741 research outputs found

    Image Encryption Based on Diffusion and Multiple Chaotic Maps

    Full text link
    In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption technique using multiple chaotic based circular mapping. In this paper, first, a pair of sub keys is given by using chaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformation leads to diffusion process. Third, sub keys are generated by four different chaotic maps. Based on the initial conditions, each map may produce various random numbers from various orbits of the maps. Among those random numbers, a particular number and from a particular orbit are selected as a key for the encryption algorithm. Based on the key, a binary sequence is generated to control the encryption algorithm. The input image of 2-D is transformed into a 1- D array by using two different scanning pattern (raster and Zigzag) and then divided into various sub blocks. Then the position permutation and value permutation is applied to each binary matrix based on multiple chaos maps. Finally the receiver uses the same sub keys to decrypt the encrypted images. The salient features of the proposed image encryption method are loss-less, good peak signal-to-noise ratio (PSNR), Symmetric key encryption, less cross correlation, very large number of secret keys, and key-dependent pixel value replacement.Comment: 14 pages,9 figures and 5 tables; http://airccse.org/journal/jnsa11_current.html, 201

    Deciphering a novel image cipher based on mixed transformed Logistic maps

    Full text link
    Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based on transformed logistic maps and proves that the image cipher can be deciphered efficiently under two different conditions: 1) two pairs of known plain-images and the corresponding cipher-images with computational complexity of O(218+L)O(2^{18}+L); 2) two pairs of chosen plain-images and the corresponding cipher-images with computational complexity of O(L)O(L), where LL is the number of pixels in the plain-image. In contrast, the required condition in the previous deciphering method is eighty-seven pairs of chosen plain-images and the corresponding cipher-images with computational complexity of O(27+L)O(2^{7}+L). In addition, three other security flaws existing in most Logistic-map-based ciphers are also reported.Comment: 10 pages, 2 figure

    Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map

    Get PDF
    In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream cipher method is presented and investigated for video encryption based on hybrid chaotic map and ChaCha20 algorithm. Two chaotic maps are employed for keys generation process in order to achieve permutation and encryption tasks, respectively. The frames sequences are encrypted-decrypted based on symmetric scheme with assist of ChaCha20 algorithm. The proposed lightweight stream cipher method has been tested on several video samples to confirm suitability and validation in term of encryption–decryption procedures. The performance evaluation metrics include visual test, histogram analysis, information entropy, correlation analysis and differential analysis. From the experimental results, the proposed lightweight encryption method exhibited a higher security with lower computation time compared with state-of-the-art encryption methods

    Randomness properties of sequence generated using logistic map with novel permutation and substitution techniques

    Get PDF
    In this paper, a design of a chaos-based keystream generator (KSG) using a novel permutation technique with various two-dimensional patterns and a substitution technique with Z4 mapping is proposed. Initially, a chaotic function such as a logistic map is used to generate a pseudo-random number. Then these numbers are converted into binary sequences using binary mapping. In order to achieve statistical properties of the resultant binary sequences, a novel method of KSG is developed by considering parameters such as initial value “x0”, system parameter “r”, novel permutation techniques defined by 2-dimensional patterns, and substitution technique defined over Z4 transformation. The binary sequences so obtained are subjected to randomness tests by applying the National Institute of Standards and Technology (NIST) SP-800-22 (Revision 1a) test suite for investigation of its randomness properties to obtain suitable sequences which can be used as a key for cryptographic applications. From the results obtained, it is found that the binary sequences exhibit better randomness properties as per the cryptographic requirements

    JPEG2000 compatible neural network based cipher

    Get PDF
    In this paper, an efficient encryption technique is proposed, especially for JPEG2000 compatible images.The technique uses a multilayer neural network to generate a pseudo-random sequence for transforming wavelet subbands into cipher subbands.The neural network generator takes 64 bit key as a startup seed with additional 64 bit key for initial weights and biases.At each layer, output is calculated by several iterations to increase the complexity of the pseudorandom sequence generation.In order to examine effectiveness of this approach, various tests including correlation, histogram, key space etc. are conducted on test images, and the results demonstrate the robustness of the proposed approach
    corecore