Abstract
This paper is devoted to the analysis of the impact of chaos-based techniques on stream ciphers. The chaos based cryptographic algorithm has suggested a new and efficient ways to develop secure image encryption technique. In this paper, the keys are generated by four different chaotic maps. Based on the initial conditions, each map may produce various random numbers from various orbits of the maps. Among those random numbers, a particular number and from a particular orbit are selected as a key for the encryption algorithm. Based on the key, a binary sequence is generated to control the encryption algorithm. The input image of 2-D is transformed into a 1- D array by using scanning pattern and then divided into various sub blocks. Then the position permutation and value permutation is applied to each binary matrix based on chaos maps. Cryptanalysis proves that among various chaos maps Bernoulli map is more resistant to known text and cipher text only attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang., S., Zheng., D., Zhao., J., Tam., W.J., Speranza, F.: An Image Quality Evaluation Method Based on Digital Watermarking. Transactions Letters IEEE Transactions on Circuits And Systems For Video Technology 17(1) (2007)
El-Fishawy1, N., Osama, M., Zaid2, A.: Quality of encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security 5(3), 241–251 (2007)
Dachselt., F., Schwarz, W.: Chaos And Cryptography. IEEE Transactions on Circuits And Systems—I: Fundamental Theory And Applications 48, 1498–1501 (2001)
Pareek, N.K., Patida, V., Sud, K.K.: Image encryption using chaotic logistic map. Image and Vision Computing 24, 926–934 (2006)
Chen, H.-C., Guo, J.-I., Huang, L.-C., Yen, J.-C.: Design and Realization of a New Signal Security System for Multimedia Data Transmission. EURASIP Journal on Applied Signal Processing 13, 1291–1305 (2003)
Liu1, S., Sun, J., Xu1, Z.: An Improved Image Encryption Algorithm based on Chaotic System. Journal of Computers 4(11) (2009)
Yen, C., Guo, J.-I.: An efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEE Proceedings—Vision, Image and Signal Processing 147(2), 167–175 (2000)
Öztürk, S., Soukpınar, Ø.: Analysis and Comparison of Image Encryption Algorithms. In: Proceedings Of World Academy Of Science, Engineering And Technology, vol. 3 (2005)
Van De Ville, D., Philips, W., Van de Walle, R., Lemahieu, I.: Image scrambling without bandwidth expansion. IEEE Transactions Circuits and Systems for Video Technology 14, 892–897 (2004)
Yang., M., Bourbakis, N., Shujun, L.: Data-image-video encryption. Potentials IEEE 23, 28–34 (2004)
Yi, C.H., Tan, C.K., Siew, R., Syed, R.: Fast encryption for multimedia. IEEE Transactions on Consumer Electronics 47(1), 101–107 (2001)
Kuo, J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proc. IEEE International Carnahan Conference On Security Technology, Taipei, Taiwan, pp. 149–153 (1991)
Macq, M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)
Parker, S., Chua, L.O.: Chaos: a tutorial for engineers. Proceedings of the IEEE 75(8), 982–1008 (1995)
Wu, W., Rulkov, N.F.: Studying chaos via 1-Dmaps—a tutorial. IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications 40(10), 707–721 (1993)
Biham, E.: Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT’91. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)
Wolter, S., Matz, H., Schubert, A., Laur, R.: On the VLSI implementation of the international data encryption algorithm IDEA. In: Proc. IEEE Int. Symp. Circuits and Systems, Seattle, Washington, USA, vol. 1, pp. 397–400 (1995)
Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study’. In: Proceedings of IEEE international Conference on Security Technology, Taipei. Taiwan. DD, pp. 149–153 (1991)
Zhang1, X., Shu2, L., Tang1, K.: Multi-Map Orbit Hopping Chaotic Stream Cipher. arxiv.org/pdf/cs/0601010-Cornell University Library (2006)
Smid, E., Branstad, D.K.: The data encryption standard: past and future. Proceedings of the IEEE 76(5), 550–559 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sathishkumar, G.A., Bhoopathybagan, K., Sriraam, N. (2011). Quality Analysis of a Chaotic and Hopping Stream Based Cipher Image. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. CCSIT 2011. Communications in Computer and Information Science, vol 131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17857-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-17857-3_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17856-6
Online ISBN: 978-3-642-17857-3
eBook Packages: Computer ScienceComputer Science (R0)