Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Image Encryption using Chaos and Parity based Pixel Modification in Permutation

Print
PDF
IJCA Proceedings on International Conference on Simulations in Computing Nexus
© 2014 by IJCA Journal
ICSCN - Number 1
Year of Publication: 2014
Authors:
T. Gopalakrishnan
S. Ramakrishnan
M. Balakumar

T Gopalakrishnan, S Ramakrishnan and M Balakumar. Article: Image Encryption using Chaos and Parity based Pixel Modification in Permutation. IJCA Proceedings on International Conference on Simulations in Computing Nexus ICSCN(1):30-35, May 2014. Full text available. BibTeX

@article{key:article,
	author = {T. Gopalakrishnan and S. Ramakrishnan and M. Balakumar},
	title = {Article: Image Encryption using Chaos and Parity based Pixel Modification in Permutation},
	journal = {IJCA Proceedings on International Conference on Simulations in Computing Nexus},
	year = {2014},
	volume = {ICSCN},
	number = {1},
	pages = {30-35},
	month = {May},
	note = {Full text available}
}

Abstract

This paper introduces a chaos based image encryption with parity based pixel value modification in the permutation stage. The encryption algorithm consists of two stages permutation-diffusion. Permutation stage original image pixels are scrambled and diffusion stage masks the original image pixel with the pseudo random binary sequence. Parity based pixel modification in permutation gives maximum security level in minimum rounds. The 1D chaotic maps logistic map, sine map and cubic map employed to permute and diffuse image pixels.

References

  • G. Alvarez, S. Li, "Some basic cryptographic requirements for chaos based cryptosystems", International Journal of Bifurcation and Chaos, vol. 16, pp. 2129–2151, 2006.
  • R. Matthews, "On the derivation of a chaotic encryption algorithm", Cryptologia, vol. 13, pp. 29–42, 1989.
  • J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps", International Journal of Bifurcation and Chaos, vol. 8, pp. 1259–1284, 1998.
  • G. R. Chen, Y. B. Mao, C. K. Chui, "Asymmetric image encryption scheme based on 3D chaotic standard maps", Chaos Solitons and Fractals, vol. 21, pp. 749–761, 2004.
  • Y. B. Mao, G. R. Chen, S. Lian, "A novel fast image encryption scheme based on 3D chaotic baker maps", International Journal of Bifurcation and Chaos, vol. 14, pp. 3613–3624, 2004.
  • Z. H. Guan, F. Huang, W Guan, "Chaos based image encryption algorithm", Physics Letters A, vol. 346, pp. 153–157, 2005.
  • S. Lian, J. Sun, Z. Wang, "A block cipher based on a suitable use of chaotic standard map", Chaos Solitons and Fractals, vol. 26, pp. 117–129, 2005.
  • K. W. Wong, B. S. H. Kwok, W. S. Law, "A fast image encryption scheme based on chaotic standard map", Physics Letters A, vol. 372, pp. 2645–2652, 2008.
  • R. Rhouma, E. Solak, S. Belghith, "Cryptanalysis of a new substitution– diffusion based image cipher", Communications in Nonlinear Science and Numerical Simulation, vol. 15, pp. 1887–1892, 2010.
  • C. Li, S. Li, K. T. Lo, "Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps", Communications in Nonlinear Science and Numerical Simulation, vol. 16, pp. 837–843, 2011.
  • Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu, "A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces", Signal Processing, vol. 93 pp. 2986–3000, 2013.
  • The NIST website. http://www. itl. nist. gov/div893/staff/soto/ jshome. html.
  • Yang Liu, Xiaojun Tong, Shicheng Hu, " A family of new complex number chaotic maps based image encryption algorithm", Signal Processing: Image Communication, vol. 28, pp. 1548-1559, 2013.
  • Yicong Zhou, Long Bao, C. L. Philip Chen, "Image encryption using a new parametric switching chaotic system", Signal Processing, Vol. 93, pp. 3039-3052, 2013.