DOI QR코드

DOI QR Code

Image Encryption Based on Quadruple Encryption using Henon and Circle Chaotic Maps

  • Received : 2015.05.31
  • Accepted : 2015.06.29
  • Published : 2015.06.30

Abstract

In this paper a new approach for image encryption based on quadruple encryption with dual chaotic maps is proposed. The encryption process is performed with quadruple encryption by invoking the encrypt and decrypt routines with different keys in the sequence EDEE. The decryption process is performed in the reverse direction DDED. The key generation for the quadruple encryption is achieved with a 1D Circle map. The chaotic values for the encrypt and decrypt routines are generated by using a 2D Henon map. The Encrypt routine E is composed of three stages i.e. permutation, pixel value rotation and diffusion. The permutation is achieved by: row and column scrambling with chaotic values, exchanging the lower and the upper principal and secondary diagonal elements based on the chaotic values. The second stage circularly rotates all the pixel values based on the chaotic values. The last stage performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. The security and performance of the proposed scheme are assessed thoroughly by using the key space, statistical, differential, entropy and performance analysis. The proposed scheme is computationally fast with security intact.

Keywords

References

  1. G. Ye and K. W. Wong, "An efficient chaotic image encryption algorithm based on a generalized Arnold map," Nonlinear Dynamics, vol. 69, no. 4, pp. 2079-2087, Sep. 2012 https://doi.org/10.1007/s11071-012-0409-z
  2. A. A. A. El-Latif, L. Li, T. Zhang, N. Wang, X. Song and X. Niu, "Digital image encryption scheme based on multiple chaotic systems," Sensing and Imaging, vol. 13, no. 2, pp. 67-88, Jun. 2012 https://doi.org/10.1007/s11220-012-0071-z
  3. S. Sam, P. Devaraj and R. S. Bhuvaneswaran, "A novel image cipher based on a mixed transformed logistic maps," Multimedia Tools and Applications, vol. 56, no. 2, pp. 315-330, Jan. 2012 https://doi.org/10.1007/s11042-010-0652-6
  4. M. Francois, T. Grosges, D. Barchiesi and R. Erra, "A new image encryption scheme based on a chaotic function," Signal Processing: Image Communications, vol. 27, no. 3, pp. 249-259, Mar. 2012 https://doi.org/10.1016/j.image.2011.11.003
  5. N. Taneja, B. Raman and I. Gupta, "Combinational domain encryption for still visual data," Multimedia Tools and Applications, vol. 159, no. 3, pp. 775-793, Aug. 2012
  6. S. Sam, P. Devaraj and R. S. Bhuvaneswaran, "An intertwining chaotic maps based image encryption scheme," Nonlinear Dynamics, vol. 69, no. 4, pp. 1995-2007, Sep. 2012 https://doi.org/10.1007/s11071-012-0402-6
  7. X. Huang, "Image encryption algorithm using chaotic chebyshev generator," Nonlinear Dynamics, vol. 67, no. 4, pp. 2411-2417, Mar. 2011
  8. X. Liao, S. Lai and Q. Zhou, "A novel image encryption algorithm based on self-adaptive wave transmission," Signal processing, vol. 90, no. 9, pp. 2714-2722, Sep. 2010 https://doi.org/10.1016/j.sigpro.2010.03.022
  9. A. A. A. El-Latif, L. Li and X. Niu, "A new image encryption scheme based on cyclic elliptic curve and chaotic system," Multimedia Tools and Applications, vol. 70, no. 3, pp. 1559-1584, Jun. 2014 https://doi.org/10.1007/s11042-012-1173-2
  10. C. K. Huang, C. W. Liao, S. L. Hsu and Y. C. Jeng, "Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system," Telecommunication Systems, vol. 52, no. 2, pp. 563-571, Feb. 2013
  11. J. W. Yoon and H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in Nonlinear Science and Numerical Simulations, vol. 15, no. 12, pp. 3998-4006, Dec. 2010 https://doi.org/10.1016/j.cnsns.2010.01.041
  12. A. Akhshani, S. Behnia, A. Akhavan, H. AbuHassan and Z. Hassan, "A novel scheme for image encryption based on 2D piecewise chaotic maps," Optics Communications, vol. 283, no.17, pp. 3259-3266, Sep. 2010 https://doi.org/10.1016/j.optcom.2010.04.056
  13. G. Ye, "Image scrambling encryption algorithm of pixel bit based on chao map," Pattern Recognition Letters, vol. 31, no. 5, pp. 347-354, Apr. 2010 https://doi.org/10.1016/j.patrec.2009.11.008
  14. G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, Aug. 2006 https://doi.org/10.1142/S0218127406015970
  15. V. Patidar, N. K. Pareek and K. K. Sud, "A new substitution diffusion based image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 7, pp. 3056-3075, Jul. 2009 https://doi.org/10.1016/j.cnsns.2008.11.005
  16. N. K. Pareek, V. Patidar and K. K. Sud, "Image encryption using chaotic logistic map," Image Vision and computing, vol. 24, no. 9, pp. 926-934, Sep. 2006 https://doi.org/10.1016/j.imavis.2006.02.021
  17. B. schneier, Applied cryptography. Singapore: John Wiley & sons, 2001