M (2015) A Hybrid Image Encryption Algorithm using Ahao and Conway's Game-of-Life Cellular Automata. Security and Communication Networks, HobokenGoogle Scholar
- 6.Chai X et al A Fast Chaos-Based Image Encryption Scheme with a Novel Plain Image-Related Swapping Block Permutation and Block Diffusion. Multimed Tools Appl 76(142017):15561–15585. https://doi.org/10.1007/s11042-016-3858-4 CrossRefGoogle Scholar
- 7.Chen R-J, Chen Y-H, Chen C-S, Lai J-L Image encryption/decryption system using 2-D cellular automataİ. IEEE 10th International Symposium on Consumer Electronics 2006:1–6Google Scholar
- 8.Chen R-J, Wen-Kai L, Lai J-L (2005) Image encryption using progressive cellular Automata substitution and SCAN. IEEE International Symposium on Circuits and Systems 2:1690–1693Google Scholar
- 9.Chong F, Chen J-J, Zou H, Meng W-H, Zhan Y-F, Ya-Wen Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378. https://doi.org/10.1364/OE.20.002363 CrossRefGoogle Scholar
- 10.Jin J (2012) An image encryption based on elementary cellular automataİ. Optics and Lasers in Engineering, Elsevier Publication 50(12):1836–1843CrossRefGoogle Scholar
- 11.Kumar S et al. (2015) Comparative Analysis of Color Image Encryption Using 2D Chaotic Maps, pp. 379–87, 10.1007/978-81-322-2247-7_39Google Scholar
- 12.Mollaeefar M et al (2017) A Novel Encryption Scheme for Colored Image Based on High Level Chaotic Maps. Multimed Tools Appl 76(1):607–629. https://doi.org/10.1007/s11042-015-3064-9 CrossRefGoogle Scholar
- 13.Pak C, Huang L (2017) A New Color Image Encryption Using Combination of the 1D Chaotic Map. Signal Process 138, Elsevier B.V.:129–137. https://doi.org/10.1016/j.sigpro.2017.03.011 CrossRefGoogle Scholar
- 14.Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing 2018:142. https://doi.org/10.1186/s13640-018-0386-3 CrossRefGoogle Scholar
- 15.Pareek NK, Patidar V (2006) Image encryption using chaotic logistic map, image and vision computing. Elsevier Publication 24(9):926–934Google Scholar
- 16.Qiang Z, Wei X (2013) RGB Color Image Encryption Method Based on Lorenz Chaotic System and DNA Computation. IETE Tech Rev 30(5):404–409. https://doi.org/10.4103/0256-4602.123123 CrossRefGoogle Scholar
- 17.Sharma M (2016) Chaos Based Image Encryption Using Two Step Iterated Logistic Map. pp. 1–5Google Scholar
- 18.Sharma V, Agnihotri HC, Chetan HP An Image Encryption and Decryption Techniques Using Two Chaotic Schemes. International Journal of Research in Advent Technology 2(2) E-ISSN: 2321-9637Google Scholar
- 19.Swathi Suresh M, Varghese DA (2015) An Efficient and optimized RC5 Image Encryption Algorithm for Secured Image Transmission. International Journal of Imaging and Robotics 15(3):117–125Google Scholar
- 20.Toughi S et al (2017) An Image Encryption Scheme Based on Elliptic Curve Pseudo Random and Advanced Encryption System. Signal Process 141, Elsevier B.V.:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010 CrossRefGoogle Scholar
- 21.Xuelong Z, Li Q, Manwu X, Fengyu L (2005) A symmetric cryptography based on Extended cellular automataİ. IEEE International Conference on Systems Man and Cybernetics 1:499–503Google Scholar
- 22.Yang Y-G, Xia J, Jia X, Zhang H (2013) Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf Process 12:3477–3493. https://doi.org/10.1007/s11128-013-0612-y MathSciNetCrossRefzbMATHGoogle Scholar
- 23.Ye R (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Opt Commun 284(22, Elsevier B.V.):5290–5298. https://doi.org/10.1016/j.optcom.2011.07.070 CrossRefGoogle Scholar
- 24.Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks, HobokenCrossRefGoogle Scholar
- 25.Ye G, Pan C, Huang X, Zhao Z, He J (2018) A Chaotic Image Encryption Algorithm Based on Information Entropy. International Journal of Bifurcation and Chaos 28(1). https://doi.org/10.1142/S0218127418500104 MathSciNetCrossRefGoogle Scholar
- 26.Ye G, Zhao H (2016) Huajin ChaiChaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067–2077. https://doi.org/10.1007/s11071-015-2465-7 CrossRefGoogle Scholar
- 27.Yun-Peng Z, Wei L, Shui-Ping C, Zhengjun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems Man and Cybernetics, pp. 474–479Google Scholar
- 28.Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647–6669. https://doi.org/10.1007/s11042-017-4577-1 CrossRefGoogle Scholar
- 29.Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Optics Communications, Elsevier Publication 285(5):594–608Google Scholar
- 30.Ziba Eslami N, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55CrossRefGoogle Scholar