Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
72 views

Encryption and Decryption Digital Image Using

This document proposes an encryption and decryption algorithm for digital images using a chaotic map. The algorithm generates an encryption key from a quadratic chaotic map using initial conditions and system parameters. It encrypts images by performing bitwise addition of image pixels and the chaotic key. Experimental results on test images show the encrypted images have uniform histograms, indicating the algorithm effectively hides image information. Future work could modify the algorithm to use a chaotic linear feedback shift register for improved encryption performance.

Uploaded by

saadmuheyfalh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Encryption and Decryption Digital Image Using

This document proposes an encryption and decryption algorithm for digital images using a chaotic map. The algorithm generates an encryption key from a quadratic chaotic map using initial conditions and system parameters. It encrypts images by performing bitwise addition of image pixels and the chaotic key. Experimental results on test images show the encrypted images have uniform histograms, indicating the algorithm effectively hides image information. Future work could modify the algorithm to use a chaotic linear feedback shift register for improved encryption performance.

Uploaded by

saadmuheyfalh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Encryption and Decryption Digital Image Using

Chaotic Map

By

Mohammed-Hussain Saad Muhi

Supervision

Nagham Mumtaz Kudhair Mustafa


Abstract

Cryptography is considered one of the most important and widely methods to


provide secrecy, integrity, confidentiality, and message recovery in all
multimedia such as digital images and videos. Cryptography aims to protect the
content of digital images during transmission and to be able to recover its
content on the receiver’s side with a sufficient level of accuracy. The strength of
the encryption and decryption system increased with increasing the randomness
and hiding the natural properties of the encrypted images. In this research, we
presented one of the most important and new methods to encrypt and decrypt
the digital image. The proposed algorithm is based on using the chaotic map to
generate the encryption-decryption key. This method is proposed depending on
the hi randomness feature of the chaotic signal which gives a very good feature
of the encrypted system. Finally, the study compared the results of the proposed
method with the results of other encryption algorithms; however, the results of
the comparison demonstrate the characteristics of the proposed method here.
1. Introduction

With the rapid development of communication systems and Internet, digital


images and other multimedia are more commonly and frequently transmitted in
the public communication network. Therefore, the protection of digital
information against illegal copying and distribution has become extremely
important, and image encryption technology becomes an important issue in the
encryption field. Many new encryption schemes have been proposed in
literature [1] and [2]. Some researchers proposed conventional encryption
methods for encrypting images and multimedia. However, this is not efficient
method due to the large data size and real-time constraints of image data. The
conventional encryption methods require a lot of time to directly encrypt
thousands of image pixels value. On the other hand, textual data, a decrypted
image is mostly acceptable although it contains small levels of distortion.
Therefore, for these two mentioned reasons, the algorithms that function well
for textual data may not be suitable for multimedia data [3]. On the other hand,
the chaotic encryption algorithms has been suggested as a new, fast, and
efficient way to deal with highly secure image encryption, and it has been
proved that in many proposed chaotic encryption algorithms has analogous but
different characteristics as compared with conventional algorithms [4] .

In the past years, many encryption modes have been proposed including scan
mode method [5], double random phase encoding [6], encoding and iterative
random rotation converts vector encoding [7, 8], the quad tree coding [9], and
coding and chaotic function Kolmogorov flow [10]. However, Due to the hi
randomness and initial sensitivity, chaotic encryption has been used widely and
developed fast [11].

In this report, an image encryption scheme based on a quadratic chaotic map


proposed in [12] and built under Matlab environment. However, the good
performance and the simple procedure design are the main advantages of this
proposed method.

The rest of this report is organized as follows: Section 2 looks at the


generating chaotic binary sequence based on quadratic chaotic map and gives
some discussion on it; Section 3 reports the proposed design procedure; the
experimental results and security analysis of the proposed encryption and
decryption algorithms are discussed in section 4; Finally, the conclusion is
summarized in section 5.

2. The Proposed Chaotic System and Its Properties

a. Chaotic Map

The chaotic map is a simple nonlinear model, but it has a complicated


dynamic behavior. The chaotic sequence produced by the chaotic map is
extremely sensitive to the change of its initial value. Any chaotic map can be
defined as [13] :

x n=f ( xn −1 ) , k =0 , 1, 2 , … (1)

Where x n is called the state, and f (xn-1) maps the state x n−1 to the next state x n .
However the quadratic chaotic map can be written as [12]:

x n=1−r ( x n−1 )2 (2)

This system exhibits a great variety of dynamics, depending upon the value
of the bifurcation parameter (r) [12].

b. Chaotic Binary Sequence Generator

The block diagram for the proposed chaotic sequence generator is shown in
Figure (1). The chaotic sequence generator shown in the block diagram
generates random chaotic signal from chaotic quadratic map for different initial
values xo and the bifurcation parameter r. the random chaotic signal is mapped
to binary to generate the final chaotic binary sequence.

Figure 1: Block diagram for chaotic sequence generator.

The proposed chaotic sequence generator shown in Figure (3) is built in


Matlab environment. However, the initial conditions of the chaotic map used in
this simulation program has been taken as xo=0.3 and r=2.

Figure (2) is showing the chaotic signal generation by the quadratic chaotic
map, and the Figure (3) is showing the chaotic binary sequence generated by
transfer chaotic signal to binary stream.
Chaotic signal
1
0.8 xo=0.3
xo=0.3001
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
0 5 10 15 20 25
Time Index

Figure 2 The chaotic signal generation by the quadratic chaotic map. (the
figure show the effect of change initial condition)

Chaotic Binary Sequence


1
0.9 xo=0.3
0.8 xo=0.3001
0.7
Signal Value

0.6
0.5
0.4
0.3
0.2
0.1
0
0 5 10 15 20 25
Time Index

Figure 3: The chaotig binary sequence genration by the proposed genrator.


