Skip to main content

A Novel Image Encryption and Authentication Scheme Using Chaotic Maps

  • Conference paper
Book cover Advances in Intelligent Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 320))

Abstract

The paper presents an amalgam approach for image encryption and authentication. An ideal image cipher should be such that any adversary cannot modify the image and if any modifications are made, can be detected. The proposed scheme is novel and presents a unique approach to provide two level security to the image. Hashing and two chaotic maps are used in the algorithm where hash of the plain image is computed and the image is encrypted using key dependent masking and diffusion techniques. Initial key length is 132-bits which is extended to 148-bits. Performance and security analysis show that the proposed scheme is secure against different types of attacks and can be adopted for real time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sinha, A., Singh, K.: A technique for image encryption using digital signature. Optics Communications 1, 229–234 (2003)

    Article  Google Scholar 

  2. Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering 51(6), 665–673 (2013)

    Article  Google Scholar 

  3. Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  4. Kwok, H.S., Tang, W.K.S.: A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals 32, 1518–1529 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  5. Shateesh Sam, I., Devraj, P., Bhuvaneshwaran, R.S.: A novel image cipher based on transformed logostic maps. Springer Science + Business Media, LLC (2010)

    Google Scholar 

  6. Qiu, J., Wang, P.: An image encryption and authentication scheme. In: 2011 Seventh International Conference on Computational Intelligence and Security (CIS), December 3-4, pp. 784–787. IEEE (2011)

    Google Scholar 

  7. Sabery, M., Yaghoobi, M.: A New Approach for Image encryption using Chaotic logistic map. 978-0-7695-3489-3/08 ©. IEEE (2008)

    Google Scholar 

  8. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurcat. Chaos. 14, 3613–3624 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  9. Matthew, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 8(1), 29–42 (1989)

    Article  Google Scholar 

  10. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)

    Article  Google Scholar 

  11. Pareek, N.K., Patidar, V., Sud, K.K.: Diffusion-Substitution bsed gray image encryption scheme. Digital Signal Processing 23(3), 894–901 (2013)

    Article  MathSciNet  Google Scholar 

  12. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372, 5973–5978 (2008)

    Article  MATH  Google Scholar 

  13. Sun, F., Liu, S., Li, Z., Lu, Z.: A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38, 631–640 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  14. Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Physics Letters A 372, 394–400 (2008)

    Article  MATH  Google Scholar 

  15. Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67, 2411–2417 (2012)

    Article  Google Scholar 

  16. Wei, X., Guo, L., Zhanga, Q., Zhang, J., Lian, S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. The Journal of Systems and Software 85, 290–299 (2011)

    Article  Google Scholar 

  17. Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52, 2028–2035 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  18. Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 69, 1995–2007 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amitesh Singh Rajput .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rajput, A.S., Sharma, M. (2015). A Novel Image Encryption and Authentication Scheme Using Chaotic Maps. In: El-Alfy, ES., Thampi, S., Takagi, H., Piramuthu, S., Hanne, T. (eds) Advances in Intelligent Informatics. Advances in Intelligent Systems and Computing, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-319-11218-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11218-3_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11217-6

  • Online ISBN: 978-3-319-11218-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics