Image Encryption Algorithm Based on. Logistic Map and Pixel Mapping Table. Hazem Al-Najjar Asem Al-Najjar

Size: px
Start display at page:

Download "Image Encryption Algorithm Based on. Logistic Map and Pixel Mapping Table. Hazem Al-Najjar Asem Al-Najjar"

Transcription

1 Encryption Algorithm Based on Logistic Map and Pixel Mapping Table Hazem Al-Najjar Asem Al-Najjar

2 Encryption Algorithm Based on Logistic Map and Pixel Mapping Table Hazem Mohammad Al-Najjar Technical College of Arar, Department of Computer Technical and Vocational Training Corporation Arar,KSA Asem Mohammad AL-Najjar Department of Computer Science Yarmouk University Irbid, Jordan Abstract: In this paper, we propose a new image encryption algorithm based on logistic map chaotic function. Our algorithm consists of two replacement approaches; to change the value of the pixel without shuffling the image itself. To do that, we suggest using a Pixel Mapping Table (PMT) with the random shifting value to increase the uncertainty of the image. After that, we modified the pixels value by using the rows and columns replacement approach. However, by analyzing our algorithm, we show that it s strong against different types of attacks and it s sensitive to the initial conditions. Keywords : Encryption, Logistic Map, Pixel Replacement. 1. INTRODUCTION As the internet become very large, the security of digital images and videos become an important issue for all internet users. Because of this, the data between the legitimate users need to be protected before transmission by using encryption methods. The encryption converts the meaningful information into garbage data; so no malicious user can read the data. Moreover, many methods to encrypt the data proposed by researchers such as: RSA, DES and IDEA. On another hand, to secure the images and multimedia application special methods and special rules need to be considered. encryption system used randomization systems; to increase the uncertainty of the encryption process. Chaos is one of the most important theories that used to create a random sequence that firstly used in the computer by Edward Lorenz in The chaos was used in the encryption system because of its characteristics, like sensitivity to the initial conditions and unpredictability to the chaos sequences. Many approaches try to design image encryption algorithms by using chaos, like [8] used multi-chaotic maps to encrypt the image by dividing his system into mainly two phases, in the first phase pixels are permuted by using a Arnold cat map and in the second phase the muti-chaotic maps are used to encrypt the permuted pixels. In [3] they used two one-dimensional discrete Chebyshev chaotic sequences for row and column scrambling for each pixel on the original image. Where, [1] used Rossler chaotic system to encrypt the image by applying changes in the pixels value and their positions; to increase the uncertainty in the cipher images. The one time pads with the logistic map (as a chaotic function) are used in [5] to encrypt the image and increase the size of the encrypted keys in the cipher. Others, like [2] used a knight s tour with slip encryption filter; to encrypt the image without using any chaotic functions. However, security analysis results, drawbacks and the strength of the chaotic systems are analyzed in [4, 7]. In this paper, we used a logistic map with three different initial conditions to create three different chaotic sequences with two pixels mapping tables to change the pixels value and increasing the uncertainly in the cipher image without shuffling the image itself. In which, this method increase the efficiency of the system and decrease execution time of the algorithm. The rest of this paper is organized as follows. In section II, our approach is described in detail. Experimental results and security analysis are presented in section III. Finally, our conclusions are drawn in section IV. 2. PIXELS-VALUE REPLACEMENT 2.1. Shuffling and Shifting Chaotic Function The logistic map is one dimensional chaotic system; with X output and input variable and two initial conditions X and as follows: X n+1 =λ X n (1-X n ) (1), in which, the chaotic behavior is achieved when as shown in Fig.1. In our encryption algorithm we used a logistic map; to shuffle the Pixels Mapping Tables (PMT) ; to shift the pixels value and to shuffle the pixels value as shown in equation Figure.1: Logistic Map Bifurcation 2.2. Chaotic Pixel Mapping Table Encryption System is divided into two approaches as follows: pixel replacement approach and pixel scrambling approach. In pixel replacement approach we change the pixels value, 56

