CFP last date
20 May 2024
Reseach Article

A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction

by Prabhudev Jagadeesh, P. Nagabhushan, R. Pradeep Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 4
Year of Publication: 2013
Authors: Prabhudev Jagadeesh, P. Nagabhushan, R. Pradeep Kumar
10.5120/13481-1181

Prabhudev Jagadeesh, P. Nagabhushan, R. Pradeep Kumar . A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction. International Journal of Computer Applications. 78, 4 ( September 2013), 38-45. DOI=10.5120/13481-1181

@article{ 10.5120/13481-1181,
author = { Prabhudev Jagadeesh, P. Nagabhushan, R. Pradeep Kumar },
title = { A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 4 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number4/13481-1181/ },
doi = { 10.5120/13481-1181 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:51.065906+05:30
%A Prabhudev Jagadeesh
%A P. Nagabhushan
%A R. Pradeep Kumar
%T A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 4
%P 38-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital images cover the major portion of data that is being exchanged over communication network. When digital images are personal or confidential a high level security has to be provided. Traditional Encryption which is normally used to disguise data making it unintelligible to unauthorized observers do not consider the inherent features of images and thus is not considered to be highly effective with regard to computational complexity and also the security level enforced on images. This paper presents a new concept for image scrambling by applying pixel permutation and pixel substitution on an image split into irregular trapezoidal grids. Pixel permutation is performed using Arnold's 2-D cat map which will disarray the pixels. Then substitution is performed employing a distinctive feature that the key for substitution process for pixels are derived from the properties of the trapezoidal grid to which the pixel belongs. Thus pixels mapped to various grids will have different noise induction thus providing high level security. The entire process of pixel permutation and substitution is repeated for several iterations to provide higher level security. The experimental results show that the proposed algorithm can successfully scramble the images, and the security analysis of the algorithm also demonstrates that the proposed scheme can withstand various cryptanalytic and statistical attacks.

References
  1. Yuan-Hui Yu, Chin-Chen Chang and Iuon-Chang Lin. 2007. A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding, Volume 107, Issue 3.
  2. Furht, Kirovsk. 2005. Multimedia Security Handbook. CRC press.
  3. Alireza Jolfaei, Abdolrasoul Mirghadri. 2010. Survey: Image Encryption Using Salsa20. International Journal of Computer Science Issues, Vol. 7, Issue 5, 213-220.
  4. S. Li, C. Li, G. Chen, N. G. Bourbakis, and K. T. Lo. 2008. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication, vol. 23, no. 3, 212–223.
  5. T. Xiang, X. Liao, G. Tang, Y. Chen, and K. W. Wong. 2006. A novel block cryptosystem based on iterating a chaotic map. Physics Letters, Section A, vol. 349, 109–115.
  6. Prabhudev Jagadeesh, P. Nagabhushan, R. Pradeep Kumar. 2013. A Novel Image Scrambling Technique Based On Information Entropy And Quad Tree Decomposition. International Journal of Computer Science issues, Volume 10, Issue 2, No. 1.
  7. Ye Liu,, Junlei Lin, Jinghui Fan, Nanrun Zhou. 2012. Image Encryption Based on Cat Map and Fractional Fourier Transform, Journal of Computational Information Systems, 7485–7492.
  8. Qian Li, Yang Wang. 2011. The performance analysis of image encryption algorithm based on chaotic system. International conference on Electronic and Mechanical Engineering and Information, Volume 7, 3492-3494.
  9. G. Zhang and Q. Liu. 2011. A novel image encryption method based on total shuffling scheme, Optics Communications, vol. 284, no. 12, 2775–2780.
  10. Zhu, W. Zhang, K. -W. Wong, and H. Yu. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, vol. 181, no. 6, 1171–1186.
  11. Yicong Zhou, Karen Panetta, Sos Agaian. 2009. Image Encryption Based on Edge Information. Proceedings of SPIE-IS&T Electronic Imaging.
  12. Pichler, F and Scharinger, J. 1996. Finite dimensional generalized Baker dynamical systems for cryptographic applications. Proceedings of 5th International Workshop on Computer Aided Systems Theory, Lecture Notes in Computer Science, Vol. 1030, 465–476.
  13. Scharinger, J. 1997. Fast encryption of image data using chaotic Kolmogorov flows in Storage and Retrieval for Image and Video Databases. Proceeding SPIE, Vol. 3022, 278–289.
  14. Fridrich, J. 1997. Image encryption based on chaotic maps. In Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Vol. 2, 1105–1110.
  15. Fridrich, J. 1997. Secure image ciphering based on chaos, Technical Report RL-TR-97-155, The Information Directorate of the Air Force Research Laboratory, New York.
  16. Fridrich J. 1998. Symmetric ciphers based on two dimension chaotic maps. International Journal of Bifurcation and Chaos, 1259 – 1284.
  17. Scharinger, J. 1998. Secure and fast encryption using chaotic Kolmogorov flows. In Proceedings of IEEE Information Theory Workshop, 124–125.
  18. N. K. Pareek, Vinod Patidar, K. . K. Sud. 2006. Image encryption using chaotic logistic map. Image and Vision Computing 24, 926–934
  19. G. Chen, Y. Mao, C. K. Chui. 2004. A symmetric image encryption based on 3D chaotic maps, Chaos Solitons Fractals 21, 749–761.
  20. Lizhen Chen. 2012. A Novel Image Encryption Scheme Based on Hyperchaotic Sequences. Journal of Computational Information Systems. 4159 – 4167.
  21. H. Gao, Y. Zhang, S. Liang, and D. Li. 2006. A new chaotic algorithm for image encryption, Chaos. Solitons & Fractals, vol. 29, no. 2, 393–399.
  22. Gonzalez, R. C. , R. E. Woods, S. L. Eddins. 2007. Digital Image Processing, Second Edition, Prentice Hall.
  23. Shiguo Lian. 2009. Multimedia Content Encryption: Techniques and Applications, CRC Press.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Scrambling Chaotic map 2-D cat map Image histogram Image correlation Entropy.