CFP last date
20 June 2024
Reseach Article

Enhancing Image Security using Chaotic Map and Block Cipher

Published on August 2015 by Irene Getzi S, Minu Prabhakaran E. K., and Niviya C.n.
International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth
Foundation of Computer Science USA
ICFIDM2014 - Number 1
August 2015
Authors: Irene Getzi S, Minu Prabhakaran E. K., and Niviya C.n.
62fa875b-22a5-4de5-b66c-86fd1a886155

Irene Getzi S, Minu Prabhakaran E. K., and Niviya C.n. . Enhancing Image Security using Chaotic Map and Block Cipher. International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth. ICFIDM2014, 1 (August 2015), 24-26.

@article{
author = { Irene Getzi S, Minu Prabhakaran E. K., and Niviya C.n. },
title = { Enhancing Image Security using Chaotic Map and Block Cipher },
journal = { International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth },
issue_date = { August 2015 },
volume = { ICFIDM2014 },
number = { 1 },
month = { August },
year = { 2015 },
issn = 0975-8887,
pages = { 24-26 },
numpages = 3,
url = { /proceedings/icfidm2014/number1/21919-5014/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth
%A Irene Getzi S
%A Minu Prabhakaran E. K.
%A and Niviya C.n.
%T Enhancing Image Security using Chaotic Map and Block Cipher
%J International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth
%@ 0975-8887
%V ICFIDM2014
%N 1
%P 24-26
%D 2015
%I International Journal of Computer Applications
Abstract

We live in the era of information explosion and have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Data security and privacy are among top concerns for any business environments. As more and more security breaches happening all over the world in different forms as a threat to the information industry, the end user should have the protection and privilege of secured access. Chaos possesses many interesting properties, such as deterministic but random like complex behavior, high sensitivity to initial conditions and system parameters and long term unpredictability. This paper introduces a cellular automata based chaotic encryption scheme and the results are comparable with well-known AES block cipher algorithm.

References
  1. Pankesh et al. , Image Encryption Using Pixel Shuffling, International Journal of Advanced Research in Computer Science and Software Engineering 2(12),December - 2012, pp. 279-282
  2. Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, Multilevel Image Encryption, cryptography and security Journal, Cornell University, 2012.
  3. Yunpeng ZHANG, Wenquan LV, Renjie ZHAO, Ding YU, Research On Image Encryption Algorithm Based on Wavelet Transform, International Journal of latest research in science and technology, 2013.
  4. Somaya Al-Maadeed, Afnan Al-Ali, Turki Abdalla, A New Chaos-Based Image-Encryption and Compression Algorithm, Journal of Electrical and Computer Engineering, Volume 2012 (2012), Article ID 179693.
  5. Dr. Vivek Sharma, Hariom C. Agnihotri, Chetan H. Patil An Image Encryption and Decryption Techniques Using Two Chaotic Schemes, International Journal of Research in Advent Technology, Vol. 2, No. 2, February 2014 .
  6. Monisha Sharma et. al. , Image Encryption Techniques Using Chaotic Schemes: A Review , International Journal of Engineering Science and Technology, Vol. 2(6), 2010, 2359-2363 2010.
  7. Xiaopeng Wei — Bin Wang — Qiang Zhang — Chao Che, Image Encryption Based On Chaotic Map And Reversible Integer Wavelet Transform, Journal of ELECTRICAL ENGINEERING, VOL. 65, NO. 2, 2014, 90–96.
  8. Nidhi Sethi et. al, Novel Method of Image Encryption Using Logistic Mapping, International Journal of Computer Science Engineering (IJCSE), 2012.
  9. Shuiping Zhang, Huijune Luo, Journal of Multimedia, Vol 7, No 1 (2012), 66-73, Feb 2012, doi:10. 4304/jmm. 7. 1. 66-73
  10. Abir Awad, Abdelhakim Saadane, The Research of Image Encryption Algorithm Based on Chaos Cellular Automata, Proceedings of the World Congress on Engineering 2010 Vol IWCE 2010, June 30 - July 2, 2010, London, U. K.
  11. Alireza Jolfaei, Abdolrasoul Mirghadri, An Image Encryption Approach Using Chaos And Stream Cipher, Journal of Theoretical and Applied Information Technology, © 2005 - 2010 JATIT & LLS.
  12. Marina Jeaneth Machicao, Anderson G. Marco, Odemir M. Bruno, Chaotic Encryption Method Based on Life-Like Cellular Automata, Mathematics (Symmetric key) and Number Theory (AsymarXiv:1112. 6326v1, [math. DS] , Dec 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic Encryption Cellular Automata Aes Block Cipher Image Encryption Symmetric Key Cryptography