3 where, in pixel scrambling we change the pixels position. In this paper, we used only the pixel replacement approach with two Pixel Mapping Table (PMT) that created by using logistic map (Key1). We define a PMT as a table that contains the pixel values from to 255 in the shuffled order with the size 256 x1 as shown in Fig. 2. In which, our algorithm used two PMTs as follows: 1- PMT1: we replaced the pixels value by using PMT1, so the current pixel is not the same after and before the replacement. 2- PMT2: to increase the uncertainty of the cipher image, the column replacement and the row replacement are used. In the first replacement method the two pixels in the original image will be mapped into the same value. So, to solve this problem we used a logistic sequence to randomize the pixels value as shown in the equation 2: Where, i, j is the position of the pixel, random is the random value generated by using a logistic map (Key2). Mod is the modulus operation. The pixel_level represents the number of available colors (our case this value equal 256) and c is the constant value. Therefore, if two pixels have the same value in the original image, the cipher image for two pixels is differing completely. So, the crypto-analysis of the cipher images will not get any useful information about the PMT design Figure.2: Unstuffed and Shuffled PMT, Respectively 2.3. Rows and Columns Replacement After the previous step, another PMT is created (key3) to change the pixel values by using the XOR operation for each column in the cipher image, as follow: (5) Where, k is the column number in the cipher image and PMT2 is the pixel mapping table generated by using a logistic map (key2). Each pixel in the image was replaced by using equation 2 and changed their values by using equation 5. After that, the Rows replacement was used to change the pixels in the image and modified their values by rows as follows: (6) Example: Assume 4x 4 image, 4 bits for the gray level which generates 16 different colors and suppose that there is two pixels mapping tables PMT1 and PMT 2; to replace the pixels in the image as shown in Figs. [3-5] Figure.3: Pixels Mapping Tables, PMT1 and PMT2, Respectively After Applying equation 2, the pixels value will be as shown in Fig. 5 a. 2- Then we map each value in the image by using equation 3 (Fig.5 b). Figure.4: The Original and the Shifting, Respectively ( b) Figure.5: after Using Equation 2 and 3, Respectively. 3- Rows and columns replacement: the pixels will be changed by using the Xoring operation with PMT2 (shown in figure.3 a), in which, the PMT in fig. 3 b will be used to change the values of columns and rows, respectively Encryption Scheme Diagram Our algorithm used only replacement approaches to encrypt the image. The two replacements approaches are used: in the first approach, we shift the pixels by using a random value and mapping it by using PMT. Where, in the second method, we used replacement by using the Xoring operation with specific random vector generated by using a logistic map (as shown in the fig 6). However, the decryption process is done in the reverse order. Key 1 Shifting + Modulus Operations Column s Replacement Key Key 2 PMT Row s Replacement Shuffled Figure.6: Encryption Algorithm Diagram 57

4 3. EXPERIMENTAL RESULTS AND SECURITY ANALYSIS In our experiment, we try to evaluate our algorithm in encrypting the images and the ability of the attackers to break it by using the different analysis such as histogram analysis, key space analysis entropy analysis and correlation analysis and other types of analysis. Moreover, Lena and Cameraman images are used as tested images with the size 256x256. The cipher and original images of the Lena and Cameraman are shown in Fig.7, respectively. With input keys Key1= 1x1 Key2= 2x1-15 and Key3= 2x1-13 for two images. Lena Cameraman Figure.8: Sensitivity Tests of Keys 3.3. Information Entropy Analysis Entropy determines the randomness of system, where, the true random variable should generate 2 8 symbols with equal probability and the entropy value equal 8. To evaluate the entropy and calculate the entropy value, we used a following equation [6]: Where P (S i ) represents the probability of symbol S i, in our tests the average entropy of the lena cipher image is and for the cameraman cipher image is equal to , which are very close to the optimal value, then the entropy attack is not possible. (c) (d) Figure.7: Lena and Cameraman and Their Ciphers s, Respectively 3.1. Keys Space Analysis The key space of our algorithm is depending on the three keys of the logistic map function. However, the key space is calculated as follow: we have three keys key1, key2 and key3, the key space of each one is equal to 1 15 then the key space of the algorithm is equal to Histogram Analysis By analyzing the image histogram the cryptanalyst can get very useful information from the cipher image. In which, the good encryption algorithm should generate uniformly distribution of the histogram. In our tests, it s very difficult to get any information from the histogram; Fig. 9 shows the histogram analysis of lena and cameraman image and there cipher images, respectively Keys Sensitivity Analysis The encryption system should be sensitive to the small changes on the decrypted keys. And, generate a wrong decrypted image, if there is a small difference in the decryption keys. Our sensitive tests keys Key1= 2x1-14, Key2= 8x1-15 and Key1= 5x1-13, in which, Fig.8 shows the decrypted image for the lena and cameraman tested images by using a wrong decryption keys

