Full Paper View Go Back

Performance Analysis of Self Adaptive Image Encryption Technique

Rashmi P.1 , Bharathi R.K.2 , Shruthi Prabhakar3 , Reshma Banu4 , Rachana C.R.5

1 DoS in Computer Science, Pooja Bhagavat Memorial Mahajana Education Centre, Mysuru, India.
2 Dept. of MCA, Sri Jayachamarajendra college of Engineering, Mysore, India.
3 DoS in Computer Science, Pooja Bhagavat Memorial Mahajana Education Centre, Mysuru, India.
4 Dept. of ISE, GSSS Institute of Engineering and Technology for Women, Mysuru, India.
5 DoS in Computer Science, Pooja Bhagavat Memorial Mahajana Education Centre, Mysuru, India.

Correspondence should be addressed to: rashmibdp@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.5 , Issue.3 , pp.44-58, Jun-2017

Online published on Jun 30, 2017


Copyright © Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., “Performance Analysis of Self Adaptive Image Encryption Technique,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.44-58, 2017.

MLA Style Citation: Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R. "Performance Analysis of Self Adaptive Image Encryption Technique." International Journal of Scientific Research in Network Security and Communication 5.3 (2017): 44-58.

APA Style Citation: Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., (2017). Performance Analysis of Self Adaptive Image Encryption Technique. International Journal of Scientific Research in Network Security and Communication, 5(3), 44-58.

BibTex Style Citation:
@article{P._2017,
author = {Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R.},
title = {Performance Analysis of Self Adaptive Image Encryption Technique},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {44-58},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=270},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=270
TI - Performance Analysis of Self Adaptive Image Encryption Technique
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R.
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 44-58
IS - 3
VL - 5
SN - 2347-2693
ER -

1314 Views    426 Downloads    328 Downloads
  
  

Abstract :
This paper presents an efficient Self Adaptive Image Encryption Technique based on multiple chaotic maps. An efficient and fast encryption algorithm is designed with the help of traditional methods of permutation-diffusion and double simple 2D chaotic systems. Existing methods which are found in secure upon chosen-plain text or known-plain text attack in the process of permutation or diffusion. The key streams are dependent on the plain-image. Consequently, different plain-images will have different key streams in both processes. This design can solve the problem of fixed chaotic sequence produced by the same initial conditions but for different images. The mathematical experiments and performance analysis demonstrate that the proposed algorithm is large enough to resist the brute-force attack and has excellent encryption performance.

Key-Words / Index Term :
Image Encryption, chaotic map, Permutation, Diffusion

References :
[1]. ShiguoLian, Jinsheng Sun and Zhiquan Wang ang, “A Block Cipher based on a suitable use of the Chaotic Standard Map”, Chaos Solitons and Fractals, Vol. 26, No. 1, pp.117-129, 2005.
[2]. Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang, “A Block Cipher with Dynamic S-boxes based on Tent Map”, Communications in Nonlinear Science and Numerical Simulation, Vol. 14, No. 7, pp. 3089-3099, 2009.
[3]. Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong and Hai Yu, “A Chaos-based Symmetric Image Encryption scheme using a Bit-Level Permutation”, Information Sciences, Vol.181, No.6, pp. 1171-1186, 2011.
[4]. Xingyuan Wang, Lin Teng, Xue Qin, “A Novel Colour Image Encryption Algorithm based on Chaos”, Signal Processing, Vol. 92, No. 4, pp. 1101-1108, 2012.
[5]. Zhou YC, Bao L, Chen CLP, “Image encryption using a new parametric switching chaotic system”, Signal Process, Vol.93, Issue.11, pp.3039-3052, 2013.
[6]. Wang Y, Wong KW, Liao XF, Xiang T, Chen GR., “A chaos-based image encryption algorithm with variable control parameters”, Chaos Solitons Fract, Vol.41, Issue.4, pp.1773-1783, 2009.
[7]. Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF, “An efficient and secure medical image protection scheme based on chaotic maps”, ComputBiol Med, Vol.43, Issue,8, pp.1000–1010, 2013.
[8]. Behnia S, Akhavan A, Akhshani A, Samsudin A, “Image encryption based on the Jacobian elliptic maps”, J SystSoftw, Vol.86, Issue.9, pp.2429-2438, 2013.
[9]. Zhu HG, Zhao C, Zhang XD., “A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem, Signal Process Image Commun, Vol.28, Issue.6, pp.670-80, 2013.
[10]. Pareek NK, Patidar V, Sud KK., “Diffusion-substitution based gray image encryption scheme”, Digital Signal Process, Vol.23, Issue.3, pp.894-901, 2013.
[11]. Sam IS, Devaraj P, Bhuvaneswaran RS., “An intertwining chaotic maps based image encryption scheme”, Nonlinear Dyn, Vol.4, Issue. 69, pp.1995-2007, 2012.
[12]. Zhang X, Wang C, Zheng Z., “An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism”, KSII Transactions on Internet and Information Systems, Vol.11, Issue.3, pp.1-9, 2017.
[13]. Ye RS., “A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism”, Opt Commun, Vol.284, Issue.22, pp.5290-5298, 2011.
[14]. Kocarev L, Jakimoski G, Stojanovski T, Parlitz U., “From chaotic maps to encryption schemes”, In IEEE International Symposium on Circuits and Systems, Monterey, p.514-517, 1998.
[15]. Zhu CX., “A novel image encryption scheme based on improved hyperchaotic sequences”, Opt Commun, Vol.285, Issue.1, pp.29-37, 2012.
[16]. Li CQ, Liu YS, Xie T, “Chen MZQ. Breaking a novel image encryption scheme based on improved hyperchaotic sequences”, Nonlinear Dyn, Vol.73, Issue.2, pp.2083-2089, 2013.
[17]. Wang XY, Teng L, Qin X., “A novel colour image encryption algorithm based on chaos”, Signal Process, Vol.92, Issue.4, pp.1101-1108, 2012.
[18]. Arroyo D, Diaz J, Rodriguez FB. Cryptanalysis of a one round chaos-based substitution permutation network. Signal Process 2013;93:1358–64.
[19]. Abd El-Latif AA, Li L, Wang N, Han Q, Niu XM., “A new approach to chaotic image encryption based on quantum chaotic system, exploiting colorspaces”, Signal Process, Vol.93, Issue.11, pp.2986–3000, 2013.
[20]. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR., “A simple, sensitive and secure image encryption algorithm based on hyper-chaotic systemwith only one round diffusion process”, Multimedia Tools Appl., Vol.71, Issue.3, pp.1469-1672, 2014
[21]. Huang XL., “A designed image encryption algorithm based on chaotic systems”, J ComputTheorNanosci, Vol.9, Issue.2, pp.2130-2135, 2012.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation