Enhanced Image Encryption Using Two Chaotic Maps

Fatimah Abdulnabi Salman, Khitam Abdulnabi Salman

Abstract


Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold’s cat map) that meet the general security requirements of image transmission. First the image is encrypted using Arnold’s cat map, which shuffles the image pixels. 3D logistic map is applied to the encrypted image for transformation and permutation purposes. Then the XOR operation for the encrypted image and a chaotic sequence key are used to provide more security after the pixel values have been changed. The performance of the proposed security method was evaluated using MATLAB by analyzing the correlation between adjacent pixels, histogram analysis, and entropy information. The simulation results showed that the proposed method is robust and resilient. It can achieve an average of 7.99 for entropy information, 99.6% for NPCR, and 33.77 % for UCAI.      


Keywords


Arnold’s cat map; image encryption; logistic map; security; YCbCr space model

Full Text:

PDF

References


Wu, Y., Noonan, J.P., Yang, G. & Jin, H., Image Encryption Using the Two-dimensional Logistic Chaotic Map, Journal of Electronic Imaging, 21(1), 013014, 2012. DOI: 10.1117/1.JEI.21.1.013014.

Fu, C., Bian, O., Jiang, H., Ge, L-H & Ma, H-F., A New Chaos-based Image Cipher Using a Hash Function, in 15th International Conference on Computer and Information Science (ICIS), IEEE/ACIS, 2016. DOI: 10.1109/ ICIS.2016.7550789.

Hossain, M.B., Rahman, M.T., Rahman, A.B.M.S. & Islam, S., A New Approach of Image Encryption Using 3D Chaotic Map to Enhance Security of Multimedia Component, in 3rd International Conference On Informatics, Electronics & Vision, IEEE, 2014. DOI: 10.1109/ ICIEV.2014.6850856

Hua, Z., Zhou, Y., Pun, C-M. & Chen, C.L.P., Image Encryption using 2D Logistic-Sine chaotic Map, in 2014 IEEE International Conference on Systems, Man, and Cybernetics, USA, pp. 3228-3234, 2014. DOI: 10.1109/SMC.2014.6974425

Ahmad, M. & Al-Sharari, H.D., An Inter-component Pixels Permutation Based Color Image Encryption Using Hyper-chaos, European Journal of Scientific Research, 116(1), pp. 115-121, 2013.

Abdulkareem, H. & Abdullah, H.N., A New Chaotic Map for Secure Transmission, TELKOMNIKA, 16(3), pp. 1135-1142, 2018. DOI: 10.12928/TELKOMNIKA.v16i3.8545.

Cao, Y., A New Hybrid Chaotic Map and Its Application on Image Encryption and hiding, Mathematical Problem in Engineering, 2013, pp. 1-13, DOI: 10.1155/2013/728375.

Alabaichi, A.M., Color Image Encryption using 3D Chaotic Map with AES Key Dependent S-Box, IJCSNS International Journal of Computer Science and Network Security, 16(10), pp. 105-115, 2016.

Long, M. & Tan, L., A Chaos-based Data Encryption Algorithm for Image/Video, in Second International Conference on Multimedia and Information Technology (ICMIT), pp. 172-175, 2010. DOI: 10.1109/MMIT.2010.27

Makris, G. & Antoniou, I., Cryptography with Chaos, 5th Chaotic Modeling and Simulation International Conference, pp. 309- 318, Athena, June 2012.

Khade, P. & Narnaware, M., 3D Chaotic Functions For Image Encryption, IJCSI International Journal of Computer Science Issue, 9(3), pp. 323-328, 2012.

Adullah, H.N. & Abdulkareem, H., Image Encryption Using Hybrid Chaotic Map, in 2017 International Conference on Current research in Computer Science and Information Technology (ICCIT), Slemani – Iraq, pp. 121-127, 2017.

Ahmed, H. & Abd El-aziem, A., Image Encryption Using Development of Chaotic Logistic Map Based on Feedback Stream Cipher, Recent Advances in Telecommunications, Informatics And Educational Technologies, pp. 274-283, 2014.

Ye, G., Huang, H. & Pan, C., An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map, in Proceedings of the 2nd International Conference on Advances in Image Processing, pp. 78-82, ICAIP'18, 2018. DOI:10.1145/3239576.3239584

Dagadu, J., Li, J., Aboagye, E. & Ge, X., Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map, Journal of Multidisciplinary Engineering Science and Technology (JMEST), 4(9), pp. 8096- 8103, 2017.

Ye, G., Jiao, K., Pan, C. & Huang, X., An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map, Hindawi Security and Communication Networks, pp. 1-12, 2018. DOI:10.1155/2018/ 8402578.

Wang, C. & Ye, Z., Brightness Preserving Histogram Equalization with Maximum Entropy: A Variational Perspective, IEEE Transactions on Consumer Electronics, 51(4), pp. 1329-1334, 2005. DOI:10.1109 /TCE.2005.1561863.

Li, M., Liang, T. & Y. He, Arnold Transform Based Image Scrambling Method, in 3rd International Conference on Multimedia Technology (ICMT-13), pp. 1309-1316, 2013. DOI:10.2991/icmt-13.2013.160.

Sinha, R.K, San, N., Asha, B., Prasad, S. & Sahu, S.S., Chaotic Image Encryption Scheme Based on Modified Arnold Cat Map and Henon Map, Proceeding of 2018 IEEE International Conference on current Trends towards Converging Technologies, India, 2018. DOI: 10.1109/ICCTCT. 2018.8551137

Ye, G., Zhao, H. & Chai, H., Chaotic Image Encryption Algorithm using Wave-line Permutation and Block Diffusion, Nonlinear Dynamics, 83(4), pp. 2067-2077, 2016. DOI:10.1007/s11071-015-2465-7.

Mondal, B. & Mandal, T., A Novel Chaos Based Secure Image Encryption Algorithm, International Journal of Applied Engineering Research, 11(5), pp. 3120-3127, 2016.

Hua, Z., Jin, F., Xu, B. & Huang, H., 2D Logistic-Sine-Coupling Map for Image Encryption, Signal Processing, 149, pp. 148-161, 2018. DOI: 10.1016/j.sigpro.2018.03.010.

Wu, Y., Noonan J.P. & Agaian, S., NPCR and UACI Randomness Tests for Image Encryption, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp. 31-38, 2011.




DOI: http://dx.doi.org/10.5614%2Fitbj.ict.res.appl.2020.14.2.3

Refbacks

  • There are currently no refbacks.


Contact Information:

LPPM – ITB, 

Center for Research and Community Services (CRCS) Building Floor 7th, 
Jl. Ganesha No. 10 Bandung 40132, Indonesia,

Tel. +62-22-86010080,

Fax.: +62-22-86010051;

e-mail: jictra@lppm.itb.ac.id.