5 (Unified Average Changing Intensity). Where, NPCR defined as a percentage of different pixels number between two cipher images and UACI defined as an average intensity of differences between two cipher images as defined in the following[6]: (c) (d) Figure.9: Histogram of Lena and Cameraman and Cipher s, Respectively Correlation Analysis In the correlation analysis the adjacent pixels will be tested to see the correlation between them, if the algorithm has a very large correlation then the algorithm may be broken by using a correlation analysis. For this, we try to test our system by calculating the correlation coefficient for all possible cases in vertical, horizontal and diagonal adjacent. Where, the correlation coefficient is calculated by using the following formula [6]: Where M x N is the size of the cipher images and C1 and C2 are two different cipher images encrypted by using a different keys, where D(i, j) is defined as follow: After calculations, we get the Average NPCR and UACI of lena image are: NPCR = and UACI = and that of the cameraman are: NPCR = and UACI = Then our algorithm has a good ability against known plain text attack. Where, M is the total number of randomized pairs, i and j are the two vectors that contains i values and j values of the pair in the tested image, respectively. Table.1: Correlation Coefficients of Adjacent Pixels Lena Cameraman Coefficient Plain Cipher Plain Cipher Vertical Horizontal Diagonal Table.1 Shows the correlation coefficients between two adjacent pixels in all possible cases (vertically, horizontally and diagonally) of the plain-text images and cipher images. The results revealed that the proposed method randomized the pixels in good way. 4. CONCLUSION In this Paper, a new approach to encrypt the image by using a Logistic map with the pixel mapping tables is proposed. In which, the algorithm consists of two replacement methods without any scrambling approach which enhance the execution time of the encryption algorithm. In the first method, we shift each pixel by using a random shifter generated by using the logistic map as a Key1 and modified by using the modulus operation. The resulted image will be mapped by using PMT (key2) and modified by using another PMT (key3) for each column and row in the image; to enhance and increase the uncertainty of the cipher image. However, we shown by experimental results that our algorithm is sensitive to initial conditions and strong against the brute force attacks. Finally, we found that our algorithm has a high security against different types of attacks with the large space of the encryption keys Plain Text Sensitivity Analysis If the cipher image is not sensitive in the changing of the plaintext then the cryptanalyst can get very useful information from the encrypted images. For this, we use two criteria, NPCR (Number of Pixel change Rate) and UACI 59

6 REFERENCES: [1] Ying-yu C. and Chong Fu, An Encryption Scheme Based on High Dimension Chaos System, Int. Cof. Intelligent computation technology and automation, pp , 28. [2] Jiany D., Bai S. and Dong W., An Encryption Algorithm Based on Knight's Tour and Slip Encryption- Filter, Int. Conf. on Computer Science and Software Engineering, pp , 28. [3] Zhang D., Gu Q., Pan Y. and Zhang X. Discrete Chaotic Encryption and Decryption of Digital s, Int. Conf. on Computer Science and Software Engineering. pp ,28. [4] Xiang Di, L. X. and Wang P., Analysis and Improvement of a Chaos Encryption Algorithm, Chaos, Solution and Fractals, vol. 4, pp , 29. [5] C. J., S. G. and S. R., An Encryption Scheme Based on One Time Pads - A Chaotic Approach, Int. Conf. on Computing, Communication and Networking Technologies, pp. 1 6, July. 21. [6] Min L. and Li T., A Chaos Based Data Encryption Algorithm for /Video, Int. Conf. on Multimedia and Information Technology, pp , 21. [7] Rhouma R. and Safya B., Cryptoanalysis of a New Encryption Algorithm Based on Hyper-Chaos, Physical Letters A, Vol. 372, pp , 28. [8] Weihua Z. Ying S. Encryption Algorithms Using Chaos and CAT Methodology, International Conference on Anti-Counterfeiting Security and Identification in Communication (ASID),pp. 2-23, 21. 6

A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map

A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map Computer and Information Science; Vol. 7, No. 4; 214 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education A Novel Encryption Scheme for Digital Image - Based on One Dimensional

More information

An improved image encryption algorithm based on chaotic maps

An improved image encryption algorithm based on chaotic maps Vol 17 No 11, November 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(11)/4027-06 Chinese Physics B and IOP Publishing Ltd An improved image encryption algorithm based on chaotic maps Xu Shu-Jiang( ) a),

More information

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6) International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic

More information

Implementation of Gray Image Encryption using Multi- Level of Permutation and Substitution

Implementation of Gray Image Encryption using Multi- Level of Permutation and Substitution Implementation of Gray Image Encryption using Multi- Level of Permutation and Substitution Dina Riadh Alshibani Assistant Lecturer Computer Science Department University of Al Mustansiriyah / Iraq - Baghdad

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

A New Chaos Based Image Encryption and Decryption Using a Hash Function

A New Chaos Based Image Encryption and Decryption Using a Hash Function A New Chaos Based Image Encryption and Decryption Using a Hash Function Payal Verma 1, Prabhakar Sharma 2 1Research scholar Department of Computer Science and Engineering Raipur Institute of Technology,

More information

Spatial image encryption algorithm based on chaotic map and pixel frequency

Spatial image encryption algorithm based on chaotic map and pixel frequency . Supplementary File. SCIENCE CHINA Information Sciences Spatial image encryption algorithm based on chaotic map and pixel frequency Guodong YE 1,2* & Xiaoling HUANG 1 1 Faculty of Mathematics and Computer

More information

A new image encryption algorithm based on hyper-chaos

A new image encryption algorithm based on hyper-chaos Physics Letters A 372 (2008) 394 400 www.elsevier.com/locate/pla A new image encryption algorithm based on hyper-chaos Tiegang Gao a,, Zengqiang Chen b a College of Software, Nankai University, Tianjin

More information

ARTICLE IN PRESS. Optik xxx (2015) xxx xxx. Contents lists available at ScienceDirect. Optik. jo ur nal homepage:

