CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Chaos Image Encryption based on DCT Transforms and Henon Map

by Abdullah M. Awad, Rehab F. Hassan, Ali M. Sagheer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 11
Year of Publication: 2015
Authors: Abdullah M. Awad, Rehab F. Hassan, Ali M. Sagheer
10.5120/ijca2015906532

Abdullah M. Awad, Rehab F. Hassan, Ali M. Sagheer . Chaos Image Encryption based on DCT Transforms and Henon Map. International Journal of Computer Applications. 127, 11 ( October 2015), 1-7. DOI=10.5120/ijca2015906532

@article{ 10.5120/ijca2015906532,
author = { Abdullah M. Awad, Rehab F. Hassan, Ali M. Sagheer },
title = { Chaos Image Encryption based on DCT Transforms and Henon Map },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 11 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number11/22770-2015906532/ },
doi = { 10.5120/ijca2015906532 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:19:36.889891+05:30
%A Abdullah M. Awad
%A Rehab F. Hassan
%A Ali M. Sagheer
%T Chaos Image Encryption based on DCT Transforms and Henon Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 11
%P 1-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The study of cryptography applications in chaotic system have been exponentially increasing in the recent years. Depending on the sensitivity to initial conditions, chaotic systems are characterized, similarity to continuous broad-band power spectrum and random behavior. The chaotic system is high sensitive to the initial condition and is a high complex nonlinear dynamic system. The chaotic sequence is unpredictable and extreme sensitivity to initial conditions. There are many applications to the chaotic system in several methods, image compression, encryption, modulation and digital communication system. In this paper, an algorithm based on Discrete Cosine Transform (DCT) has been introduced by using Henon map to get the scheme of chaos image encryption. The level of security is very high and this algorithm can improve small key space. A new chaotic algorithm is presented to get rid of the problem of the weakness of security in one dimensional chaotic cryptosystems and small key space based on a new chaotic algorithm, which uses two dimension linear functions instead of one dimension.

References
  1. Matthews, R A J., On the Derivation of a Chaotic Encryption Algorithm, Cryptologia, 1989, 13(1), 29-42.
  2. Shannon, C., Communication Theory of Secrecy Systems, Bell System Technical Journal, 1949, 28(4), 656–715.
  3. Baptista, M.S., Cryptography with Chaos, Physics Letters A, 1998, 240, 50–54.
  4. Yen, J.C. and Guo, J.I., A New Chaotic Key Based Design for Image Encryption and Decryption, Proceedings of the IEEE International Symposium Circuits and Systems, 2000, 49-52 Vol.4.
  5. Rahma, A.S. and Yacob, B. Z, Real-Time Partial Encryption of Digital Video Using Symmetric Dynamic Dual Keys Algorithm (SDD), Eng.& Tech. Journal ,2012, 30(5).
  6. Rahma, A.S. and Ali, M. A., To Modify the Partial Audio Cryptography for Haar Wavelet Transform by Using AES Algorithm, Eng. & Tech. Journal, 2014, 32(1).
  7. Yen, J.C and J. I. Guo, A New Chaotic Image Encryption Algorithm, Proceedings of National Symposium on Telecommunications, 1998, 358-362.
  8. Yen, J. C. and J. I Guo., A New Chaotic Mirror-Like Image Encryption Algorithm and Its VLSI Architecture, Pattern Recognition and Image Analysis, 2000, 10(2), 236-247.
  9. Yen, J. C. and J. I. Guo., Efficient Hierarchical Chaotic Image Encryption Algorithm and Its VLSI Realization, Proceedings of IEEE Vision, Image and Signal Processing, 2000, 147(2).
  10. Fridrich, J., Symmetric Ciphers Based on Two-Dimensional Chaotic Maps, Int. J. Bifurcation and Chaos. 1998, 8(6).
  11. Fridrich, J., Image Encryption Based on Chaotic Maps, Proceedings of IEEE Conference on Systems,Man, and Cybernetics, 1997, 1105-1110.
  12. Alireza Jolfaei (Corresponding author) 2011. “Image Encryption Using Chaos and Block Cipher”. Computer and Information Science Vol. 4, No. 1; January 2011.
  13. Logistic aps, https://en.wikipedia.org/wiki/Logistic_map, Accessed Sep. 2015.
  14. Naess, A., Chaos and Nonlinear Stochastic Dynamics, Probabilistic Engineering Mechanics, 2000, 15, 37-47.
  15. Sheng, Y., Wavelet Transform, CRC Press LLC, 2000.
  16. S., Gilbert and N., Truong, Wavelets and Filter Banks, Wellesley-Cambridge Press, 1997.
  17. Giesl, J. andVlcek, K., Fractal Image Compression using the wavelet transformation,Proceedings of International Workshop Control and Information Technology, 2007.
  18. Podoba, T, Giesl, J., and Vlcek, K., Image Encryption In Wavelet Domain Based on ChaoticMaps, Proceedings of International Congress on Image and Signal Processing, 2009, 1-5.
  19. A. Sinha, K. Singh, Image Encryption by using Fractional Fourier Transform and Jigsaw Transform in Image Bit Planes, Optical Engineering, Optical Engineering, 44(5), 2005, 15-18.
  20. A. Mitra, Y V. Subba Rao, and S. R. M. Prasnna,A New Image Encryption Approach using Combinational Permutation Techniques, Int. J. on Electrical and Computer Eng.,2006, 1(2), 127- 132.
  21. Li. Shujun, X. Zheng, Cryptanalysis of a Chaotic Image Encryption Method, Proceedings of IEEE InternationalSymposium on Circuits and Systems, 2002, II-708 - II-711 Vol.2.
  22. G. Zhi-Hong, H. Fangjun, and G. Wenjie, Chaos-based image encryption algorithm, Physics Letters A, Vol. 346, Iss. 1–3, 2005, 153–157.
  23. PanuRanta, Adapting Media Elements of MMS Messages Using Digital Signal Processor, Master thesis,Helsinki University of Technology.
  24. PianHui Wu, Research on Digital Image Watermark Encryption Based on Hyper Chaos, PhD Thesis, 2013, University of Derby.
  25. Maqableh, Mahmoud, Mohammad (2012) ."Analysis and Design Security Primitives Based on Chaotic Systems for e Commerce", Durham theses, Durham University. Available at Durham E-Theses Online: http://etheses.dur.ac.uk/738/
  26. Sapna Sasidharan , Deepu Sleeba Philip, "A FAST PARTIAL IMAGE ENCRYPTION SCHEME WITH WAVELET TRANSFORM AND RC4 ", The College of Information Sciences and Technology © 2007-2015 The Pennsylvania State University.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos theory chaotic encryption AES DWT image encryption