CFP last date
20 May 2024
Reseach Article

Chaos Based Encryption and Decryption of Image and Video in Time and Frequency Domain

Published on December 2011 by Ajay Kumar Dubey, Chandra Kant Shukla
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 5
December 2011
Authors: Ajay Kumar Dubey, Chandra Kant Shukla
9b3bbf61-8586-475d-8cf4-5eab809d4f1b

Ajay Kumar Dubey, Chandra Kant Shukla . Chaos Based Encryption and Decryption of Image and Video in Time and Frequency Domain. Network Security and Cryptography. NSC, 5 (December 2011), 35-39.

@article{
author = { Ajay Kumar Dubey, Chandra Kant Shukla },
title = { Chaos Based Encryption and Decryption of Image and Video in Time and Frequency Domain },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 5 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 35-39 },
numpages = 5,
url = { /specialissues/nsc/number5/4356-spe058t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Ajay Kumar Dubey
%A Chandra Kant Shukla
%T Chaos Based Encryption and Decryption of Image and Video in Time and Frequency Domain
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 5
%P 35-39
%D 2011
%I International Journal of Computer Applications
Abstract

Encryption is one of the well known techniques to provide security in transmission of multimedia contents over the internet and wireless networks. The simplest way of encrypting multimedia content is to consider the three-dimensional image or video stream as a one dimensional stream and to encrypt the entire content using standard block ciphers like AES, DES, IDEA etc. But the main flaw of this approach is, it requires too much processing time. So here new method of encrypting the multi-media content is proposed. In the following chaotic map based encryption scheme, we propose the combination of two dimensional chaotic map and discrete cosine transform method for encryption of video data. The proposed encryption scheme is more secure. Since chaos possesses many interesting properties, such as deterministic but random-like complex temporal behavior, high sensitivity to initial conditions and ergodicity etc. These properties have been found to be very useful in cryptographic designs.

References
  1. C.Dongming, “A feasible chaotic encryption scheme for image”, International workshop on chaos-fractals theories and applications, IWCFTA-2009. IEEE2009
  2. Juan Li, Yong Feng, Xuqiang Yang, “Discrete chaotic based 3 D image encryption scheme”, National natural science foundation of china, IEEE2009
  3. T.J. Chuang, J.C. Lin, “New approach to image encryption, J. Electronic Imaging”, 1998, 7(2) pp..350-356.
  4. J.Fridrich. “ Symmetric ciphered based on two dimensional chaotic maps”, Int. J. Bifurcat Chaos, 1998, 8(6): pp. 318-325.
  5. G.Chen, Y. Mao, and C.K. Chui, “ A symmetric image encryption based on 3 D chaotic maos”, Chaos, Solutions and Fractals, 2004 21(3): pp.749-761.
  6. Pareek, N.K., V. Patidar, and K.K. Sud, “Image Encryption Using Chaotic Logistic Map”, Image and Vision Computing, 2006 24(9): pp. 926-934.
  7. H. Cheng, X.B. Li, “Partial encryption of compressed image and videos”, IEEE Trans. Signal Process. 2008 48(8): pp. 2439-2451.
  8. Chong Fu, Zhen-chuan Zhang , Ying-yu Cao. “ An improved image encryption algorithm based on chaotic maps” Third International Conference on Natural Computation. 2007, Vol. 13, pp.189-193.
  9. Di Xiao, X.F. Liao. “An analysis and improvement of a chaos based image encryption algorithm”. Chaos Solutionsand Fractals. 2009 vol.40, pp. 2191-2199.
  10. Z. Mingming, T. Xiaojun, “ A multiple chaotic encryption scheme for image” , 6 International Conference on Wireless and Communication (WICOM) 2010. 978-1-4244-3708-5.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos Permutation Confusion Diffusion Chaotic map