Skip to main content

Parallelization of Image Encryption Algorithm Based On Chaotic Neural Networks

  • Conference paper
  • First Online:
Artificial Intelligence and Soft Computing (ICAISC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9692))

Included in the following conference series:

  • 1162 Accesses

Abstract

In this paper the results of parallelizing an image encryption algorithm based on chaotic neural networks are presented. A data dependence analysis of loops is applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. As a result of this study, it is stated that the most time-consuming loops of the algorithm are suitable for parallelization. The efficiency measurements of a parallel algorithm working in standard modes of operation are shown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo, D., Cheng, L., Cheng, L.: A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intell. 10(1), 71–84 (1999)

    Article  Google Scholar 

  2. Chan, C., Cheng, L.: The convergence properties of a clipped hopfield network and its application in the design of keystream generator. IEEE Trans. Neural Netw. 12(2), 340–348 (2001)

    Article  Google Scholar 

  3. Rachel, M., Einat, K., Wolfgang, K.: Public channel cryptography by synchronization of neural networks and chaotic maps. Phys. Rev. Lett. 91(11), 118701/1–118701/4 (2003)

    Google Scholar 

  4. Karras, D., Zorkadis, V.: On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators. Neural Netw. 16(5), 899–905 (2003)

    Article  Google Scholar 

  5. Lian, S., Chen, G., Cheung, A., Wang, Z.: A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 627–632. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Xiao, D., Liao, X.-F.: A combined hash and encryption scheme by chaotic neural network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 633–638. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Yu, W., Cao, J.: Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4–5), 333–338 (2006)

    Article  MATH  Google Scholar 

  8. Lian, S.: A block cipher based on chaotic neural networks. Neurocomputing 72, 1296–1301 (2009)

    Article  Google Scholar 

  9. Lian, S., Chen, X.: Traceable content protection based on chaos and neural networks. Appl. Soft Comput. 11(7), 4293–4301 (2011)

    Article  Google Scholar 

  10. Fadil, T.A., Yaakob, S.N., Ahmad, R.B., Yahya, A.: A chaotic neural network-based encryption algorithm for MPEG-2 encoded video signal. Int. J. Artif. Int. Soft Comput. 3(4), 360–371 (2013)

    Article  Google Scholar 

  11. Bielecki, W., Burak, D.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 1(5), 125–133 (2006)

    Google Scholar 

  12. Beletskyy, V., Burak, D.: Parallelization of the IDEA algorithm. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635–638. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Burak, D.: Parallelization of encryption algorithm based on chaos system and neural networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2013, Part II. LNCS, vol. 8385, pp. 364–373. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  14. Burak, D.: Parallelization of a block cipher based on chaotic neural networks. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) Artificial Intelligence and Soft Computing. LNCS, vol. 9120, pp. 191–201. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  15. Burak, D.: Parallelization of an encryption algorithm based on a spatiotemporal chaotic system and a chaotic neural network. In: International Conference On Computational Science, ICCS 2015, Procedia Computer Science, vol. 51, pp. 2888–2892 (2015)

    Google Scholar 

  16. Bigdeli, N., Farid, Y., Afshar, K.: A novel image Encryption/Decryption scheme based on chaotic neural networks. Eng. Appl. Artif. Intell. 25, 753–765 (2012)

    Article  Google Scholar 

  17. Botmart, T., Niamsup, P.: Adaptive control and synchronization of the perturbed Chua’s system. Math. Comput. Simul. 75(1–2), 37–55 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  18. Lu, J., Chen, G., Zhang, S.: The compound structure of a new chaotic attractor. Chaos, Solitons Fractals 14, 669–672 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  19. Li, D., Yin, Z.: Connecting the Lorenz and Chen systems via nonlinear control. Commun. Nonlinear Sci. Numer. Simul. 14(3), 655–667 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  20. Masuda, N., Aihara, K.: Cryptosystems with discretized chaotic maps. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl. 49(1), 28–40 (2002)

    Article  MathSciNet  Google Scholar 

  21. Xiao, D., Liao, X., Wei, P.: Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5), 2191–2199 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  22. Wang, Y., Wong, K., Liao, X., Xiang, T., Chen, G.: A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4), 1773–1783 (2009)

    Article  MATH  Google Scholar 

  23. Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New User Interface for Petit and Other Extensions. User Guide (1996)

    Google Scholar 

  24. Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007)

    Google Scholar 

  25. OpenMP Application Program Interface. Version 4.0 (2013)

    Google Scholar 

  26. Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependencebased Approach. Morgan Kaufmann Publishers Inc, San Francisco (2001)

    Google Scholar 

  27. Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, Upper Saddle River (2006)

    MATH  Google Scholar 

  28. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, vol. 2. John Wiley & Sons, New York (1995)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dariusz Burak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Burak, D. (2016). Parallelization of Image Encryption Algorithm Based On Chaotic Neural Networks. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2016. Lecture Notes in Computer Science(), vol 9692. Springer, Cham. https://doi.org/10.1007/978-3-319-39378-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39378-0_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39377-3

  • Online ISBN: 978-3-319-39378-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics