chaos based image encryption technique

3
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Chaos Base Department of Comp ABSTRACT Due to internet explosion there has bee rise in transmission of data such as tex videos, etc over internet. Here security transmission of data over internet so secure from sender to receiver. Ima plays an important role for image tran the Internet and using chaos system secure than existing traditional algorithms like AES, RC5, etc. Encryption it becomes difficult to anal that is communicated over untrusted paper provides an introduction to Cha encryption as well decryption of confusion and diffusion methods achie cat map and chen respectively. Com existing algorithms is also done. Original Image Fig 1: Mod Encrypted Image Fig 2: Mod E A K D A K w.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ ed Image Encryption Techniqu Jalpa Shah, J S Dhobi puter Engineering, Government Engineering Col Gandhinagar, Gujarat, India en considerable x, images, text, y is required for o that data is age Encryption nsmission over m prove more cryptographic With Image lyze the image network.. The aos system and images using eved by arnold mparison with Keyword: Internet; Image En Map; Chen System; Confusi on 1. INTRODUCTION Digital image processing is algorithms to perform image images. The input of that sys and the system process that algorithms, and gives an image Image Encryption is the co unknown format using some c and a key. Similarly Imag conversion of unknown forma image using the decryption al Image Encryption & Image D Fig 1 and Fig 2 respectively. Encr del of Image Encryption (Grayscale Image) Original Im del of Image Decryption (Grayscale Image) Encryption Algorithm with a Key Parameter Decryption Algorithm with a Key Parameter r 2018 Page: 2289 me - 2 | Issue 3 cientific TSRD) nal ue llege, ncryption; Arnold Cat n; Diffusion the use of computer e processing on digital stem is a digital image image using efficient e as an output. onversion of image to cryptography algorithm ge Decryption is the at of image to original lgorithm. The model of Decryption is shown in rypted Image mage

Upload: ijtsrd

Post on 17-Aug-2019

9 views

Category:

Education


0 download

DESCRIPTION

Due to internet explosion there has been considerable rise in transmission of data such as tex, images, text, videos, etc over internet. Here security is required for transmission of data over internet so that data is secure from sender to receiver. Image Encryption plays an important role for image transmission over the Internet and using chaos system prove more secure than existing traditional cryptographic algorithms like AES, RC5, etc. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network.. The paper provides an introduction to Chaos system and encryption as well decryption of images using confusion and diffusion methods achieved by arnold cat map and chen respectively. Comparison with existing algorithms is also done. Jalpa Shah | J S Dhobi "Chaos Based Image Encryption Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd12733.pdf Paper URL: http://www.ijtsrd.com/computer-science/other/12733/chaos-based-image-encryption-technique/jalpa-shah

TRANSCRIPT

Page 1: Chaos Based Image Encryption Technique

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Chaos Based Image Encryption Technique

Department of Computer Engineering,

ABSTRACT Due to internet explosion there has been considerable rise in transmission of data such as texvideos, etc over internet. Here security is required for transmission of data over internet so that data is secure from sender to receiver. Image Encryption plays an important role for image transmission over the Internet and using chaos system prove more secure than existing traditional cryptographic algorithms like AES, RC5, etc. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network.. The paper provides an introduction to Chaos system aencryption as well decryption of images using confusion and diffusion methods achieved by arnold cat map and chen respectively. Comparison with existing algorithms is also done.

Original Image

Fig 1: Model of Image Encryption (Grayscale Image)

Encrypted Image

Fig 2: Model of Image Decryption (Grayscale Image)

Encryption

Algorithm with a Key Parameter

Decryption

Algorithm with a Key

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Chaos Based Image Encryption Technique

Jalpa Shah, J S Dhobi

Department of Computer Engineering, Government Engineering College,Gandhinagar, Gujarat, India

Due to internet explosion there has been considerable rise in transmission of data such as tex, images, text, videos, etc over internet. Here security is required for transmission of data over internet so that data is secure from sender to receiver. Image Encryption plays an important role for image transmission over

stem prove more secure than existing traditional cryptographic algorithms like AES, RC5, etc. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network.. The paper provides an introduction to Chaos system and encryption as well decryption of images using confusion and diffusion methods achieved by arnold cat map and chen respectively. Comparison with

Keyword: Internet; Image Encryption; Arnold Cat Map; Chen System; Confusion; Diffusion 1. INTRODUCTION

Digital image processing is the use of computer algorithms to perform image processing on digital images. The input of that system is a digital image and the system process that image using efficient algorithms, and gives an image as an output Image Encryption is the conversion of image to unknown format using some cryptography algorithm and a key. Similarly Image Decryption is the conversion of unknown format of image to original image using the decryption algorithm. The mImage Encryption & Image Decryption is shown in Fig 1 and Fig 2 respectively.

Encrypted Image

Fig 1: Model of Image Encryption (Grayscale Image)

Original Image

Fig 2: Model of Image Decryption (Grayscale Image)

Encryption

Algorithm with a Key Parameter

Decryption

Algorithm with a Key Parameter

Apr 2018 Page: 2289

www.ijtsrd.com | Volume - 2 | Issue – 3

Scientific (IJTSRD)

International Open Access Journal

Chaos Based Image Encryption Technique

Government Engineering College,

Internet; Image Encryption; Arnold Cat on; Diffusion

Digital image processing is the use of computer algorithms to perform image processing on digital images. The input of that system is a digital image and the system process that image using efficient

image as an output.

Image Encryption is the conversion of image to unknown format using some cryptography algorithm and a key. Similarly Image Decryption is the conversion of unknown format of image to original image using the decryption algorithm. The model of Image Encryption & Image Decryption is shown in

Encrypted Image

Original Image

Page 2: Chaos Based Image Encryption Technique

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2290

Based on the number of keys there are 2 types of Cryptography algorithms: Secret Key Algorithm in which only 1 key parameter is used to encrypt and decrypt the data(text, video, images, etc) and Private Key Algorithm in which 2 keys are used for encryption and decryption purpose. The former is known as Symmetric Key Algorithm and latter is known as Asymmetric algorithm. The digital images have high correlation between adjacent pixels; hence traditional cryptography algorithms cannot be used. 2. CHAOS SYSTEM The implementation of chaotic maps in the development of cryptography systems lies in the fact that a chaotic map is characterized by: (a) the initial conditions and control parameters with high sensitivity, (b) unpredictability of the orbital evolution, (c) the simplicity of the hardware and software implementation leads to a high encryption rate. These characteristics can be connected with some very important cryptographic properties such as confusion and diffusion, balance and avalanche properties [1].

3. LITERATURE REVIEW Shadow number method uses 2 keys -1 as image another is derived using the equation. the method is 2D Cat Map and Shadow method for RGB image[3]. A New Fast Color Image Encryption Scheme using Chen Chaotic System is proposed in which Less no of cipher rounds. Good security & Speed performance[4]. A Chaotic Cryptosystem for Images based on Henon and Arnold Cat Map in which confusion is done by ACM and diffusion is achieved by Henon maps but other better maps could also be employed[5]. Image encryption based on Independent Component Analysis & Arnold's Cat Map in which a new method ICA is employed but 2 images are used for encryption[6]. ACM with Henon & Logistic Map for Grayscale images is done but lacks several sensitivity tests[7]. Image encryption using Camellia and Chaotic maps is done with a large key space[8]. Arnold's Cat Map algorithm in Digital Image Encryption is done but ACM has limitation that after fixed no of iterations original image is retrieved[10].

4. PROPOSED METHOD

Fig 3 Proposed Image Encryption Method Here the algorithm steps are explained as:

FOR ENCRYPTION:

(1) Original square image in jpeg format probably is grayscale (2) The image is confused with fixed number of iterations using ACM (3) The ACM image is diffused with key parameters of CHEN chaotic system (3) The resultant image is the encrypted image.

FOR DECRYPTION:

(1) The encrypted image is diffused with CHEN chaotic system and same key parameters as in encryption stage. (2) The image is confused with fixed number of iterations using ACM as encryption stage. (3) The image is original image in grayscale.

ARNOLD CAT MAP:

This method is employed for confusion process in which pixels values are re-arranged as per the formula:

Original Image

Confusion Process (Arnold Cat Map)

Diffusion Process (Chen Chaotic Map)

Encrypted Image

Page 3: Chaos Based Image Encryption Technique

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2291

X’= (X + Y) mod n (1) Y’=(X + 2*Y) mod n (2)

CHEN CHAOTIC SYSTEM:

This method is employed for diffusion process in which pixels values are changed by the chen system of equations as:

x = a(y0 –x0) y = (c – a)x0 – x0z0 + cy0 z = x0y0 – bz0

These chen system of equations are solved using the numerical method of Runge-Kutta method of order 4 which provide more security than order 3.

5. RESULT ANALYSIS

The comparison result for Cipher image with respect to Correlation coefficient is given in Fig4

Fig 4: Comparison result for correlation coefficient

6. CONCLUSIONS & FUTURE WORK Thus the image encryption and decryption with the help of chaos system is better than the existing traditional algorithms as the histogram depict that no difference can be found in pixel value changes. The

proposed method has nearly zero coefficient in H, V and D directions than existing methods. The algorithm can be extended for color images as future work. 7. REFERENCES 1) Shannon, C. E. (1948). The mathematical theory

of communication.The Bell System Technical Journal, 27,379–423.

2) Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28, 656–715.

3) Nidhai K. El Abbadi, Enas Yahiya, Ahmeda Aladilee. Digital RGB Image Encryption Based on 2D Cat Map and Shadow Numbers, IEEE, 2017.

4) Chong Fu, Zhou-feng Chen, Wei Zhao, Hui-yan Jiang. A New Fast Color Image Encryption Scheme using Chen Chaotic System, IEEE, 2017.

5) Ali Soleymani, Md Jan Nordin, and Elankovan Sundararajan. A Chaotic Cryptosystem for Images based on Henon and Arnold Cat Map, The Scientific World Journal, Hindawi, 2014.

6) Nidaa Abdul Mohsin Abbas. Image encryption based on Independent Component Analysis & Arnold's Cat Map, Egyptioan Informatics Journal, ScienceDirect, 2016, Vol 17, Issue 1, pp. 139-146.

7) Hikmat N. Abdullah, Hamsa A. Abdullah. Image Encryption using Hybrid Chaotic map, IEEE, 2017, pp. 121-125.

8) Marwa S. Elpeltagy, Moataz M. Abdelwahab, Mohammed S. Sayed. Image encryption using Camellia and Chaotic maps, IEEE, 2015, pp. 209-214.

9) Minal Govind Avasare, Vishakha Vivek Kelkar. Image Encryption using chaos theory, IEEE, 2015.

10) Eko Hariyanto, Robbi Rahim. Arnold's Cat Map Algorithm in digital Image Encryption, IJSR, 2013, pp. 1363-1365.

11) Yogita Verma, Neerja Dharmale. A Survey paper based on image encryption and decryption using modified advanced encryption standard, IJSR, 2013, pp. 352-355.

-0.02

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

H V D

A 5/1

W7

Proposed Method