Design and Implementation of Image Encryption Algorithm Using Chaos
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.4, No. 15)Publication Date: 2014-06-17
Authors : Sandhya Rani M.H.; K.L. Sudha;
Page : 660-664
Keywords : Cryptography; Chaos; Confusion; Diffusion; Entropy.;
Abstract
Images are widely used in diverse areas such as medical, military, science, engineering, art, advertising, entertainment, education as well as training, increasing the use of digital techniques for transmitting and storing images. So maintaining the confidentiality and integrity of images has become a major concern. This makes encryption necessary. The pixel values of neighbouring pixels in a plain image are strongly correlated. The proposed algorithm breaks this correlation increasing the entropy. Correlation is reduced by changing the pixel position this which is called confusion. Histogram is equalized by changing the pixel value this which is called diffusion. The proposed method of encryption algorithm is based on chaos theory. The plain-image is divided into blocks and then performs three levels of shuffling using different chaotic maps. In the first level the pixels within the block are shuffled. In the second level the blocks are shuffled and in the third level all the pixels in an image are shuffled. Finally the shuffled image is diffused using a chaotic sequence generated using symmetric keys, to produce the ciphered image for transmission. The experimental result demonstrates that the proposed algorithm can be used successfully to encrypt/decrypt the images with the secret keys. The analysis of the algorithm also shows that the algorithm gives larger key space and a high key sensitivity. The encrypted image has good encryption effect, information entropy and low correlation coefficient.
Other Latest Articles
- Disease Detection of Cotton Leaves Using Advanced Image Processing
- Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption
- A Survey on Web Spam and Spam 2.0
- Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet
- Model Driven Development: Research Issues and Opportunities
Last modified: 2014-12-18 14:50:53