CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analysis of Statistical properties of Chaos based Image Encryption by Different Mappings

by Leyla Roohi, Subariah Ibrahim, Rezza Moieni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 20
Year of Publication: 2013
Authors: Leyla Roohi, Subariah Ibrahim, Rezza Moieni
10.5120/10214-5054

Leyla Roohi, Subariah Ibrahim, Rezza Moieni . Analysis of Statistical properties of Chaos based Image Encryption by Different Mappings. International Journal of Computer Applications. 62, 20 ( January 2013), 38-42. DOI=10.5120/10214-5054

@article{ 10.5120/10214-5054,
author = { Leyla Roohi, Subariah Ibrahim, Rezza Moieni },
title = { Analysis of Statistical properties of Chaos based Image Encryption by Different Mappings },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 20 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number20/10214-5054/ },
doi = { 10.5120/10214-5054 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:12:25.851660+05:30
%A Leyla Roohi
%A Subariah Ibrahim
%A Rezza Moieni
%T Analysis of Statistical properties of Chaos based Image Encryption by Different Mappings
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 20
%P 38-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Chaos mappings attracted a lot of research in recent years because of good properties of chaos maps in terms of continuous broad band power spectrums, sensitivity to initial conditions and similarity to random behavior. Many different scheme and algorithms have proposed in image encryption by chaos maps as well as different mappings. Not only can the structure of algorithm effect on statistical properties of image encryption, but also different chaos maps can, because of different dynamical properties. PWLCM has attracted a lot of research on recent years regarding good dynamical properties. In following sections, the statistical properties of Yoon algorithm [7] will analysis with PWLCM to conclude better statistical properties and better key space.

References
  1. Scharinger, J. 1994. Fast encryption of image data using chaotic Kolmogorov. ows. J Electron Imaging 1998;7(2):318–25 Schuneier. Applied Cryptography. New York: John Wiley, 347~374.
  2. Fridrich, J. 1998. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos, 8(6):1259–84.
  3. Mao, Y and Chen, G,. and Lian, S. 2004. A Novel Fast Image Encryption Scheme based on 3D Chaotic Baker maps. Int J Bifurc Chaos, 14(10):3613–24.
  4. Fu, C. , Lin, B. , Miao, Y. , Liu, X. , & Chen, J. (2011). A Novel Chaos-Based Bit-level Permutation Scheme for Digital Image Encryption. Optics Communications, 284(23), 5415–5423. doi:10. 1016/j. optcom. 2011. 08. 013
  5. Arroyo, D. , Alvarez, G. , Fernandez, V. , & May, C. D. (n. d. ). On the inadequacy of the logistic map for cryptographic applications, 1–6.
  6. Lasota, A. and Mackey, M. C. 1997. Chaos, fractals, and noise. Stochastic aspects of dynamics. Springer-Verlag, New York, 2nd Ed. , 1997.
  7. Yoon, J. W. , & Kim, H. 2010. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 15(12), 3998–4006. doi:10. 1016/j. cnsns. 2010. 01. 041
  8. Zhou, H. 1996, "A Design Methodology of Chaotic Stream Ciphers and the Realization Problems in Finite Precision," phd thesis, department of electrical Engineering, Fudan university, Shanghai China, 1996.
  9. Li, S. , Mou, S. , Cai ,J. , Z. Ji, J. and Zhang, 2003. On the Security of a Chaotic Encryption Scheme: Problem with Computerized Chaos in chaos computerized precision . Comput. Phys. Commun. 153. 52.
  10. Huang, F, Guan, F. Z. ,2005. A Modified Method of a Class of Recently Presented Cryptosystems. Chaos Solitons Fractals 23 1893.
  11. Awad, A. , & Saadane, A. 2010. New Chaotic Permutation Methods for Image Encryption, (November).
  12. Socek, D. , Shujun Li, Magliveras, S. S. And Furht, B. 2005. Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 406-407.
  13. Li, S. , Chen, G. , & Mou, X. 2005. on the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151. doi:10. 1142/S0218127405014052
  14. Heidari-Bateni, G. & McGillem, C. D. 1994 "A chaotic direct-sequence spread-spectrum communication system," IEEE Trans. Communications 42, 1524–1527.
Index Terms

Computer Science
Information Sciences

Keywords

chaos map PWLCM image encryption