ARTICLE IN PRESS. Optik xxx (2015) xxx xxx. Contents lists available at ScienceDirect. Optik. jo ur nal homepage: Optik xxx (2015) xxx xxx Contents lists available at ScienceDirect Optik jo ur nal homepage: www.elsevier.de/ijleo 1 2 Evaluating the permutation and diffusion operations used in image encryption based

More information

Vinita Shadangi 1, Siddharth Kumar Choudhary 1, K. Abhimanyu Kumar Patro 1 and Bibhudendra Acharya 1

Vinita Shadangi 1, Siddharth Kumar Choudhary 1, K. Abhimanyu Kumar Patro 1 and Bibhudendra Acharya 1 N o v e l A r n o l d S c r a m b l i n g B a s e d C B C - A E S I m a g e E n c r y p t i o n Novel Arnold Scrambling Based CBC-AES Image Encryption Vinita Shadangi 1, Siddharth Kumar Choudhary 1, K.

More information

An Image Encryption Algorithm based on 3D Lorenz map

An Image Encryption Algorithm based on 3D Lorenz map ISSN No. 0976-5697 Volume 4, No. 2, Jan-Feb 2013 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info An Encryption Algorithm based on 3D Lorenz

More information

A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM

A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM International Journal of Pure and Applied Mathematics Volume 80 No. 4 2012, 609-616 ISSN: 1311-8080 (printed version) url: http://www.ijpam.eu PA ijpam.eu A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED

More information

Analysis and Improvement of Encryption Algorithm Based on Blocked and Chaotic Image Scrambling

Analysis and Improvement of Encryption Algorithm Based on Blocked and Chaotic Image Scrambling Research Journal of Applied Sciences, Engineering and Technology 4(8): 3440-3447, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Submitted: April 7, 202 Accepted: May 06, 202 Published: September

More information

ABSTRACT. Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly Department of Computer Science, Mustansiriyah University, Baghdad, Iraq

ABSTRACT. Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly Department of Computer Science, Mustansiriyah University, Baghdad, Iraq 2017 IJSRSET Volume 3 Issue 5 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic

More information

Chaotic Image Encryption via Convex Sinusoidal Map

Chaotic Image Encryption via Convex Sinusoidal Map Chaotic Image Encryption via Convex Sinusoidal Map F. ABU-AMARA *, I. ABDEL-QADER Department of Computer Engineering Al-Hussein Bin Talal University P.O.Box:, Ma an Jordan fadiabuamara@ahu.edu.jo Department

More information

A Robust Image Encryption Method Based on Bit Plane Decomposition and Multiple Chaotic Maps

A Robust Image Encryption Method Based on Bit Plane Decomposition and Multiple Chaotic Maps International Journal of Signal Processing Systems Vol. 3, o., June 25 A obust Image Encryption Method ased on it Plane Decomposition and Multiple Chaotic Maps W. Auyporn and S. Vongpradhip Department

More information

IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION

IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION Gulf Journal of Mathematics Vol 4, Issue 4 (2016) 103-107 IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION M. ESSAID 1, A. JARJAR 2, I. AKHARRAZ 3 A. SAAIDI 4 AND A. MOUHIB 5 Abstract. In this paper we

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption I.J. Image, Graphics and Signal Processing, 24,, 5-6 Published Online October 24 in MECS (http://www.mecs-press.org/) DOI:.585/ijigsp.24..7 A Chaos-based Pseudorandom Permutation and Bilateral Diffusion

More information

Asymmetric Image Encryption Approach with Plaintext-Related Diffusion

Asymmetric Image Encryption Approach with Plaintext-Related Diffusion RADIOENGINEERING, VOL. 27, NO. 1, APRIL 218 281 Asymmetric Image Encryption Approach with Plaintext-Related Diffusion Jakub ORAVEC, Jan TURAN, Lubos OVSENIK, Tomas IVANIGA, David SOLUS, Michal MARTON Dept.

More information

Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process

Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process Seetaiah Kilaru, Yojana Kanukuntla, Asma Firdouse, Mohammad Bushra & Sindhu chava

More information

An image encryption based on DNA coding and 2DLogistic chaotic map

An image encryption based on DNA coding and 2DLogistic chaotic map An encryption based on DNA coding and 2DLogistic chaotic map FAYZA ELAMRAWY, MAHA SHARKAS, ABDEL MONEM NASSER Arab Academy for Science & Technology Abu Kir, Alexandria EGYPT engfayzaelamrawy@gmail.com,

More information

COLOR IMAGE ENCRYPTION BASED ON LOGISTIC MAPPING AND DOUBLE RANDOM PHASE ENCODING

COLOR IMAGE ENCRYPTION BASED ON LOGISTIC MAPPING AND DOUBLE RANDOM PHASE ENCODING Page 1 of 15 COLOR IMAGE ENCRYPTION BASED ON LOGISTIC MAPPING AND DOUBLE RANDOM PHASE ENCODING HUIQING HUANG 1,2, SHOUZHI YANG 1, Abstract. In this paper, we propose a novel method to encrypt a color image

