CFP last date
22 April 2024
Reseach Article

A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices

by Sodeif Ahadpour, Yaser Sadra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 2
Year of Publication: 2012
Authors: Sodeif Ahadpour, Yaser Sadra
10.5120/7599-0311

Sodeif Ahadpour, Yaser Sadra . A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices. International Journal of Computer Applications. 49, 2 ( July 2012), 15-18. DOI=10.5120/7599-0311

@article{ 10.5120/7599-0311,
author = { Sodeif Ahadpour, Yaser Sadra },
title = { A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 2 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number2/7599-0311/ },
doi = { 10.5120/7599-0311 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:16.359878+05:30
%A Sodeif Ahadpour
%A Yaser Sadra
%T A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 2
%P 15-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this letter, after reviewing the main points of the chaotic trigonometric maps and the coupled map lattices, we introduce the scheme of chaos-based image encryption based on coupled map lattices. The scheme decreases periodic effect of the ergodic dynamical systems in the chaos-based image encryption. To evaluate the security of the encrypted image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.

References
  1. Ahadpour S. , Sadra Y. , "Randomness criteria in binary visibility graph and complex network perspective" Information Sciences, 197, pp. 161–176, 2012.
  2. Guo X. , Zhang J. , "Secure group key agreement protocol based on chaotic Hash," Information Sciences, 1180, pp. 4069–4074, 2010.
  3. Liu S. , Long Y. , Chen K. , "Key updating technique in identity-based encryption," Information Sciences, 181, pp. 2436–2440, 2011.
  4. Weng J. , Yao G. , Deng R. H. , Chen M. , Li X. , "Cryptanalysis of a certi?cateless signcryption scheme in the standard model," Information Sciences, 181, pp. 661–667, 2012.
  5. Pareek N. K. , Patidar V. , Sud K. K. , "Image encryption using chaotic logistic map," Image and Vision Computing, 24, pp. 926–934, 2006.
  6. Ahadpour S. , Sadra Y. , ArastehFrad Z. , "A Novel Chaotic Image Encryption using Generalized Threshold Function" International Journal of Computer Applications, 42(18), pp. 25-31, 2012.
  7. Abugharsa A. B. , Bin Hasan Basari A. S. , Almangush H. , "A New Image Encryption Approach using The Integration of A Shifting Technique and The Aes Algorithm" International Journal of Computer Applications, 42(9), pp. 38-45, 2012.
  8. Pandey U. , Manoria M. , Jain J. , "A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation" International Journal of Computer Applications, 42(1), pp. 9-15, 2012.
  9. Jafarizadeh M. A. , Foroutan M. , Ahadpour S. , "Hierarchy of rational order families of chaotic maps with an invariant measure," Pramana-journal of physics, 67, pp. 1073-1086, 2006.
  10. Kanso A. , Smaoui N. , "Logistic chaotic maps for binary numbers generations," Chaos, Solitons and Fractals, 40, pp. 2557-2568, 2009.
  11. Behnia S. , Akhshani A. , Ahadpour S. , Mahmodi H. , Akhavan A. , " A fast chaotic encryptions cheme based on piece wise nonlinear chaotic maps," Physics Letters A, 366, pp. 391–396, 2007.
  12. Chen G. , Mao Y. , Chui C. K. , "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos Solitons Fractals, 21, pp. 749-761, 2004.
  13. Maniyath Sh. R. and Supriya M. , "An Uncompressed Image Encryption Algorithm Based on DNA Sequences," Computer Science and Information Technology, pp. 258–270, 2011.
  14. Smaoui N. , Kostelich E. , "Using chaos to shadow the quadratic map for all time," Int J Comput Math. , 70 pp. 117-129, 1998.
  15. Zhou Q. , Wong K. W. , Liao X. , Xiang T. , Hu Y. , "Parallel image encryption algorithm based on discretized chaotic map," Chaos Solitons Fractals, 38 pp. 1081-1092, 2008.
  16. Kandar S. , Maiti A. , Dhara B. C. , "Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking," IJCSI International Journal of Computer Science Issues, 8, pp. 543-549, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

function Image encryption Coupled map lattice Chaotic trigonometric map