Signal, Image and Video Processing

, Volume 9, Issue 3, pp 611–622 | Cite as

Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation

  • Heba M. Elhoseny
  • Hossam E. H. Ahmed
  • Alaa M. Abbas
  • Hassan B. Kazemian
  • Osama S. Faragallah
  • Sayed M. El-Rabaie
  • Fathi E. Abd El-Samie
Original Paper

Abstract

This paper presents an implementation of 2D chaotic Baker map using different modes of operation in the fractional Fourier transform domain on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation: cipher block chain, cipher feedback, and output feedback, in which the initialization vector works as the main key. We examine its implementation for digital images along with its detailed security analysis. The security analysis includes the statistical analysis, the histogram analysis, the correlation coefficient metric, the maximum deviation metric, the irregular deviation metric, the noise immunity, the processing time, and the key space analysis. Experimental results verify and prove that the proposed image cryptosystem is highly secure from the cryptographic viewpoint, more immune to noise, has high key sensitivity, and takes less processing time.

Keywords

Cryptography Chaos Image cryptosystem Security analysis Modes of operation 

References

  1. 1.
    Furht, B., Socek, D.: A Survey of Multimedia Security, Technical Report August 21 2003Google Scholar
  2. 2.
    Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)MATHGoogle Scholar
  3. 3.
    Daemen, J., Sand, B., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)CrossRefGoogle Scholar
  4. 4.
    Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. IMA Int. Conf. Crypt. Coding 2260, 205–221 (2001)MathSciNetGoogle Scholar
  5. 5.
    Gotz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic cryptosystems-part I: statistical design approach. IEEE Trans. Circuits Syst.-1: Fundam. Theory Appl. 44, 963–970 (1997)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Wang, K., Pei, W., Zou etl, L.: Security of public key encryption technique based on multiple chaotic system. Phys. Lett. A 360, 259–262 (2006)CrossRefMATHGoogle Scholar
  7. 7.
    Huang, F., Feng, Y.: Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm. Front Electr. Electron. Eng. China 4(1), 5–9 (2009)Google Scholar
  8. 8.
    Peng, J., Jin, S., Chen, G., Yang, Z., Liao, X.: An image encryption scheme based on chaotic map. Presented at the 4th International Conference on Natural Computation, vol. 4, pp. 595–599 (2008)Google Scholar
  9. 9.
    Zhai, Y., Lin, S., Zhang, Q.: Improving image encryption using multi-chaotic map. Presented at Workshop on Power Electronics and Intelligent Transportation System, pp. 143–148 (2008)Google Scholar
  10. 10.
    El-din, H., Ahmed, H., Kalash, H.M., Farag Allah, O.S.: An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica 31(1), 121–129 (2007)Google Scholar
  11. 11.
    McBride, A.C., Kerr, F.H.: On Namias’ fractional Fourier transforms. IMA J. Appl. Math. 39, 159–175 (1987)CrossRefMATHMathSciNetGoogle Scholar
  12. 12.
    Ozaktas, H.M.: Fractional Fourier domains. Signal Process. 46, 119–124 (1995)CrossRefMATHGoogle Scholar
  13. 13.
    Ozaktas, H.M., Zalevsky, Z., Kutay, M.A.: The Fractional Fourier Transform. Wiley, Chichester (2001)Google Scholar
  14. 14.
    Elashry, I.F., Farag Allah, O.S., Abbas, A.M., El-Rabaie, S., Abd El-Samie, F.E.: Homomorphic image encryption. J. Electro. Imaging 18(3), 033002-1–033002-14 (2009)Google Scholar
  15. 15.
    El-Fishawy, N., Abu Zaid, O.M.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)Google Scholar
  16. 16.
    Kuo, C.J.: Novel image encryption technique and its application in progressive transmission. J. Electron. Imaging 2(4), 345–351 (1993)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Heba M. Elhoseny
    • 1
  • Hossam E. H. Ahmed
    • 1
  • Alaa M. Abbas
    • 1
  • Hassan B. Kazemian
    • 2
  • Osama S. Faragallah
    • 3
  • Sayed M. El-Rabaie
    • 1
  • Fathi E. Abd El-Samie
    • 1
  1. 1.Department of Electronics and Electrical Communications, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  2. 2.Intelligent Systems Research Centre, Faculty of ComputingLondon Metropolitan UniversityLondonUK
  3. 3.Department of Computer Science and Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt

Personalised recommendations