Advertisement

Enhanced Digital Image Encryption Using Sine Transformed Complex Chaotic Sequence

  • Vimal GaurEmail author
  • Rajneesh Kumar Gujral
  • Anuj Mehta
  • Nikhil Gupta
  • Rudresh Bansal
Conference paper
  • 8 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1164)

Abstract

In order to increase the chaotic behaviour of the equation and to get better results than existing encryption methods, we have found a new chaotic equation, namely STLS. The chaotic map generated from STLS (as shown in Fig. 1) manifests convoluted behaviour in the entire range of parameters, and their output states scattered randomly and completely over the entire 2-D plane, which points out that they have an enhanced hyper-chaotic behaviour and shows highly random behaviour. For increasing the key space, our proposed encryption scheme uses effective scrambling and diffusion. Also, simulation results such as average entropy of encrypted image (7.9993) and NBCR (0.50005) show that our proposed algorithm is reliable and provides a high level of security.

Keywords

Chaotic STLS Image encryption Scrambling and diffusion Entropy 

References

  1. 1.
    Y. Zhou, L. Bao, C.L.P. Chen, Image encryption using a new parametric switching chaotic system. Sig. Process. 93, 3039–3052 (2013).  https://doi.org/10.1016/j.sigpro.2013.04.021
  2. 2.
    X. Huang, G. Ye, An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia Tools Appl. 72, 57–70 (2014).  https://doi.org/10.1007/s11042-012-1331-6CrossRefGoogle Scholar
  3. 3.
    W. Liu, K. Sun, C. Zhu, A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016).  https://doi.org/10.1016/j.optlaseng.2016.03.019CrossRefGoogle Scholar
  4. 4.
    L. Xu, Z. Li, J. Li, W. Hua, A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016).  https://doi.org/10.1016/j.optlaseng.2015.09.007CrossRefGoogle Scholar
  5. 5.
    N. Zhou, S. Pan, S. Cheng, Z. Zhou, Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 82, 121–133 (2016).  https://doi.org/10.1016/j.optlastec.2016.02.018CrossRefGoogle Scholar
  6. 6.
    J. Lu, O. Dunkelman, N. Keller, J. Kim, New impossible differential attacks on AES, in Proceedings of the Progress in Cryptology-INDOCRYPT (Springer, Berlin, 2008).  https://doi.org/10.1007/978-3-540-89754-5_22, pp. 279–293
  7. 7.
    S. Zhu, C. Zhu, W. Wang, A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20, 716 (2018).  https://doi.org/10.3390/e20090716CrossRefGoogle Scholar
  8. 8.
    Z. Hua, Y. Zhou, H. Huang, Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2018).  https://doi.org/10.1063/1.4936322CrossRefGoogle Scholar
  9. 9.
    G. Alvarez, S. Li, Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16, 2129–2151 (2006).  https://doi.org/10.1142/S0218127406015970
  10. 10.
    J.C.H. Castro, J.M. Sierra, A. Seznec, A. Izquierdo, A. Ribagorda, The strict avalanche criterion randomness test. Math. Comput. Simul. 68, 1–7 (2005).  https://doi.org/10.1016/j.matcom.2004.09.001MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Y. Wu, J.P. Noonan, S. Agaian, NPCR and UACI randomness tests for image encryption. Cyber J. Multidisci. J. Sci. Technol. J. Select. Areas Telecommun. (JSAT) 31–38 (2011)Google Scholar
  12. 12.
    H.H. Abdlrudha, Q. Nasir, Low complexity high security image encryption based on nested PWLCM chaotic map, in IEEE International conference for Internet Technology and Secure Transactions (2011), pp. 220–225Google Scholar
  13. 13.
    M.B. Hossain, M.T. Rahman, A.B.M.S. Rahman, S. Islam, A new approach of image encryption using 3D chaotic map to enhance security of multimedia component, in International Conference on Informatics, Electronics & Vision (ICIEV) (2014).  https://doi.org/10.1109/iciev.2014.6850856, pp. 1–6
  14. 14.
    H. Al-Najjar, Digital image encryption algorithm based on a linear independence scheme and the logistic map, in Proceedings of ACIT (2011)Google Scholar
  15. 15.
    M. Khan, H.M. Waseem, A novel image encryption scheme based on quantum dynamical spinning and rotations. Plos One 13 (2018).  https://doi.org/10.1371/journal.pone.0206460
  16. 16.
    L. Min, T. Li, A chaos–based data encryption algorithm for image/video, in International Conference on Multimedia and Information Technology (2010).  https://doi.org/10.1109/mmit.2010.27, pp. 172–175
  17. 17.
    Y. Zhou, L. Bao, C.L.P. Chen, A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014).  https://doi.org/10.1016/j.sigpro.2013.10.034CrossRefGoogle Scholar
  18. 18.
    Z.L. Zhu, W. Zhang, K.-W. Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181, 1171–1186 (2011).  https://doi.org/10.1016/j.ins.2010.11.009CrossRefGoogle Scholar
  19. 19.
    A.A. Karawia, Encryption algorithm of multiple-image using mixed image elements and two dimensional chaotic economic map. Entropy 20, 801 (2018).  https://doi.org/10.3390/e20100801CrossRefGoogle Scholar
  20. 20.
    A. Srivastava, A survey report on different techniques of image encryption. Int. J. Emerg. Technol. Adv. Eng. 2, 163–167 (2012)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Vimal Gaur
    • 1
    Email author
  • Rajneesh Kumar Gujral
    • 2
  • Anuj Mehta
    • 1
  • Nikhil Gupta
    • 1
  • Rudresh Bansal
    • 1
  1. 1.Computer Science and Engineering DepartmentMSITDelhiIndia
  2. 2.Computer Science and Engineering DepartmentM.M. Engineering CollegeMullanaIndia

Personalised recommendations