Skip to main content

Quality Analysis of a Chaotic and Hopping Stream Based Cipher Image

  • Conference paper
Advances in Computer Science and Information Technology (CCSIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 131))

  • 1057 Accesses

Abstract

This paper is devoted to the analysis of the impact of chaos-based techniques on stream ciphers. The chaos based cryptographic algorithm has suggested a new and efficient ways to develop secure image encryption technique. In this paper, the keys are generated by four different chaotic maps. Based on the initial conditions, each map may produce various random numbers from various orbits of the maps. Among those random numbers, a particular number and from a particular orbit are selected as a key for the encryption algorithm. Based on the key, a binary sequence is generated to control the encryption algorithm. The input image of 2-D is transformed into a 1- D array by using scanning pattern and then divided into various sub blocks. Then the position permutation and value permutation is applied to each binary matrix based on chaos maps. Cryptanalysis proves that among various chaos maps Bernoulli map is more resistant to known text and cipher text only attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang., S., Zheng., D., Zhao., J., Tam., W.J., Speranza, F.: An Image Quality Evaluation Method Based on Digital Watermarking. Transactions Letters IEEE Transactions on Circuits And Systems For Video Technology 17(1) (2007)

    Google Scholar 

  2. El-Fishawy1, N., Osama, M., Zaid2, A.: Quality of encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security 5(3), 241–251 (2007)

    Google Scholar 

  3. Dachselt., F., Schwarz, W.: Chaos And Cryptography. IEEE Transactions on Circuits And Systems—I: Fundamental Theory And Applications 48, 1498–1501 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  4. Pareek, N.K., Patida, V., Sud, K.K.: Image encryption using chaotic logistic map. Image and Vision Computing 24, 926–934 (2006)

    Article  Google Scholar 

  5. Chen, H.-C., Guo, J.-I., Huang, L.-C., Yen, J.-C.: Design and Realization of a New Signal Security System for Multimedia Data Transmission. EURASIP Journal on Applied Signal Processing 13, 1291–1305 (2003)

    Article  Google Scholar 

  6. Liu1, S., Sun, J., Xu1, Z.: An Improved Image Encryption Algorithm based on Chaotic System. Journal of Computers 4(11) (2009)

    Google Scholar 

  7. Yen, C., Guo, J.-I.: An efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEE Proceedings—Vision, Image and Signal Processing 147(2), 167–175 (2000)

    Article  Google Scholar 

  8. Öztürk, S., Soukpınar, Ø.: Analysis and Comparison of Image Encryption Algorithms. In: Proceedings Of World Academy Of Science, Engineering And Technology, vol. 3 (2005)

    Google Scholar 

  9. Van De Ville, D., Philips, W., Van de Walle, R., Lemahieu, I.: Image scrambling without bandwidth expansion. IEEE Transactions Circuits and Systems for Video Technology 14, 892–897 (2004)

    Article  Google Scholar 

  10. Yang., M., Bourbakis, N., Shujun, L.: Data-image-video encryption. Potentials IEEE 23, 28–34 (2004)

    Article  Google Scholar 

  11. Yi, C.H., Tan, C.K., Siew, R., Syed, R.: Fast encryption for multimedia. IEEE Transactions on Consumer Electronics 47(1), 101–107 (2001)

    Article  Google Scholar 

  12. Kuo, J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proc. IEEE International Carnahan Conference On Security Technology, Taipei, Taiwan, pp. 149–153 (1991)

    Google Scholar 

  13. Macq, M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)

    Article  Google Scholar 

  14. Parker, S., Chua, L.O.: Chaos: a tutorial for engineers. Proceedings of the IEEE 75(8), 982–1008 (1995)

    Article  Google Scholar 

  15. Wu, W., Rulkov, N.F.: Studying chaos via 1-Dmaps—a tutorial. IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications 40(10), 707–721 (1993)

    Article  Google Scholar 

  16. Biham, E.: Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT’91. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  17. Wolter, S., Matz, H., Schubert, A., Laur, R.: On the VLSI implementation of the international data encryption algorithm IDEA. In: Proc. IEEE Int. Symp. Circuits and Systems, Seattle, Washington, USA, vol. 1, pp. 397–400 (1995)

    Google Scholar 

  18. Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study’. In: Proceedings of IEEE international Conference on Security Technology, Taipei. Taiwan. DD, pp. 149–153 (1991)

    Google Scholar 

  19. Zhang1, X., Shu2, L., Tang1, K.: Multi-Map Orbit Hopping Chaotic Stream Cipher. arxiv.org/pdf/cs/0601010-Cornell University Library (2006)

    Google Scholar 

  20. Smid, E., Branstad, D.K.: The data encryption standard: past and future. Proceedings of the IEEE 76(5), 550–559 (1988)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sathishkumar, G.A., Bhoopathybagan, K., Sriraam, N. (2011). Quality Analysis of a Chaotic and Hopping Stream Based Cipher Image. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. CCSIT 2011. Communications in Computer and Information Science, vol 131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17857-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17857-3_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17856-6

  • Online ISBN: 978-3-642-17857-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics