Advertisement

Implementation of New Framework for Image Encryption Using Arnold 3D Cat Map

  • Kunal Kumar Kabi
  • Bidyut Jyoti Saha
  • Arun Chauhan
  • Chittaranjan Pradhan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 339)

Abstract

Chaotic map can be used for the image security. Arnold 2D cat map is a common and simple technique out of the different chaotic maps. This technique may be extended to three dimension. Thus, we have proposed a new framework for the image encryption using Arnold 3D cat map. Histogram analysis shows the effectiveness of Arnold 3D cat map as compared to 2D. Also, this framework better resists the differential attacks as compared to the Arnold 2D cat map.

Keywords

Encryption Chaotic map Arnold 2D cat map Arnold 3D cat map Image security 

References

  1. 1.
    Wong, K.W.: Image encryption using chaotic maps. In: Intelligent Computing Based on Chaos, vol. 184, pp. 333–354. Springer, Berlin (2009)Google Scholar
  2. 2.
    Abuhaiba, I.S.I., Abuthraya, H.M., Hubboub, H.B., Salamah, R.A.: Image encryption using choatic map and block chaining. Int. J. Comp. Netw. Inf. Secur. 7, 19–26 (2012)Google Scholar
  3. 3.
    Ahmad, M., Alam, M.S.: A new algorithm of encryption and decryption of images using chaotic mapping. Int. J. Comp. Sci. Eng. 2(1), 46–50 (2009)Google Scholar
  4. 4.
    Ding, M.: Digital image encryption algorithm based on improved Arnold transform. In: International Forum on Information technology and Applications, pp. 174–176, IEEE (2010)Google Scholar
  5. 5.
    Jin, X.: A digital watermarking algorithm based on wavelet transform and Arnold. In: International Conference on Computer Science and Service System, pp. 3806–3809, IEEE (2011)Google Scholar
  6. 6.
    Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)Google Scholar
  7. 7.
    Pradhan, C., Saxena, V., Bisoi, A.K.: Imperceptible watermarking technique using Arnold’s transform and cross chaos map in DCT domain. Int. J. Comp. Appl. 55(15), 50–53 (2012)Google Scholar
  8. 8.
    Liu, H.: A novel image encryption algorithm based on improved 3D chaotic cat map. In: International Conference for Young Computer Scientists, pp. 3016–3021, IEEE (2008)Google Scholar
  9. 9.
    Pradhan, C., Mishra, S., Bisoi, A.K.: Non blind digital watermarking technique using DWT and cross chaos. In: International Conference on Communication, Computing and Security. Procedia Journal, pp. 897–904 (2012)Google Scholar
  10. 10.
    Wu, Y., Noonam, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multi. J. Sci. Technol. J. Sel. Areas Telecommun. 31–38 (2011)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Kunal Kumar Kabi
    • 1
  • Bidyut Jyoti Saha
    • 2
  • Arun Chauhan
    • 1
  • Chittaranjan Pradhan
    • 1
  1. 1.KIIT UniversityBhubaneswarIndia
  2. 2.CapgeminiMumbaiIndia

Personalised recommendations