Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Chaotic Image Encryption Standard (CIES)

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 57 - Number 8
Year of Publication: 2012
Authors:
Akhil Kaushik
Satvika
Manoj Barnel
10.5120/9138-3354

Akhil Kaushik, Satvika and Manoj Barnel. Article: Chaotic Image Encryption Standard (CIES). International Journal of Computer Applications 57(8):46-49, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Akhil Kaushik and Satvika and Manoj Barnel},
	title = {Article: Chaotic Image Encryption Standard (CIES)},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {57},
	number = {8},
	pages = {46-49},
	month = {November},
	note = {Full text available}
}

Abstract

With the fast progression of data exchange in an electronic way, information security is becoming more important in data storage and transmission. Because of widely usage of images in industrial process, it is important to protect the confidential image data from unauthorized access. Security of these images while transferring over the internet happens to be more critical, when they are confidential weapon photographs, clandestine military data, furtive architectural designs of financial buildings and top-secret war plan designs, etc. In this paper, we have proposed a new partial symmetric-key based block cipher to meet the special requirements of secure image transfer. The performance of this algorithm is discussed against common attacks such as the brute-force attack, ciphertext attacks and plaintext attacks. The analysis and experimental results show that the proposed algorithms can fully encrypt all types of images. This makes them suitable for securing multimedia applications and shows they have the potential to be used to secure communications in a variety of wired/wireless scenarios and real-time application such as mobile phone services.

References

  • Zhang S. and M. A. Karim, pp. 318-322, Vol. 21, No. 5, June 5 1999, Color image encryption using double random phase encoding, Microwave and optical technology letters.
  • Li C. et. al. , pp. 1371–1381, 2009, On the security defects of an image encryption scheme, Image and Vision Computing.
  • Lukac R. , Plantaniotis N. K. , pp. 454-464, 2005, A cost-effective encryption scheme for color images, Science Direct real time imaging.
  • Shujun L. and Zheng X. , pp. 708-711, Vol. 2, 2002, Cryptanalysis of a chaotic image encryption method, Inst. of Image Process. Xi'an Jiaotong Univ. Shaanxi, IEEE International Symposium.
  • Maniccam S. S and Bourbakis N. G. , pp. 1229-1245, 2001, Lossless image compression and encryption using SCAN, Pattern Recognition.
  • Pareek N. , Patidar V. and Sud K. , pp. 926–934, 2006, Image encryption using chaotic logistic map, Image and Vision Computing 24 (9).
  • Guo J. I. and Yen J. C. , 2008, A new mirror-like image encryption algorithm and its VLSI architecture, Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
  • Schneier B. , 1994, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc. , New York, USA.
  • Dang P. P. and Chau P. M. , pp. 395~403, 2000, Image encryption for secure Internet multimedia applications, IEEE Transactions on Consumer Electronics, 46(8).
  • Menezes A. J. , Oorschot P. C. V. , and Vanstone S. A. , 1997, Handbook of Applied Cryptography. New York: CRC Press, Inc.
  • Ashtiyani M. , Birgani P. M. and Hosseini H. M. , pp. 1-5, 2008, Chaos-based medical image encryption using symmetric cryptography, 3rd International conference on Information and Communication Technologies: From theory to applications ICTTA 2008.
  • Stallings W. , Nov 2005, Cryptography and Network Security: Principles and Practice, Prentice Hall (4th edn. ), Inc. , New York, USA.
  • Cheng L. K. , Dec 2003, Computer Cryptography – Data Privacy and Security in Computer Network. Tsinghua University Press (3rd edn. ), Inc. , Beijing China.
  • Gary K. , An Overview of Cryptography, an article available at www. garykessler. net/library/crypto. html.