Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation
- 389 Downloads
- 7 Citations
Abstract
This paper presents an implementation of 2D chaotic Baker map using different modes of operation in the fractional Fourier transform domain on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation: cipher block chain, cipher feedback, and output feedback, in which the initialization vector works as the main key. We examine its implementation for digital images along with its detailed security analysis. The security analysis includes the statistical analysis, the histogram analysis, the correlation coefficient metric, the maximum deviation metric, the irregular deviation metric, the noise immunity, the processing time, and the key space analysis. Experimental results verify and prove that the proposed image cryptosystem is highly secure from the cryptographic viewpoint, more immune to noise, has high key sensitivity, and takes less processing time.
Keywords
Cryptography Chaos Image cryptosystem Security analysis Modes of operationReferences
- 1.Furht, B., Socek, D.: A Survey of Multimedia Security, Technical Report August 21 2003Google Scholar
- 2.Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)MATHGoogle Scholar
- 3.Daemen, J., Sand, B., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)CrossRefGoogle Scholar
- 4.Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. IMA Int. Conf. Crypt. Coding 2260, 205–221 (2001)MathSciNetGoogle Scholar
- 5.Gotz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic cryptosystems-part I: statistical design approach. IEEE Trans. Circuits Syst.-1: Fundam. Theory Appl. 44, 963–970 (1997)CrossRefMathSciNetGoogle Scholar
- 6.Wang, K., Pei, W., Zou etl, L.: Security of public key encryption technique based on multiple chaotic system. Phys. Lett. A 360, 259–262 (2006)CrossRefMATHGoogle Scholar
- 7.Huang, F., Feng, Y.: Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm. Front Electr. Electron. Eng. China 4(1), 5–9 (2009)Google Scholar
- 8.Peng, J., Jin, S., Chen, G., Yang, Z., Liao, X.: An image encryption scheme based on chaotic map. Presented at the 4th International Conference on Natural Computation, vol. 4, pp. 595–599 (2008)Google Scholar
- 9.Zhai, Y., Lin, S., Zhang, Q.: Improving image encryption using multi-chaotic map. Presented at Workshop on Power Electronics and Intelligent Transportation System, pp. 143–148 (2008)Google Scholar
- 10.El-din, H., Ahmed, H., Kalash, H.M., Farag Allah, O.S.: An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica 31(1), 121–129 (2007)Google Scholar
- 11.McBride, A.C., Kerr, F.H.: On Namias’ fractional Fourier transforms. IMA J. Appl. Math. 39, 159–175 (1987)CrossRefMATHMathSciNetGoogle Scholar
- 12.Ozaktas, H.M.: Fractional Fourier domains. Signal Process. 46, 119–124 (1995)CrossRefMATHGoogle Scholar
- 13.Ozaktas, H.M., Zalevsky, Z., Kutay, M.A.: The Fractional Fourier Transform. Wiley, Chichester (2001)Google Scholar
- 14.Elashry, I.F., Farag Allah, O.S., Abbas, A.M., El-Rabaie, S., Abd El-Samie, F.E.: Homomorphic image encryption. J. Electro. Imaging 18(3), 033002-1–033002-14 (2009)Google Scholar
- 15.El-Fishawy, N., Abu Zaid, O.M.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)Google Scholar
- 16.Kuo, C.J.: Novel image encryption technique and its application in progressive transmission. J. Electron. Imaging 2(4), 345–351 (1993)CrossRefGoogle Scholar