CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Image Encryption based on Random Scrambling and Chaotic Gauss Iterative Map

by Marutesh Chandra Sharma, Pankaj Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 157 - Number 3
Year of Publication: 2017
Authors: Marutesh Chandra Sharma, Pankaj Sharma
10.5120/ijca2017912647

Marutesh Chandra Sharma, Pankaj Sharma . Image Encryption based on Random Scrambling and Chaotic Gauss Iterative Map. International Journal of Computer Applications. 157, 3 ( Jan 2017), 18-23. DOI=10.5120/ijca2017912647

@article{ 10.5120/ijca2017912647,
author = { Marutesh Chandra Sharma, Pankaj Sharma },
title = { Image Encryption based on Random Scrambling and Chaotic Gauss Iterative Map },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 157 },
number = { 3 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume157/number3/26811-2017912647/ },
doi = { 10.5120/ijca2017912647 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:56.959011+05:30
%A Marutesh Chandra Sharma
%A Pankaj Sharma
%T Image Encryption based on Random Scrambling and Chaotic Gauss Iterative Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 157
%N 3
%P 18-23
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Key encryption technique for any image that are being proposed here is initially applies scrambling to the location of the given or selected pixels. Afterward it applies chaotic map with using the format of 32 bit keys which currently the values of pixel image. The one dimensional vector techniques which basically breaks the correlation of the pixels which are neighbouring and thus making the image unidentifiable and in such manner the scrambling operation is done. After this chaotic mapping operation is applied to them which change the pixel values and this makes the image very meaningless. Hence by applying of keys so that the security of encryption level is increased further. Infact at any images which are of large size the encryption and decryption operation are simple enough to be carried out but this provide very high level (enough level) security. The encryption method which here is proposed for the study has been tested on different gray images and this has been showed some remarkable and good results. This is how the security level of encryption of image and decryption of image is further increased.

References
  1. Qiudong Sun, Wenying Yan, Jiangwei Huang, Wenxin Ma, “Image Encryption Based on Bit-plane Decomposition and Random Scrambling”, Journal of Shanghai Second Polytechnic University , vol. 09 , 2012.
  2. H. Zhao, W. Y. Wen, “A Survey of Digital Image Scrambling Techniques,” Fujian Compute, No. 12, pp. 10-12, 2007.
  3. Z. J. Tang, X. Lu, W. M. Wei, S. Z. Wang, et al, “Image Scrambling Based on Bit Shuffling of Pixels,” Journal of Optoelectronics • Laser, vol. 18, no. 12, pp. 1486-1488, 1495, 2007.
  4. W. Ding, W. Q. Yan, D. X. Qi, “Digital Image Scrambling Technology Based on Arnold Transformation,” Journal of Computer-aided Design & Computer Graphics, vol. 13, no. 4, pp. 338-341, 2001
  5. Y. P. Cheng, D. S. Fu, X. Wang, “Compound Chaotic Sequence Based Encryption Algorithm for Image,” Computer Applications and Software, vol. 23, no. 12, pp. 102-103, 115, 2006.
  6. C. Zou, R K. Ward, D. X. Qi, “A new digital image scrambling method based on fibonacci number,” Proceeding of the IEEE Inter Symposium on Circuits and Systems, Vancouver, Canada, vol. 3, pp. 965-968, 2004
  7. N.K. Pareek , Vinod Patidar , K.K. Sud “Image encryption using chaotic logistic map” Image and Vision Computing volume 24, pp.926–934, 2006
  8. Fridrich Jiri, “Symmetric ciphers based on two dimensional chaotic maps”, Int. J. Bifurcat Chaos vol. 8, No. 6, pp. 1259–1284, 1998
  9. J.C. Yen, J.I. Guo, “An efficient hierarchical chaotic image encryption algorithm and its VLSI realization”, IEEE Proc. Vis. Image Process, 147, pp. 167–175, 2000
  10. C.C. Chang, M.S. Hwang, T.S. Chen, “A new encryption algorithm for image cryptosystems”, J. Syst. Software 58 (2001) 83–91.
  11. S. Li, X. Zheng, “Cryptanalysis of a chaotic image encryption method,” Proceedings of the IEEE International. symposium on circuits and systems, Scottsdale, AZ, USA, 2002.
  12. G. Chen, Y. Mao, C.K. Chui, A symmetric image encryption based on 3D chaotic maps, Chaos Solitons Fractals, vol. 21, pp. 749–761, 2004.
  13. S. Mandal and S. Banerjee, "A chaos-based spread spectrum communication system," Nat. Conf. Nonlinear Sys. Dynamics, Indian Institute of Technology, Kharagpur, Dec 28-30, 2003
Index Terms

Computer Science
Information Sciences

Keywords

Random Scrambling Image Encryption and Chaotic Gauss Iterative Maps