More information

A NEW BLOCK CIPHER ALGORITHM FOR IMAGE ENCRYPTION BASED ON CHAOTIC SYSTEM AND S-BOX

A NEW BLOCK CIPHER ALGORITHM FOR IMAGE ENCRYPTION BASED ON CHAOTIC SYSTEM AND S-BOX International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 13, December 2018, pp.318 327, Article ID: IJCIET_09_13_032 Available online at http://www.ia aeme.com/ijciet/issues.asp?jtype=ijciet&vtype=

More information

A NOVEL IMAGE ENCRYPTION SCHEME USING CHAOTIC LOGISTIC MAPPING& HYBRID CELLULAR AUTOMATA

A NOVEL IMAGE ENCRYPTION SCHEME USING CHAOTIC LOGISTIC MAPPING& HYBRID CELLULAR AUTOMATA A NOVEL IMAGE ENCRYPTION SCHEME USING CHAOTIC LOGISTIC MAPPING& HYBRID CELLULAR AUTOMATA 1 YOGESHWARAN S, 2 VIGNESVAR K S, 3 PRABHU SOUNDHARIAN E M, 4 MS HANIS S Department of ECE, SSN College of Engineering,

More information

Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box

Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.10, October 2016 105 Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box Ashwak Mahmood Alabaichi University

More information

Secret Image Sharing Scheme Based on a Boolean Operation

Secret Image Sharing Scheme Based on a Boolean Operation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0023 Secret Image Sharing Scheme Based

More information

With the rapid development of digital technologies and

With the rapid development of digital technologies and ALMADAR JOURNAL FOR COMMUNICATIONS, INFORMATION TECHNOLOGY, AND APPLICATIONS 1 An Encryption Algorithm Based on Maps and Discrete Linear Chirp Transform Osama A S Alkishriwo 1 arxiv:187.2647v1 [eess.iv]

More information

Survey of 3D Chaotic Map Techniques for Image Encryption

Survey of 3D Chaotic Map Techniques for Image Encryption Survey of 3D Chaotic Map Techniques for Image Encryption Lokesh P. Gagnani 1, Dr. Sunita Varjani 2 1 Assistant Professor, Information and Technology Department Kalol Institute of Technology, Kalol, Gujarat,

More information

Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared with Another Algorithm

Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared with Another Algorithm 20 The International Arab Journal of Information Technology Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared with Another Algorithm Osama Abu Zaid 1,

More information

arxiv: v3 [cs.cr] 21 Sep 2016

arxiv: v3 [cs.cr] 21 Sep 2016 Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Chengqing Li,a,b, Kwok-Tung Lo b a College of Information Engineering, Xiangtan University, Xiangtan

More information

A Novel Image Stream Cipher Based On Dynamic Substitution

A Novel Image Stream Cipher Based On Dynamic Substitution Engineering, Technology & Applied Science Research Vol. 6, No. 5, 2016, 1195-1199 1195 A Novel Image Stream Cipher Based On Dynamic Substitution Abdelfattah Elsharkawi Software Engineering, Communication

More information

SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER

SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER Belazi Akram, Benrhouma Oussama, Hermassi Houcemeddine and Belghith Safya SysComLab, Ecole Nationale d Ingénieurs de Tunis (ENIT), Tunis, Tunisia belazi.akram@gmail.com

More information

A Fast Image Encryption Algorithm Based on Chaotic Maps and the Linear Diophantine Equation

A Fast Image Encryption Algorithm Based on Chaotic Maps and the Linear Diophantine Equation Comput. Sci. Appl. Volume 1, Number 4, 2014, pp. 232-243 Received: July 30, 2014; Published: October 25, 2014 Computer Science and Applications www.ethanpublishing.com A Fast Image Encryption Algorithm

More information

MPEG-2 and ECC Security in DCT Domain

MPEG-2 and ECC Security in DCT Domain MPEG-2 and ECC Security in DCT Domain Samia Bouaziz, Ramzi Hadaji and Abdellatif Mtibaa National School of Engineering of Monastir, Skannes 5000, Monastir, Tunisia. Abstract In this paper we give a new

More information

Colour image encryption based on logistic mapping and double random-phase encoding

Colour image encryption based on logistic mapping and double random-phase encoding IET Image Processing Research Article Colour image encryption based on logistic mapping and double random-phase encoding Huiqing Huang 1, Shouzhi Yang 1 1 Department of Mathematics, Shantou University,

More information

arxiv:cs/ v2 [cs.cr] 27 Aug 2006

arxiv:cs/ v2 [cs.cr] 27 Aug 2006 On the security of the Yen-Guo s domino signal encryption algorithm (DSEA) arxiv:cs/0501013v2 [cs.cr] 27 Aug 2006 Chengqing Li a, Shujun Li b, Der-Chyuan Lou c and Dan Zhang d a Department of Mathematics,

