Skip to main content
Log in

Chaos based cryptosystem for still visual data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recent years have witnessed a strong relationship between chaos and cryptography. Owing to this relationship, development in one field directly impacts the other field. High computational resources are consumed in re-designing of the complete cryptosystem due to a newly developed chaotic map. Also, the tools developed to discern chaos leads to easy cryptanalysis of chaotic cryptosystems. To save resources and overcome easy cryptanalysis, this paper proposes a spatial domain based chaotic cryptosystem that employs different chaotic maps during permutation-substitution process. Multiple iterations have been performed to achieve resistance against various cryptanalytic and error function attacks, that are specifically designed for chaos based cryptosystems. The proposed technique has been generalized and verified for different chaotic maps. A significant benefit of the proposed cryptosystem is its support for chaotic system free property, which allows replacement of an existing chaotic map with a different map at a later stage. Thorough performance, security and comparative analysis ascertains efficacy of the proposed technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Álvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14:3743–3749

    Article  Google Scholar 

  2. Álvarez G, Montoya F, Romeraa M, Pastor G (2000) Cryptanalysis of a chaotic encryption system. Phys Lett A 276:191–196

    Article  MathSciNet  MATH  Google Scholar 

  3. Álvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys Lett A 319:334–339

    Article  MathSciNet  MATH  Google Scholar 

  4. Behnia S, Akhsani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366(4–5):391–396

    Article  Google Scholar 

  5. Bose R, Pathak S (2006) A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circuits Syst I 53(4):848–857

    Article  MathSciNet  Google Scholar 

  6. Chang W-D (2009) Digital secure communication via chaotic systems. Digit Signal Process 19(4):693–699

    Article  Google Scholar 

  7. Chen G, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 12:749–761

    Article  MathSciNet  Google Scholar 

  8. Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I, Fundam Theory Appl 48(12):1498–1508

    Article  MathSciNet  MATH  Google Scholar 

  9. Dachselt F, Kelber K, Schwarz W, Vundewalle J (1998) Chaotic versus classical stream ciphers—a comparative study, vol IV. In: Proc. int. symp. circuits syst., Monterey, CA, USA, pp 518–521

  10. El-Bakary EM, Zahran O, El-Dolil SA, Abd El-Samie FE (2009) Chaotic maps: a tool to enhance the performance of OFDM systems. Int J Commun Netw Inf Secur 1(2):54–58

    Google Scholar 

  11. Guan Z-H, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153–157

    Article  MATH  Google Scholar 

  12. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77

    Article  MATH  Google Scholar 

  13. Johnson M, Ishwar P, Prabhakaran V, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10, Part 2):2992–3006

    Article  MathSciNet  Google Scholar 

  14. Li S, Mou X, Cai Y (2001) Improving security of chaotic encryption approach. Phys Lett A 290:127–133

    Article  MathSciNet  Google Scholar 

  15. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: Proc. IEEE international symp. circuits syst., Arizona, vol 2, pp 708–711

  16. Li S, Li C, Lo K-T, Chen G (2006) Cryptanalysis of an image encryption scheme. J Electron Imaging 15(4), article number 043012

  17. Li S, Li C, Chen G, Bourbakis NG, Lo K-T (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process, Image Commun 23(3):212–223

    Article  Google Scholar 

  18. Marion A (1991) An introduction to image processing. Chapman and Hall, London

    Google Scholar 

  19. Norcen R, Podesser M, Pommer A, Schmidt H-P, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(7):277–292

    Article  Google Scholar 

  20. Peterson G (1997) Arnold’s cat map. Available from http://online.redwoods.cc.ca.us/instruct/darnold/maw/catmap3.htm

  21. Pommer A, Uhl A (2002) Application scenarios for selective encryption of visual data. In: Dittmann J, Fridrich J, Wohlmacher P (eds) Multimedia and security wkshp., ACM Multimedia, pp 71–74

  22. Schonberg D, Draper SC, Yeo C, Ramchandran K (2008) Toward compression of encrypted images and video sequences. IEEE Trans Inf Forensics Secur 3(4):749–762

    Article  Google Scholar 

  23. Sun F, Liu S, Li Z Lu Z (2008) A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38:631–640

    Article  MathSciNet  MATH  Google Scholar 

  24. Uhl A, Pommer A (2005) Application scenarios for the encryption of visual data. In: Image and video encryption from digital rights management to secured personal communication, vol 15. Advances in inform. security. Springer, Berlin, pp 31–43

    Google Scholar 

  25. Wang X, Zhan M, Lai C-H, Gang H (2004) Error function attack of chaos synchronization based encryption schemes. Chaos (American Institute of Phyics) 14(1):128–137

    Google Scholar 

  26. Wong K-W, Sin-Hung Kwok B, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652

    Article  MATH  Google Scholar 

  27. Xing-Yuan W, Qing Y (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574–581

    Article  MathSciNet  MATH  Google Scholar 

  28. Yang H, Liao X, Wong K-w, Zhang W, Wei P (2009) A new cryptosystem based on chaotic map and operations algebraic. Chaos Solitons Fractals 40(5):2520–2531

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nidhi Taneja.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Taneja, N., Raman, B. & Gupta, I. Chaos based cryptosystem for still visual data. Multimed Tools Appl 61, 281–298 (2012). https://doi.org/10.1007/s11042-011-0837-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0837-7

Keywords

Navigation