32 research outputs found

    Research on digital image watermark encryption based on hyperchaos

    Get PDF
    The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value

    A proposed lightweight image encryption using ChaCha with hyperchaotic maps

    Get PDF
    Image encryption plays a pivotal rule in enhancing telecommunications media. Since Privacy is necessary in our daily life in many areas, the personal image will be encrypted when it sent it over the Internet to the recipient to maintain privacy issue. In this paper, the image is encrypted using ChaCha symmetric stream cipher with Hyperchaotic Map. Due to the sensitivity characteristics of initial conditions, pseudo randomness chaotic maps and control parameters in chaotic, Hyperchaotic maps is use, higher security is obtained via using initial seed number, variance of parameters, and unpredictable direction of chaotic. The suggested lightweight image encryption has confirmed robustness contra brute force attacks by providing a massive key space. Furthermore, the suggested lightweight image encryption is eligible to defense from statistical cracking, insecurity of image based on criteria's histogram correlation and entropy

    Enhancing chaos in multistability regions of Duffing map for an asymmetric image encryption algorithm

    Full text link
    We investigate the dynamics of a two-dimensional chaotic Duffing map which exhibits the occurrence of coexisting chaotic attractors as well as periodic orbits with a typical set of system parameters. Such unusual behaviors in low-dimensional maps is inadmissible especially in the applications of chaos based cryptography. To this end, the Sine-Cosine chaotification technique is used to propose a modified Duffing map in enhancing its chaos complexity in the multistable regions. Based on the enhanced Duffing map, a new asymmetric image encryption algorithm is developed with the principles of confusion and diffusion. While in the former, hyperchaotic sequences are generated for scrambling of plain-image pixels, the latter is accomplished by the elliptic curves, S-box and hyperchaotic sequences. Simulation results and security analysis reveal that the proposed encryption algorithm can effectively encrypt and decrypt various kinds of digital images with a high-level security.Comment: 15 pages, 15 figure

    Image encryption based on s-box and 3D-chaotic maps and secure image transmission through ofdm in rayleigh fading channel

    Get PDF
    Data security is vital if transferred over a wireless network or stored on a personal computer. The essential properties of chaos, such as initial state sensitivity and unpredictability, make it a crucial candidate for encryption applications. This paper proposes a 3D chaotic map and a cascaded S-Box that can be combined to get a high-efficiency and complex cryptographic algorithm. The first stage is ciphering using a 3D cat map, the second stage is an S-box based on a 3D Henon map, and the third stage is another ciphering stage using a 3D Henon map. This study combines various encryption techniques, including cipher algorithms and substitution boxes, with the OFDM system to establish a secure image transmission over a Rayleigh fading channel. BPSK modulation is used to ensure the simplicity of the proposed system. Three grey images are used, Lena, the camera-man, and Pepper, for testing and comparing with previous works. Security analysis is performed to evaluate the quality and security of the encryption process. For image transmission evaluation, the PSNR and BER are utilized. According to the statistical results, the proposed image encryption scheme is secure and efficient. The comparison with the previous studies shows that this system is competitive with previous works

    Computational Intelligence and Complexity Measures for Chaotic Information Processing

