Image Encryption Using Arnold Map
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1.1954Keywords:
Chaos, Image encryption, Arnold map, Iterations and Logistic mapAbstract
Nowadays transmission of data over the network is increasing and the data can be in the format of text, image, audio and video. Images are widely used in maximum applications of daily life. Image encryption is one of the most recent area of research to meet the demand during image transmission. Transformation of image from one form to erroneous form is called as image encryption. So, it can be secured from unauthorized users. The security of encrypted image is completely dependent on two important aspects i.e. the strength of the cryptographic algorithm and the confidentiality of the key. This paper proposes an algorithm of image encryption based on 3D Arnold cat map combined with logistic chaotic map. To evaluate the security of the encrypted image of this scheme, key space analysis and differential attack are performed. Several test images are used to demonstrate the validity of the proposed encryption algorithm. The experiment result shows that the proposed algorithm provides an efficient and secure approach to real-time image encryption and transmission.
References
J. C. Dagadu, J. Li, E. O. Aboagye, and X. Ge, "Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map," Journal of Multidisciplinary Engineering Science and Technology (JMEST), vol. 4, no. 9, pp. 15695-15702, Sep. 2017.
W. Zhou et al., "An Efficient Medical Image Protection Scheme with Parallel Chaotic Key Stream Generation," Information Technology Journal, vol. 13, pp. 1602-1611, 2014.
R. Purba, A. Halim, and I. Syahputra, "Enkripsi Citra Digital Menggunakan Arnold’s Cat Map, Nonlinear Chaotic Algorithm," JSM STMIK Mikroskil, vol. 15, no. 2, pp. 61-71, 2014.
E. Hariyanto, R. Rahim, "Arnold’s Cat Map Algorithm in Digital Image encryption," International Journal of Science and Research (IJSR), vol. 5, no. 10, Oct. 2016.
S. P. and S. J., "An efficient Encryption Then Compression System using Asymmetric Numeral Method," IJET, vol. 9, no. 5, pp. 3680-3688, Oct-Nov 2017.
M. Mishra, P. Singh, and C. Garg, "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping," International Journal of Information and Computation technology, vol. 4, no. 7, pp. 741-746, 2014.
A. A. Steffi and D. Sharma, "Modified Algorithm of Encryption and Decryption of Image using Chaotic Mapping," International Journal of Science and Research (IJSR), vol. 2, no. 2, pp. 77-80, 2013.
J. Zhao, W. Guo, and R. Ye, "A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture," International Journal of Computer Trends and Technology (IJCTT), vol. 15, no. 4, pp. 174-185, Sep. 2014.
V. Patidar et al., "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331-4339, 2011.
C. Thampi and D. Jose, "More Secure Color Image Encryption Scheme Based on 3D Chaotic Maps," International Journal for Advance Research in Engineering and Technology, vol. 1, no. 9, pp. 1-5, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.