CFP last date
22 April 2024
Reseach Article

Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix

by Baydda Flaeh AL-Saraji, Mustafa Dhiaa AL-Hassani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 3
Year of Publication: 2016
Authors: Baydda Flaeh AL-Saraji, Mustafa Dhiaa AL-Hassani
10.5120/ijca2016911693

Baydda Flaeh AL-Saraji, Mustafa Dhiaa AL-Hassani . Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix. International Journal of Computer Applications. 151, 3 ( Oct 2016), 1-5. DOI=10.5120/ijca2016911693

@article{ 10.5120/ijca2016911693,
author = { Baydda Flaeh AL-Saraji, Mustafa Dhiaa AL-Hassani },
title = { Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 3 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number3/26210-2016911693/ },
doi = { 10.5120/ijca2016911693 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:04.838745+05:30
%A Baydda Flaeh AL-Saraji
%A Mustafa Dhiaa AL-Hassani
%T Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 3
%P 1-5
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid development in internet technologies and applications have led to great increase in the amount of information sent and received electronically. Transmitting information on networks have become insecure because of new threats continue to evolve. This research aims to provide an efficient technique with highly protection degree of secret images being transmitted “in a meaningless form” over a communication channel through the use of chaotic maps by taking its advantages over other methods of encryption. Chaotic based encryption algorithm is employed at the present time because of its best security and good performance according to the random sequences that are generated from nonlinear system in a high speed calculations. The obtained results from the experimental tests proved that the proposed encryption algorithm is a powerful and efficient technique according to the higher (Entropy ≤ 8) and (Correlation ≤ 1) with perfect reconstruction of the decryption image.

References
  1. Mihir H Rajyaguru, “Crystography -Combination of Cryptography and Steganography with Rapidly Changing Keys”, International Journal of Emerging Technology and Advanced Engineering, ISSN: 2250-2459, Vol.2, October 2012.
  2. M.Lakshmanan, and S.Rajasekar, “Nonlinear Dynamics: Integrability”, Chaos, and Patterns”, Springer- Verlag Berlin Heidelberg, 2003.
  3. M.Ashtiyani, S.Asadi, P.H.Goudarzi, “A New Method in Transmitting Encrypted Data by FCM Algorithm”, Proceeding of ICTTA06 Conference, Syria, (2006).
  4. J.S. Yen and J.I. Guo, “A New Chaotic Key-based Design for Image Encryption and Decryption”, IEEE Proc. On Circuits and Systems”, vol. 4, pp. 49-52, (2000).
  5. David Arroyo, Gonzalo Alvarez, and Veronica Fernandez "On the Inadequacy of the Logistic Map for cryptographic applications", Instituto de Fsica Aplicade, Consejo Superior de Investigaciones Cientificas, Serrano Madrid, Span, 2008.
  6. Willam Stallings, "Cryptography and Network Security: Principles and Practice", Second ed, Prentice Hall, USA, 2003.
  7. N. K. Pareek, V. Patidar, K.K. Sud, “Image Encryption Using Chaotic Logistic Map”, M.L.S. University Computer Centre, Vigyan Bhawan, India, Elsevier, 2006.
  8. Fahad T. Bin Muhaya, “Chaotic and AES Cryptosystem for Satellite Imagery”, Prince Muqrin Chair for IT Security,Management Information System Department, Business Administration College, King Saud University, KSA,2011.
  9. Zhang, H. and J.-x. Dong. "Chaos theory and its application in modern cryptography in Computer Application and System Modeling (ICCASM)", International Conference on, 2010.
  10. Amit P., Goseph Z., “A Chaotic Encryption Scheme for Real-time Embedded Systems: Design and Implementation, Department of Electrical and Computer Engineering, Iowa State University, Ames, USA, Springer, 2011.
  11. Pengcheng Wei, Huaqian Yang, Qunjian Hang, and Xi Shi “A Novel Block Encryption Based on Chaotic Map", Department of Computer Sience, Chongqing Education of College, Chongqing 400067, China 2002.
  12. Wang Feng-ying, Cui Guo-wei, “A New Image Encryption Algorithm Based on the Logistic Chaotic System”, Department of Information Engineer, Inner Mongolia University of Science & Technology, China, © IEEE, 2010.
  13. H. Hermassi, R. Rhouma, S. Belghith, “Improvement of an Image Encryption Algorithm Based on Hyper-chaos”, National School of Engineers ENIT, Springer, 2011.
  14. Zhang Yong, “Image Encryption with Logistic Map and Cheat Image”, International Conference on Computer Re-search and Development, pp [97-101], March 2011.
  15. RashidahKadir, RosdianaShahril, and MohdAizainiMaarof, “A Modified Image Encryption Scheme Based on 2D Chaotic Map”, International Conference on Computer and Commu-nication Engineering, pp [1-5], May 2010.
  16. Alireza Jolfaei, Abdul Rasoul Mirghadri, “An Image Encryption Approach Using Chaos and Stream Cipher”, Journal of Theoretical and Applied Information Technology, (2010).
  17. J. S. Fouda, J. Y. Effa, S. Sabat, and M. Ali, “A Fast Chaotic Block Cipher for Image Encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 3, pp. 578–588,2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Chaos Theory Image Encryption Logistic Maps Dynamic Matrix.