    Get PDF
    This dissertation investigates the application of computational intelligence methods in the analysis of nonlinear chaotic systems in the framework of many known and newly designed complex systems. Parallel comparisons are made between these methods. This provides insight into the difficult challenges facing nonlinear systems characterization and aids in developing a generalized algorithm in computing algorithmic complexity measures, Lyapunov exponents, information dimension and topological entropy. These metrics are implemented to characterize the dynamic patterns of discrete and continuous systems. These metrics make it possible to distinguish order from disorder in these systems. Steps required for computing Lyapunov exponents with a reorthonormalization method and a group theory approach are formalized. Procedures for implementing computational algorithms are designed and numerical results for each system are presented. The advance-time sampling technique is designed to overcome the scarcity of phase space samples and the buffer overflow problem in algorithmic complexity measure estimation in slow dynamics feedback-controlled systems. It is proved analytically and tested numerically that for a quasiperiodic system like a Fibonacci map, complexity grows logarithmically with the evolutionary length of the data block. It is concluded that a normalized algorithmic complexity measure can be used as a system classifier. This quantity turns out to be one for random sequences and a non-zero value less than one for chaotic sequences. For periodic and quasi-periodic responses, as data strings grow their normalized complexity approaches zero, while a faster deceasing rate is observed for periodic responses. Algorithmic complexity analysis is performed on a class of certain rate convolutional encoders. The degree of diffusion in random-like patterns is measured. Simulation evidence indicates that algorithmic complexity associated with a particular class of 1/n-rate code increases with the increase of the encoder constraint length. This occurs in parallel with the increase of error correcting capacity of the decoder. Comparing groups of rate-1/n convolutional encoders, it is observed that as the encoder rate decreases from 1/2 to 1/7, the encoded data sequence manifests smaller algorithmic complexity with a larger free distance value

    Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption

    Get PDF
    Insecure communication in digital image security and image storing are considered as important challenges. Moreover, the existing approaches face problems related to improper security at the time of image encryption and decryption. In this research work, a wavelet environment is obtained by transforming the cover image utilizing integer wavelet transform (IWT) and hybrid discrete cosine transform (DCT) to completely prevent false errors. Then the proposed hybrid chaotic map with L-shaped fractal Tromino offers better security to maintain image secrecy by means of encryption and decryption. The proposed work uses fractal encryption with the combination of L-shaped Tromino theorem for enhancement of information hiding. The regions of L-shaped fractal Tromino are sensitive to variations, thus are embedded in the watermark based on a visual watermarking technique known as reversible watermarking. The experimental results showed that the proposed method obtained peak signal-to-noise ratio (PSNR) value of 56.82dB which is comparatively higher than the existing methods that are, Beddington, free, and Lawton (BFL) map with PSNR value of 8.10 dB, permutation substitution, and Boolean operation with PSNR value of 21.19 dB and deoxyribonucleic acid (DNA) level permutation-based logistic map with PSNR value of 21.27 dB

    Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT difusion: a robust data encryption approach

    Get PDF
    In recent years, numerous image encryption schemes have been developed that demonstrate diferent levels of efectiveness in terms of robust security and real-time applications. While a few of them outperform in terms of robust security, others perform well for real-time applications where less processing time is required. Balancing these two aspects poses a challenge, aiming to achieve efcient encryption without compromising security. To address this challenge, the proposed research presents a robust data security approach for encrypting grayscale images, comprising fve key phases. The frst and second phases of the proposed encryption framework are dedicated to the generation of secret keys and the confusion stage, respectively. While the level-1, level-2, and level-2 difusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image, followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shufing. To enhance security, Tribonacci Transformation (TT) creates level-1 difusion in the permuted image. Level-2 difusion is introduced to further strengthen the difusion within the plaintext image, which is achieved by decomposing the difused image into eight-bit planes and implementing XOR operations with corresponding bit planes that are extracted from the key image. After that, the discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency subband (high-frequency sub-band) is substituted using the substitution box process. This creates further difusion (level 3 difusion) to make it difcult for an attacker to recover the plaintext image from an encrypted image. Several statistical tests, including mean square error analysis, histogram variance analysis, entropy assessment, peak signal-to-noise ratio evaluation, correlation analysis, key space evaluation, and key sensitivity analysis, demonstrate the efectiveness of the proposed work. The proposed encryption framework achieves signifcant statistical values, with entropy, correlation, energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively. These results contribute to its robustness against cyberattacks. Moreover, the processing time of the proposed encryption framework is less than one second, which makes it more suitable for realworld applications. A detailed comparative analysis with the existing methods based on chaos, DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed encryption scheme outperforms the existing ones

    Medical image encryption techniques: a technical survey and potential challenges

    Get PDF
    Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems
    corecore