More information

RESEARCH ON IMAGE ENCRYPTION ALGORITHM BASED ON WAVELET TRANSFORM

RESEARCH ON IMAGE ENCRYPTION ALGORITHM BASED ON WAVELET TRANSFORM International Journal of Latest Research in Science and Technology Volume 2, Issue 5: Page No.32-36,September-October 203 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 RESEARCH ON IMAGE

More information

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using

More information

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,

More information

Research Article Chaotic Image Encryption Design Using Tompkins-Paige Algorithm

Research Article Chaotic Image Encryption Design Using Tompkins-Paige Algorithm Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 762652, 22 pages doi:10.1155/2009/762652 Research Article Chaotic Image Encryption Design Using Tompkins-Paige

More information

A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis

A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis Soosaimicheal Aruljothi (Corresponding author) Research Scholar, Department of Computer Applications, Kalasalingam University,

More information

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in September 2008. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

A New Image Cryptosystem Based on Chaotic Map and Continued Fractions

A New Image Cryptosystem Based on Chaotic Map and Continued Fractions A New Image Cryptosystem Based on Chaotic Map and Continued Fractions Atef Masmoudi, Mohamed Selim Bouhlel, William Puech To cite this version: Atef Masmoudi, Mohamed Selim Bouhlel, William Puech. A New

More information

FIELA: A Fast Image Encryption with Lorenz Attractor using Hybrid Computing

FIELA: A Fast Image Encryption with Lorenz Attractor using Hybrid Computing FIELA: A Fast Image Encryption with Lorenz Attractor using Hybrid Computing P Kranthi Kumar, B V Nagendra Prasad, Gelli MBSS Kumar, V. Chandrasekaran, P.K.Baruah Sri Sathya Sai Institute of Higher Learning,

More information

A Chaotic Block Cipher for Real-Time Multimedia

A Chaotic Block Cipher for Real-Time Multimedia Journal of Computer Science 8 (6): 994-1000, 2012 ISSN 1549-3636 2012 Science Publications A Chaotic Block Cipher for Real-Time Multimedia Radha, N. and M. Venkatesulu Department of Computer Applications,

More information

Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map

Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map entropy Article Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map A. A. Karawia 1,2 1 Department of Mathematics, Faculty of Science, Mansoura University,

More information

An Image encryption using pseudo random bit generator based on a non-linear dynamic chaotic system

An Image encryption using pseudo random bit generator based on a non-linear dynamic chaotic system An Image encryption using pseudo random bit generator based on a non-linear dynamic chaotic system ALGIMANTAS ČITAVIČIUS, AUDRIUS JONAVIČIUS Department of Electronics and Measurement Systems Kaunas University

More information

Encryption Approach for Images based on Householder Reflector Scheme and Extended Hill Cipher Techniques

Encryption Approach for Images based on Householder Reflector Scheme and Extended Hill Cipher Techniques Encryption Approach for Images based on Householder Reflector Scheme and Extended Hill Cipher Techniques Karima Djebaili 1 Lamine Melkemi 2 Department of Computer Science, University of Batna, Batna, Algeria

More information

Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application

Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application Moussa Farajallah Rawan Qumsieh Samer Isayed College of Information Technology and Computer Engineering Palestine Polytechnic University

More information

CHAPTER 6 EC BASED KEY GENERATION FOR SYMMETRIC ENCRYPTION

CHAPTER 6 EC BASED KEY GENERATION FOR SYMMETRIC ENCRYPTION 100 CHAPTER 6 EC BASED KEY GENERATION FOR SYMMETRIC ENCRYPTION 6.1 INTRODUCTION Stream ciphers are cryptographic primitives used to ensure privacy in digital communication. Security of stream cipher depends

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

A novel chaos-based image encryption scheme

A novel chaos-based image encryption scheme Annals of the University of Craiova, Mathematics and Computer Science Series Volume 41(1), 2014, Pages 47 58 ISSN: 1223-6934 A novel chaos-based image encryption scheme Ana Cristina Dăscălescu, Radu Boriga,

More information

A symmetric image encryption scheme based on 3D chaotic cat maps

A symmetric image encryption scheme based on 3D chaotic cat maps Chaos, Solitons and Fractals 21 (2004) 749 761 www.elsevier.com/locate/chaos A symmetric image encryption scheme based on 3D chaotic cat maps Guanrong Chen a, *, Yaobin Mao b, Charles K. Chui c,d a Department

More information

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,

More information

An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves

An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves Yuanyuan Sun 1 *, Lina Chen 2, Rudan Xu 1, Ruiqing Kong 1 1 College of Computer Science and Technology, Dalian University of Technology,

More information

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.194

More information

Statistical analysis of S-box in image encryption applications based on majority logic criterion

Statistical analysis of S-box in image encryption applications based on majority logic criterion International Journal of the Physical Sciences Vol. 6(16), pp. 4110-4127, 18 August, 2011 Available online at http://www.academicjournals.org/ijps DOI: 10.5897/IJPS11.531 ISSN 1992-1950 2011 Academic Journals

