CFP last date
20 May 2024
Reseach Article

Image Encryption and Authentication Scheme using 3D Chaotic Map

by Pragati Thapliyal, Madhu Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 17
Year of Publication: 2015
Authors: Pragati Thapliyal, Madhu Sharma
10.5120/20646-3397

Pragati Thapliyal, Madhu Sharma . Image Encryption and Authentication Scheme using 3D Chaotic Map. International Journal of Computer Applications. 117, 17 ( May 2015), 15-18. DOI=10.5120/20646-3397

@article{ 10.5120/20646-3397,
author = { Pragati Thapliyal, Madhu Sharma },
title = { Image Encryption and Authentication Scheme using 3D Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 17 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number17/20646-3397/ },
doi = { 10.5120/20646-3397 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:25.693242+05:30
%A Pragati Thapliyal
%A Madhu Sharma
%T Image Encryption and Authentication Scheme using 3D Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 17
%P 15-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptographic techniques are in demand due to vast development in application of information transmission and communication. Image encryption and authentication schemes have been continuously studied to meet the demand of secure image transmission through networks. A number of effective chaos-based image encryption and authentication schemes have been proposed. The intent of this paper is to propose an image encryption and authentication scheme using chaotic map. Arnold cat map is used for diffusion as well as for substitution. This paper applies an alternate structure of the classic block cipher applied with Arnold Cat map is used for encryption and hash function is used for Authentication purpose. The paper that is being followed uses a keyed hash function is introduced to generate hash values from both the plain-image and the secret hash keys[1], which leads to large computational time, whereas our schemes computational time is less as compared to the previous. The experimental results show that the proposed encryption technique is efficient and has high security features.

References
  1. Huaqian Yang, Kwok-Wo Wong, Xiaofeng Liao, Wei Zhang, Pengcheng Wei, 2010, A fast image encryption and authentication scheme based on chaotic maps, Elsevier,.
  2. Zhang YiWei, WANG YuMin2 & SHEN XuBang. June 2007, A Chaos-Based Image Encryption Algorithm Using Alternate Structure, Sci China Ser F-Inf Sci, vol 50(3), pp 34-341, ,
  3. Huang Yuanshi, Xu Rongcong, Lin Weiqiang. 2006, An Algorithm for JPEG Compressing with Chaotic Encrypting, in Proceedings of the International Conference on Computer Graphics, Imaging and Visualisation ,CGIV'06,
  4. Changjiang Zhang. 2008, Digital Image watermarking with Double Encryption by Arnold Transform and Logistic, Fourth International conference on Networked Computing & advanced information Management, pp. 329-334,
  5. Nikhil Debbarma, Lalita Kumari, and Jagdish Lal Raheja. August 2013, 2D Chaos Based Color Image Encryption Using Pseudorandom Key Generation, IJETTCS volume 2, Issue 4.
  6. Chen GR, Mao YB. 2004, A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitons & Fractals 2004, vol 21, pp 749–61.
  7. Chiaraluce F, Ciccarelli L. 2007, A New Chaotic Algorithm for Video Encryption. IEEE Trans Consum Electron 2002, vol 48, pp 838–43,.
  8. William Stallings, 2006, Cryptography and Network Security, 4th ed. Pearson, , ch. 1, pp. 18-19.
  9. Menezes A. , van Oorschot P. , Vanstone S. , 1997 ,Handbook of Applied Cryptography, CRC Press,.
  10. Bakhtiari S. , Safavi-Naini R. , Pieprzyk J. , 1995, "Cryptographic Hash Functions: A Survey", Technical Report 95-09, Department of Computer Science, University of Wollongong,.
  11. Diffie W. , Hellman M. 1976, "New Directions in Cryptography", IEEE Transaction on Information Theory, vol. 22, no. 5, pp. 644-654.
  12. NIST, Secure Hash Standard (SHS), 2002, Federal Information Processing Standards 180-2.
  13. Chen Guanrong, Mao Yaobin, Chui Charles K. . 2004, A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract.
  14. Pragati Thapliyal, Madhu Sharma, 2015, A image encryption scheme using chaotic maps.
  15. H Tiwari, 2014, Design of Cryptographic Hash Functions based on MD and MD Variant.
Index Terms

Computer Science
Information Sciences

Keywords

Arnold Cat map Authentication Chaotic Maps Image Encryption.