Skip to main content

Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling

  • Conference paper
Digital Enterprise and Information Systems (DEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 194))

Included in the following conference series:

Abstract

In this paper, an extended sequence using chaotic map and Bernstein form Bézier curve to improve the chaotic key sequence is presented. Based on this sequence, we perform the scrambling in DCT domain with variable control parameters. To further enforce the security, the gray values of image pixels are diffused using keystream extracted from the extended key sequence of the chaotic map and the plainimage. As a result, the algorithm resists the chosen-plaintext/chosen-ciphertext/known-plaintext attacks, as diffusion depends on the plainimage. Moreover, experimental results and analysis confirm a high security level using the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ye, G.: Image Scrambling Encryption Algorithm of Pixel Bit Based on Chaos Map. Pattern Recognition 31, 347–354 (2010)

    Article  Google Scholar 

  2. Amin, M., Faragallah, O.S., Abd El-Latif, A.A.: A Chaotic Block Cipher Algorithm for Image Cryptosystems. Commun. Nonlinear Sci. Numer. Simulat. 15, 3484–3497 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  3. Kocarev, L., Galias, Z., Lian, S. (eds.): Intelligent Copmuting Based on Chaos. Springer, Heidelberg (2009)

    Google Scholar 

  4. Amin, M., Abd El-Latif, A.A.: Efficient Modified RC5 Based on Chaos Adapted to Image Encryption. Journal of Electronic Imaging 19(1) (January 2010)

    Google Scholar 

  5. Wang, Y., Wong, K.-W., Liao, X., Xiang, T., Chen, G.: A Chaos-Based Image Encrypttion Algorithm With Variable Control Parameters. Chaos, Solitions and Fractals 41, 1773–1783 (2009)

    Article  MATH  Google Scholar 

  6. Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A Novel Algorithm For Image Encryption Based On Mixture Of Chaotic Maps. Chaos, Solitons & Fractals 35, 408–419 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  7. Chen, G., Mao, Y., Chui, C.K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitions and Fractals 21, 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  8. Pareek, N.K., Patidar, V., Sud, K.K.: Image Encryption Using Chaotic Logistic Map. Image Vision Comput. 24, 926–934 (2006)

    Article  Google Scholar 

  9. Gao, T., Chen, Z.: Image Encryption Based on a New Total Shuffling Algorithm. Chaos, Solitions and Fractals 38, 213–220 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  10. Gao, T., Gu, Q., Chen, Z.: A New Image Encryption Algorithm Based on Hyper-Chaos. Phys. Lett. A 374(4), 394–400 (2008)

    Article  MATH  Google Scholar 

  11. Rhouma, R., Belghith, S.: Cryptanalysis of a New Image Encryption Algorithm Based on Hyper-Chaos. Phys. Lett. A 372, 5973–5978 (2008)

    Article  MATH  Google Scholar 

  12. Wang, K., Pei, Zou, L., Song, A., He, Z.: On The Security of 3D Cat Map Based Symmetric Image Encryption Scheme. Phys. Lett. A 343(6), 432–439 (2005)

    Article  MATH  Google Scholar 

  13. Salamon, D.: Curves and Surfaces for Computer Graphics. Springer Science+ Business Media, Inc. (2006)

    Google Scholar 

  14. Lian, S.: Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, LLC (2009)

    MATH  Google Scholar 

  15. Acharya, T., Ray, A.K.: Image processing: Principble and Applications. John Wiley & Sons, Inc., Chichester (2005)

    Book  Google Scholar 

  16. Shannon, C.E.: Communication Theory of Secrecy System. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abd El-Latif, A.A., Niu, X., Wang, N. (2011). Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling. In: Ariwa, E., El-Qawasmeh, E. (eds) Digital Enterprise and Information Systems. DEIS 2011. Communications in Computer and Information Science, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22603-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22603-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22602-1

  • Online ISBN: 978-3-642-22603-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics