Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 5
Year of Publication: 2013
Authors:
Osama M. Abu Zaid
Nawal A. El-fishawy
E. M. Nigm
Osama S. Faragallah
10.5120/9925-4549

Osama Abu M Zaid, Nawal A El-fishawy, E M Nigm and Osama S Faragallah. Article: A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security. International Journal of Computer Applications 61(5):29-39, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Osama M. Abu Zaid and Nawal A. El-fishawy and E. M. Nigm and Osama S. Faragallah},
	title = {Article: A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {5},
	pages = {29-39},
	month = {January},
	note = {Full text available}
}

Abstract

In this paper, a proposed encryption scheme based on Henon chaotic system (PESH) is presented in order to meet the requirements of secure image transfer. Scheme based on Henon chaotic system by Chen Wei-bin et al. , will be designated here as (SHCH). SHCH and a proposed encryption scheme (PESH) are applied for encrypting by changing the values of the image pixels. Combination of shuffling the positions and changing the values of image pixels is introduced to shuffle the relationship between the cipher-image and the plain-image. First, the Arnold Cat map or Baker chaotic map is used to shuffle the positions of the image pixels. Second, the shuffled-image is encrypted by using SHCH or a proposed (PESH) pixel by pixel. All of these procedures for encrypting are used with four modes of operations ECB, CBC, CFB, and OFB. The results of several experimental, statistical analysis, key sensitivity tests, NPCR and UACI analysis, and time analysis show that, a proposed image encryption scheme (PESH) alone or combined with whatever of confusion algorithms Arnold Cat map or Baker chaotic map, is the best scheme and provides an efficient and secure way for image encryption.

References

  • N. k. Pareek, Vinod Patidar, K. K. Sud. 2006. Image Encryption Using Chaotic Logistic Map. Image and Vision Computing 24, 926-934.
  • E. Petrisor. Oct. 2003. Entry and exit sets in the dynamics of area preserving Henon map. Chaos, Solitons and Fractals, pp. 651–658.
  • L. Guo-hui, Z. Shi-ping, X. De-ming, L. Jian-wen. Dec. 2001. An Intermittent Linear Feedback Method for Controlling Henon-like Attractor. Journal of Applied Sciences, pp. 288–290.
  • Chen Wei-bin, Zhang Xin. 2009. Image Encryption Algorithm Based on Henon Chaotic System. 978-1-4244-3986-7/09/$25. 00 © IEEE.
  • Z. -H. Guan, F. Huang, W. Guan. Aug. 2005. Chaos-based image encryption algorithm. Physics Letters A 346, pp. 153–157.
  • Zhenwei Shang, Honge Ren, Jian Zhang. 2008. A Block Location Scrambling Algorithm of Digital Image Based on Arnold Transformation. the 9th International Conference for Young Computer Scientists, 978-0-7695-3398-8/08/$25. 00 © IEEE.
  • Zhu Liehuang, Li Wenzhuo, Liao Lejian, Li Hong. 2006. A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), 0-7695-2745-0/06 $20. 00 © IEEE.
  • Jiri Fridrich. 1998. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, Vol. 8, No. 6 , 1259-1284.
  • Nawal El-Fishawy, Osama M. Abu Zaid. Nov. 2007. Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security, 5(3) : 241–251.
  • Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. August 20, 1998. The RC6TM Block Cipher. M. I. T. Laboratory forComputer Science, 545 Technology Square, Cambridge, MA 02139, USA,v1. 1.
  • H. H. Nien, S. K. Changchien, S. Y. Wu, and C. K. Huang. 2008. A New Pixel- Chaotic- Shuffle Method for Image Encryption. ICARCV, Hanoi, Vietnam, December 2008, and 978-1-4244-2287-6/08 © IEEE.