(the figure show the effect of change initial condition)

3. The Proposed algorithm


In this section, we are introducing the procedure flowchart of the proposed
algorithm for encryption and decryption algorithm as shown in Figure (3) and
Figure (4), respectively.

Figure 3: The proposed encryption algorithm.


Figure 4: The proposed decryption algorithm.
4. The Experimental Results

The experimental results of the suggested encryption and decryption


algorithms have been fully discussed here. The suggested algorithm is built
under the Matlab environment and the test done on personal computer has a
core i5 CPU operates in clock speed equal to 2.53 GHz. However, the selected
images used in these experiments are “Flowers.bmp”, “Cameraman.bmp”, and
“Mountain.bmp” which are 640 × 480, 512 × 512, and 640 × 480 gray images.
The operation of the proposed algorithm is shown in Figure (5), where the
original, encrypted and decrypted images are shown.

Orgional image Encripted image Decripted image

Figure 5: operation of encryption and decryption algorithms using


a) Flowers.bmp, b) Cameraman.bmp, and c) Mountain.bmp.

In the next subsections, Histogram Analysis has been done on the


proposed algorithm to check the security. This test done on the cipher image
and the original image, which can be described as statistical analysis, to extract
the relationships between them.

5. Histogram Analysis

The histogram of any image is a chart showing the distribution of the pixel
intensity values. For example, in the 8-bit gray scale image, there are 256
different possible intensities. Therefore, the histogram of it will be display 256
numbers showing the distribution of the pixels amongst those intensities values.
However, the histogram of a good cipher image must have a fairly uniform
shape for any plain images.

Original image

Histogram of
original image

Cipher image

Histogram of
cipher image

Figure 6: Histogram analysis of the proposed encryption algorithm.


The histograms of the several original images which have widely different
content as well as the histograms of its encrypted images are shown in
Figure (6). However, the nearly uniform histograms of the encrypted images
refer to no information about the plain images that can be gathered through
histogram analysis and this attributed to the good encryption process.

6. Conclusion and suggestion for future works

In this work a chaotic image encryption algorithm have been discussed. This
algorithm is based on a quadratic chaotic map. The encryption key stream is
generated from quadratic chaotic map by choosing initial condition and
defragment parameter, and then the encryption process can be done by adding
(modulo-2) the stream pits of image to the encryption key generation from
quadratic chaotic map. The study is shown that the suggested algorithm gives a
good performance. Finally, to the future works, a new binary random generator
based on the chaotic linear feedback shift register will be proposed to modify
the performance of the encryption system.

7. References

[1] C. C. Chang, M. S. Hwang, and T. S. Chen, 2001, “A new encryption


algorithm for image cryptosystems”, Journal of Systems and Software,
Vol.58, pp. 83–91.
[2] Z. H. Guan, F.J. Huang, W.J. Guan, 2005, ''Chaos-based Image Encryption
Algorithm'', Physics Letters A, Vol. 346, pp. 153–157.
[3] A. Soleymani, Z. Ali, and M. Nordin, 2012, “A survey on principal aspects
of secure image transmission,” in Proceedings of World Academy of
Science, Engineering and Technology, pp. 247–254.
[4] Y. B. Mao, G. Chen, S.G. Lian, 2004, ''A novel fast image encryption
scheme based on the 3D chaotic Baker map'', International Journal of
Bifurcation and Chaos, Vol. 14, pp. 3613-362.
[5] M. François, T. Grosges, D. Barchiesi, and R. Erra, “A new image
encryption scheme based on a chaotic function,” Signal Processing: Image
Communication, vol. 27, no. 3, pp. 249–259, 2012.View at: Publisher
Site | Google Scholar
[6] H. Liu, X. Wang, and A. Kadir, “Image encryption using DNA
complementary rule and chaotic maps,” Applied Soft Computing Journal,
vol. 12, no. 5, pp. 1457–1466, 2012.View at: Publisher Site | Google
Scholar

[7] Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image
encryption,” Signal Processing, vol. 97, pp. 172–182, 2014.View
at: Publisher Site | Google Scholar

[8] A. Bakhshandeh and Z. Eslami, “An authenticated image encryption scheme


based on chaotic maps and memory cellular automata,” Optics and Lasers
in Engineering, vol. 51, no. 6, pp. 665–673, 2013.View at: Publisher
Site | Google Scholar

[9] R. Enayatifar, A. H. Abdullah, and M. Lee, “A weighted discrete imperialist


competitive algorithm (WDICA) combined with chaotic map for image
encryption,” Optics and Lasers in Engineering, vol. 51, no. 9, pp. 1066–
1077, 2013.View at: Publisher Site | Google Scholar

[10] H. Li and Y. Wang, “Double-image encryption based on discrete fractional


random transform and chaotic maps,” Optics and Lasers in Engineering,
vol. 49, no. 7, pp. 753–757, 2011.View at: Publisher Site | Google Scholar

[11] Q. Zhang, L. Guo, and X. Wei, “Image encryption using DNA addition
combining with chaotic maps,” Mathematical and Computer Modelling,
vol. 52, no. 11-12, pp. 2028–2035, 2010.View at: Publisher Site | Google
Scholar | MathSciNet

[12] S. M. Falih, “A Simple Chaotic Image Cryptography Algorithm Based on


New Quadratic Chaotic Map”, Journal of University of Babylon for Pure
and Applied Sciences, vpl. 25, no 4, pp.1222-1229, 2017.
[13] S. Azou, G. Burel, and C. Pistre, 2002, "A Chaotic Direct-Sequence
Spread-Spectrum System for Underwater Communication", IEEE-
Oceans'2002, Biloxi, Mississippi, October 29-31, 2002

You might also like