Abstract
Generally, if an image is received as a Cipher, it is assumed that the data (to be sent) might be an image, but text can also be encrypted in the format of an image. So to confuse the attacker, this paper proposes a technique that encrypts the text into image using piecewise linear chaotic map (PWLCM). A text file can be taken as input and the proposed algorithm will convert it into a cipher image, which can then be converted back by the decryption process. The advantage of this scheme is that it is quite secure and hard to break. Also, PWLCM Maps is the simplest among chaotic maps. At first, the text is converted from 7-bit ASCII to its double equivalent and then padding is done to get the required matrix to form a structure for the image to which the text will be converted. After that permutation is done to the matrix bits and then diffusion occurs at two stages, first for the rows and then for the columns. Both permutation and diffusion are done using PWLCM map.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Murillo-Escobar, M. A., Abundiz-Pérez, F., Cruz-Hernández, C., & López-Gutiérrez, R. M. (2014). A novel symmetric text encryption algorithm based on logistic map. In 2014 International Conference on Communications, Signal Processing and Computers (Vol. 4953).
Singh, S., & Jain, A. (May 2013). An enhanced text to image encryption technique using RGB substitution and AES. International Journal of Engineering Trends and Technology (IJETT), 4(5).
Abusukhon, A. (May–June 2013). Block cipher encryption for text to image algorithm. International Journal of Computer Engineering and Technology (IJCET), 4(3).
Coppersmith, D. (1994). The data encryption standard (DES) and its strengths against attacks. IBM Journal of Research and Development, 38(3), 243–250.
Pub NF. 197: Advanced encryption standard (AES). (2001). Federal information processing standards publication, 197, 311–441.
Patro, K., & Acharya, B. (2018). Secure multi-level permutation operation based multiple colour image encryption. Journal of Information Security and Applications, 40, 111–133.
Patro, K., Banerjee, A., Acharya, B. (2017). A simple, secure and time efficient multi-way rotational permutation and diffusion based image encryption by using multiple 1-D chaotic maps. In International Conference on Next Generation Computing Technologies (pp. 396–418). Singapore: Springer.
Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals, 29, 393–399.
Samhita, P., Prasad, P., Patro, K. A. K., & Acharya, B. (2016). A secure chaos-based image encryption and decryption using crossover and mutation operator. International Journal of Control Theory and Applications, 9(34), 17–28.
Gupta, A., Thawait, R., Patro, K. A. K., & Acharya, B. (2016). A novel image encryption based on bit-shuffled improved tent map. International Journal of Control Theory and Applications, 9(34), 1–16.
Shadangi, V., Choudhary, S. K., Patro, K. A. K., & Acharya, B. (2017). Novel Arnold scrambling based CBC-AES image encryption. International Journal of Control Theory and Applications, 10(15), 93–105.
Brindha, M., & Ammasai Gounden, N. (2016). A chaos-based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem. Applied Soft Computing, 40, 379–390.
Wu, X., Kurths, J., & Kan, H. (2017). A robust and lossless DNA encryption scheme for color images. Multimedia Tools and Applications.
Matthews, R. (1989). On the derivation of a chaotic encryption algorithm. Cryptologia, 13(1), 29–42.
Floating-Point Working Group. (1985). IEEE Standard for Binary Floating-Point Arithmetic. ANSI. IEEE Std (pp. 754–1985).
Kulsoom, A., Xiao, D., & Abbas, S. A. (2016). An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications, 75(1), 1–23.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patro, K.A.K., Soni, S., Sharma, V.K., Acharya, B. (2020). Text-to-Image Encryption and Decryption Using Piece Wise Linear Chaotic Maps. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-0694-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0693-2
Online ISBN: 978-981-15-0694-9
eBook Packages: EngineeringEngineering (R0)