Advertisement

A Fast Image Encryption Technique Using Henon Chaotic Map

  • Kapil Mishra
  • Ravi SaharanEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)

Abstract

Recent advancements in the networking technologies led to increase in network bandwidth, hence allowing transfer of files of large size. A major portion of files being transferred through various networks all over the world consists of multimedia data, particularly digital images. In this project, we propose a new image encryption scheme that may be used for securing the digital images. The scheme uses Henon chaotic map and 128-bit secret key in order to generate the cipher image. Henon chaotic map is a two-dimensional iterated discrete dynamic system that shows chaotic character on specific values of the constants used. Chaotic maps are very sensitive to the initial parameters, i.e., a slight change in the initial conditions drastically changes the overall output generated by the chaotic system. In our scheme, we use Henon chaotic map along with an externally supplied 128-bit secret key is used to encrypt the original image. After encrypting the image, pixel shuffling is performed using a permutation matrix generated using the chaotic map. The algorithm is tested on a standard set of images against various performance metrics like peak signal-to-noise ratio (psnr), entropy, histogram etc. The algorithm was found to be robust against plain-text, statistical attacks, chosen plain-text etc.

Keywords

Information security Image encryption Image security Henon chaotic map 

References

  1. 1.
    Chen, C.-S., Chen, R.-J.: Image encryption and decryption using SCAN methodology. In: 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT06, pp. 61–66. IEEE (2006)Google Scholar
  2. 2.
    Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing (ICSIP), pp. 102–107. IEEE (2014)Google Scholar
  3. 3.
    Rajput, A.S., Mishra, N., Sharma, S.: Towards the growth of image encryption and authentication schemes. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 454–459. IEEE (2013)Google Scholar
  4. 4.
    Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipher. J. Theor. Appl. Inf. Technol. 19(2), 117–125 (2010)Google Scholar
  5. 5.
    Kumar, M., Aggarwal, A., Garg, A.: A review on various digital image encryption techniques and security criteria. Int. J. Comput. Appl. 96(13) (2014)CrossRefGoogle Scholar
  6. 6.
    Wei-bin, C., Xin, Z.: Image encryption algorithm based on Henon chaotic system. In: 2009 International Conference on Image Analysis and Signal Processing. IEEE (2009)Google Scholar
  7. 7.
    Ping, P., Mao, Y., Lv, X., Xu, F., Xu, G.: An image scrambling algorithm using discrete Henon map. In: 2015 IEEE International Conference on Information and Automation, pp. 429–432. IEEE (2015)Google Scholar
  8. 8.
    Nithin, N., Bongale, A.M., Hegde, G.P.: Image encryption based on FEAL algorithm. Int. J. Adv. Comput. Sci. Technol. (2013)Google Scholar
  9. 9.
    Hamad, S., Khalifa, A., Elhadad, A., Rida, S.Z.: A modified playfair cipher for encrypting digital images. Mod. Sci. (2013)Google Scholar
  10. 10.
    Soleymani, A., Nordin, M.J., Sundararajan, E.: A chaotic cryptosystem for images based on Henon and Arnold cat map. Sci. World J. (2014)Google Scholar
  11. 11.
    Forre, R.: The Hnon attractor as a keystream generator. In: Advances in Cryptology-EuroCrypt, vol. 91, pp. 76–81 (1991)Google Scholar
  12. 12.
    Hnon, M.: A two-dimensional mapping with a strange attractor. Commun. Math. Phys. 50(1), 69–77 (1976)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentCentral University of RajasthanKishangarh, AjmerIndia

Personalised recommendations