More information

Improving Security of the Baptista s Cryptosystem Using Two-step Logistic Map

Improving Security of the Baptista s Cryptosystem Using Two-step Logistic Map I. J. Computer Network and Information Security, 2015, 5, 34-40 Published Online April 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2015.05.05 Improving Security of the Baptista s Cryptosystem

More information

Fachbereich für Computerwissenschaften Paris Lodron-Universität Salzburg

Fachbereich für Computerwissenschaften Paris Lodron-Universität Salzburg Chaotic Encryption András Czuczi, Andreas Lindlbauer, Bernhard Pertiller Fachbereich für Computerwissenschaften Paris Lodron-Universität Salzburg http://www.referenceforbusiness.com/photos/chaos-theory515.jpg

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P))

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P)) CHAPTER 6. SYMMETRIC CIPHERS Multiple encryption is a technique in which an encryption algorithm is used multiple times. In the first instance, plaintext is converted to ciphertext using the encryption

More information

Matrix based Cryptographic Procedure for Efficient Image Encryption

Matrix based Cryptographic Procedure for Efficient Image Encryption Matrix based Cryptographic Procedure for Efficient Image Encryption Paul A.J Musaliar College of Engineering and echnology, Pathanamthitta, Kerala. Paul_a_j@yahoo.com P. Mythili Cochin University of Science

More information

Color Image Encryption in YCbCr Space

Color Image Encryption in YCbCr Space Color Image Encryption in YCbCr Space Xin Jin 1, Sui Yin 1, Xiaodong Li 1,*, Geng Zhao 1, Zhaohui Tian 1,2, Nan Sun 1, Shuyun Zhu 1,2 1 Beijing Electronic Science and Technology Institute, 100070, Beijing,China

More information

Image Encryption Using Chaos and Block Cipher

Image Encryption Using Chaos and Block Cipher Image Encryption Using Chaos and Block Cipher Alireza Jolfaei (Corresponding author) Faculty and Research Center of Communication and Information Technology IHU Tehran, Iran E-mail: Jolfaei@yahoo.com Abdolrasoul

More information

DESIGN AND IMPLEMENTATION OF PSEUDO RANDOM NUMBER GENERATOR USED IN AES ALGORITHM

DESIGN AND IMPLEMENTATION OF PSEUDO RANDOM NUMBER GENERATOR USED IN AES ALGORITHM DESIGN AND IMPLEMENTATION OF PSEUDO RANDOM NUMBER GENERATOR USED IN AES ALGORITHM M.SUNITHA (1), P.S.SUREKHA (2) M.TECH Scholor, VLSI Design, Jyothismathi College of Engineering and Technology (1) ASST.Professor,

More information

Chaotic Image Encryption Technique using S-box based on DNA Approach

Chaotic Image Encryption Technique using S-box based on DNA Approach Chaotic Image Encryption Technique using S-box based on DNA Approach Anchal Jain Pooja Agarwal Rashi Jain Vyomesh Singh ABSTRACT In recent years many DNA approach based encryption algorithms have been

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

1-7 Attacks on Cryptosystems

1-7 Attacks on Cryptosystems 1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from

More information

Open Access Analysis and Improvement for Image Encryption Algorithm Based on Multiple Chaotic Mapping

Open Access Analysis and Improvement for Image Encryption Algorithm Based on Multiple Chaotic Mapping Send Orders for Reprints to reprints@benthamscience.ae 1560 The Open Automation and Control Systems Journal, 2015, 7, 1560-1565 Open Access Analysis and Improvement for Image Encryption Algorithm Based

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

Image Encryption using the Two-dimensional Logistic Chaotic Map

Image Encryption using the Two-dimensional Logistic Chaotic Map Image Encryption using the Two-dimensional Logistic Chaotic Map Yue Wu a, Gelan Yang b, Huixia Jin b and Joseph P. Noonan a a Department of Electrical and Computer Engineering, Tufts University Medford,

More information

A Novel Dynamic Secret Key Generation for an Efficient Image Encryption Algorithm

A Novel Dynamic Secret Key Generation for an Efficient Image Encryption Algorithm Modern Applied Science; Vol. 9, No. 13; 2015 ISSN 1913-1844 E-ISSN 1913-1852 Published by Canadian Center of Science and Education A Novel Dynamic Secret Key Generation for an Efficient Image Encryption

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

Quality Assessment for Image Encryption Techniques using Fuzzy Logic System

Quality Assessment for Image Encryption Techniques using Fuzzy Logic System Quality Assessment for Image Encryption Techniques using Fuzzy Logic System Haider M. Al-Mashhadi University of Basrah, College of Computer Science and Information Technology, Computer Information Systems

More information

A GENERALIZED CONTINUED FRACTION-BASED ASYNCHRONOUS STREAM CIPHER FOR IMAGE PROTECTION

A GENERALIZED CONTINUED FRACTION-BASED ASYNCHRONOUS STREAM CIPHER FOR IMAGE PROTECTION 17th European Signal Processing Conference (EUSIPCO 2009) Glasgow, Scotland, August 24-28, 2009 A GEERALIZED COTIUED FRACTIO-BASED ASYCHROOUS STREAM CIPHER FOR IMAGE PROTECTIO A. MASMOUDI 1,2, W. PUECH

