CFP last date
22 April 2024
Reseach Article

Performance Analysis of Six Chaos Cryptographic Algorithms for Image Encryption

by Muhamad Andika Rosy, Asep Juarna, Dina Anggraini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 43
Year of Publication: 2023
Authors: Muhamad Andika Rosy, Asep Juarna, Dina Anggraini
10.5120/ijca2023922545

Muhamad Andika Rosy, Asep Juarna, Dina Anggraini . Performance Analysis of Six Chaos Cryptographic Algorithms for Image Encryption. International Journal of Computer Applications. 184, 43 ( Jan 2023), 44-51. DOI=10.5120/ijca2023922545

@article{ 10.5120/ijca2023922545,
author = { Muhamad Andika Rosy, Asep Juarna, Dina Anggraini },
title = { Performance Analysis of Six Chaos Cryptographic Algorithms for Image Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2023 },
volume = { 184 },
number = { 43 },
month = { Jan },
year = { 2023 },
issn = { 0975-8887 },
pages = { 44-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number43/32600-2023922545/ },
doi = { 10.5120/ijca2023922545 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:23:55.520660+05:30
%A Muhamad Andika Rosy
%A Asep Juarna
%A Dina Anggraini
%T Performance Analysis of Six Chaos Cryptographic Algorithms for Image Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 43
%P 44-51
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase in cyber crimes such as theft and piracy adds to the vulnerability of storing and sending image data in cyberspace. To deal with the rampant crime in cyberspace, especially in image data, cryptography is implemented on images. Cryptography based on chaos theory was chosen because it has a random key generator value. Implementation of image cryptography based on chaos theory makes image cryptography more developed, chaos-based algorithms that have been implemented are the Algorithm Arnold Cat Map, Baker's Map, Ikeda Map, Tent Map, Logistic Map 3, Gauss Iterated Map, Henon Map, and Duffing Map Gingerbreadman Map. Of the many algorithms implemented previously in 2016 against the Logistic Map 3, Gauss Iterated Map, Henon Map, Duffing Map Gingerbreadman Map algorithms, comparisons and analysis of encryption time, decryption time, key sensitivity, histogram, lossy and lossless in the decrypted image have been carried out. In this study, the Tinkerbell Map algorithm was initiated to be implemented in image cryptography and compared to the Logistic Map 3 algorithm, Gauss Iterated Map, Henon Map, Duffing Map Gingerbreadman Map. Also added correlation coefficient analysis, MSE and PSNR analysis, to analyze the security of encrypted images. Based on testing of Logistic Map 3, Gauss Iterated Map, Henon Map, Duffing Map Gingerbreadman Map, Tinkerbell Map have different performance. The histogram analysis produces a very good spread of pixels, each algorithm has a different key sensitivity, the highest is the Tinkerbell Map. Henon Map is the best algorithm for correlation coefficient, MSE and PSNR. Time analysis found that the Tinkerbell Map algorithm has the longest process value, and the fastest is logistics map 3.

References
  1. I. A. Landge and B. Mishra, “Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. In: International Conference on Computational Intelligence, Communications,” in International Conference on Computational intelligence, Communications, and Business Analytics, 2017, pp. 567-581.
  2. H. E. H. Ahmed and A. H. Abd El-aziem, “Image Encryption Using Development of Chaotic Logistic Map Based on FeedBack Stream Cipher,” Recent Advances in Telecommunications, Informatics And Educational Technologies, 2014.
  3. H. Sarmah, M. Das, T. Baishya, and R. Raul, “Characterising Chaos in Gaussian Map,” International Journal of Advanced Scientific and Technical Research, 2016.
  4. M. Brindha and others, “Chaotic Image Encryption Using Double Stages of Diffusion,” in Internal Journal of Computational Intelligence & amp; IoT, vol. 2, no. 1, 2019.
  5. M. Suryadi dan T. Gunawan, “Aplikasi Enkripsi Citra Digital Menggunakan Algoritma Gingerbreadman Map,” Prosiding KOMMIT, 2014.
  6. E. Sukirman, M. Suryadi, and M. A. Mubarak, “The Implementation of Henon Map Algorithm for Digital Image Encryption,” Telkomnika, vol. 12, no. 3, 2014, p. 651.
  7. M. A. Rosy dan A. Juarna, “Analisis Lossy dan Lossless Untuk Dekripsi dan Histogram Lima Algoritma Enkripsi Berbasis Chaos,” Universitas Gunadarma, Depok, 2016.
  8. B. Stoyanov and K. Kordov, “Novel Secure Psedo-random Number Generation Scheme Based on Two Tinkerbell maps,” Advanced Studiesin Theoretical Physics, vol. 9, no. 9, 2015, pp. 411-421.
  9. Madhu, S. & Hussain, M., 'Performance and security analysis for image encryption using key image', Indian Journal of Science and Technology, 2015.
  10. R. D. Syah and R. J. Suhatril, “Digital Image Cryptography Using Combination of Arnold’s Cat Map and Bernoulli Map Based on Chaos Theory,” International Research Journal of Advanced Engineering and Science, 2019.
  11. A. Susanto, “Analisi Perbandingan Metode Perbaikan Kontras Citra pada Citra Medis Xray,” Jurnal SIMETRIS, vol. 7, no. 2, 2018.
  12. E. Ghys, “The Butterfly Effect,” in The Proceeding of the 12th International Congress on Mathematical Education, 2015, pp. 19-33.
  13. Yuan, S., Jiang, T. & Jing, Z, 'Bifurcation and chaos in the tinkerbell map', International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2011.
  14. Bagade, S. S. & Shandilya, V. K, 'Use of histogram equalization in image processing for image enhancement', International Journal of Software Engineering Research & Practices 1(2), 610, 2011.
  15. H. Kaur and N. Sohi. “A Study for Applications of Histogram in Image Enhancement.” The International Journal of Engineering and Science, vol. 6, issue 6, 2017, pp. 59-63.
Index Terms

Computer Science
Information Sciences

Keywords

Image Cryptographic Encryption Decryption Chaos Cryptographic Algorithms