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of

More information

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

An SVD-based Fragile Watermarking Scheme With Grouped Blocks An SVD-based Fragile Watermarking Scheme With Grouped Qingbo Kang Chengdu Yufei Information Engineering Co.,Ltd. 610000 Chengdu, China Email: qdsclove@gmail.com Ke Li, Hu Chen National Key Laboratory of

More information

Open Access Research on a Robust Method for Image Steganography Transmission in Network. Yiran Wang *

Open Access Research on a Robust Method for Image Steganography Transmission in Network. Yiran Wang * Send Orders for Reprints to reprints@benthamscience.ae 1176 The Open Automation and Control Systems Journal, 2014, 6, 1176-1181 Open Access Research on a Robust ethod for Image Steganography Transmission

More information

I. INTRODUCTION II. EXISTING SYSTEM

I. INTRODUCTION II. EXISTING SYSTEM Design and Implementation of Pseudo Random Number Generator Used in AES Algorithm N.Madhavi 1, R.Viswanadham 2 M. Tech Student, Department of ECE, Shri Vishnu Engg College for women Asst. Professor, Department

More information

FAST HASH FUNCTION BASED ON BCCM ENCRYPTION ALGORITHM FOR E-COMMERCE (HFBCCM)

FAST HASH FUNCTION BASED ON BCCM ENCRYPTION ALGORITHM FOR E-COMMERCE (HFBCCM) FAST HASH FUNCTION BASED ON BCCM ENCRYPTION ALGORITHM FOR E-COMMERCE (HFBCCM) Mahmoud M. Maqableh School of Engineering and Computer Sciences, Durham University, South Road, Durham, DH1 3LE, United Kingdom,

More information

Journal of Information Engineering and Applications ISSN (print) ISSN (online) Vol 2, No.10, 2012

Journal of Information Engineering and Applications ISSN (print) ISSN (online) Vol 2, No.10, 2012 Abstract Encryption Quality and Performance Analysis of GKSBC Algorithm S. Arul jothi 1* Dr. M. Venkatesulu 2 1. Research Scholar, Department of Computer Applications, Kalasalingam University, Krishnankoil,

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher Design of a Cryptosystem Using Two-Level Hill Sarla Dewangan 1, Mrs. Shikha Pandey 2, Mohammad Imroze Khan 3 1 M-Tech scholar, 2 Assistant Professor, 3 Assistant Professor 1,2 Rungta College of Engineering

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),

More information

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications D.A. Karras 1 and V. Zorkadis 2 1 University of Piraeus, Dept. of Business Administration,

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to

More information

Gray Level Image Encryption

Gray Level Image Encryption Gray Level Image Encryption Roza Afarin, Saeed Mozaffari Abstract The aim of this paper is image encryption using Genetic Algorithm (GA). The proposed encryption method consists of two phases. In modification

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

ISA 562: Information Security, Theory and Practice. Lecture 1

ISA 562: Information Security, Theory and Practice. Lecture 1 ISA 562: Information Security, Theory and Practice Lecture 1 1 Encryption schemes 1.1 The semantics of an encryption scheme. A symmetric key encryption scheme allows two parties that share a secret key

More information

Master s Thesis. Computer Engineering, 30 credits

Master s Thesis. Computer Engineering, 30 credits Master s Thesis Computer Engineering, 30 credits Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Rizwan Haider ii Abstract Abstract The emerging topic, symmetric encryption

More information

arxiv: v1 [cs.cr] 4 Apr 2017

arxiv: v1 [cs.cr] 4 Apr 2017 Using Echo State Networks for Cryptography R. Ramamurthy, C. Bauckhage, K. Buza, and S. Wrobel Department of Computer Science, University of Bonn, Bonn, Germany arxiv:174.146v1 [cs.cr] 4 Apr 217 Abstract.

More information

Steganography by using Logistic Map Function and Cellular Automata

Steganography by using Logistic Map Function and Cellular Automata Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Differential cryptanalysis of image cipher using block-based scrambling and image filtering Feng Yu, Xinhui Gong, Hanpeng Li, Xiaohong Zhao, Shihong Wang School of Sciences, Beijing University of Posts

More information

Encryption and Decryption Image Using Multiobjective Soft Computing Algorithm. Table 4.1 The History of Soft Computing Algorithms Development

Encryption and Decryption Image Using Multiobjective Soft Computing Algorithm. Table 4.1 The History of Soft Computing Algorithms Development CHAPTER IV ENCRYPTION IMAGE USING GENETIC ALGORITHM 4.1. Introduction to Soft Computing Algorithms The soft computing algorithms are a set of techniques covering many fields that belong to various categories

More information

Information Security CS526

Information Security CS526 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream CIphers 1 Announcements HW1 is out, due on Sept 11 Start early, late policy is 3 total late days

More information