Font Size: a A A

An Eclectic Image Encryption Scheme Depending On Chaos Algorithm

Posted on:2017-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:Hussein Ridha Hussein SayeghFull Text:PDF
GTID:2348330512958856Subject:Computer Science
Abstract/Summary:PDF Full Text Request
Encryption is a common technique to support multimedia image security in storage and transmission over the network due to some ingrained features of image like big data redundancy and bulk data capacity.By the development of multimedia technology the transmission of information such as image and video is extensively used in real time data transportation.Most of traditional encryption algorithms does not have the efficient capability to securing multimedia data including image due to the intricacy of algorithm,complex computation and perfect correlation between pixel values of image.Adding that the key size is small(key size indeed the best attack point),with long time to get encryption/decryption.This paper displays new algorithm for the image encryption-decryption scheme.This paper is devoted to submit a secured image encryption technique using multiple chaotic based eclectic mapping.An Eclectic encryption algorithm produce a chaotic map used for permuting and diffusing multimedia image data.In permutation the pixel of image are exchanges by another value and in the process of diffusion the pixel values are shuffled within the image.Many methods have been devoted to examine better solutions for data encryption such as chaotic image encryption,selective image encryption.So the chaos-based encryption has been purpose as a modern and efficient way to deal with the intractable problem of quick and extremely secure image encryption.Chaotic systems have many important properties,such as the sensitive dependence on initial conditions and system parameters,pseudorandom property,no periodicity and topological transitivity,etc.In this paper,first,change RGB to YUV format,second adopting DCT to encrypt high level coefficient and some selective coefficients(diffuse layer)leads to diffusion process.Third,confusing all pixels of Y',U,V by applying chaotic standard map to be as a second layer of security encryption.Based on the initial conditions,there are two kinds of keys used diffusion and confusion,each map may produce various random numbers difference than other.The input image of 2-D is transformed into sub-arrays by divided into various sub blocks of 8×8 blocks.The focus on the top left corner of every sub-array because it have high level frequency(DCT)and nearest the first three level of AC(low frequency)to encrypt it.Then the position permutation and value permutation is applied to each sub matrix based on multiple chaos maps.Finally the receiver uses the same two level keys values to cipher the encrypted images.Due to the exceptional properties of mixing and sensitivity to the initial conditions and parameters of chaotic maps,chaos-based encryption is very simple in implementation with high level of efficiency and efficient way to get fast and highly safe image encryption.Chaos algorithm provides a good combination of reasonable computational overheads and computational power.This technique of eclectic image encryption depends on chaos algorithm has adopted which this technique uses two main operations:One to decor relates the relationship between adjacent pixels of plain image which is based on two dimensions chaotic standard map.The second to decor relates the relationship between the plain image and encrypted image which is based on four dimensions chaotic map.In empirical results show that the proposed scheme is computationally secure;it with stands different types of attacks such as brute force attack,differential attack,statistical attack and chosen-cipher text attacks.Also,experimental results show the proposed scheme is tunability and suitable for multimedia application with real time constraints where the average execution time is(1 second)when the encryption ratio of cryptosystem is equal to(6.26%).For Determine the designer of An Eclectic Image Encryption,issue should be taken into two considerations:The proposed encryption scheme should be designed to be tunable to different levels of security at the same time maintaining a satisfactory speed performance for different applications.The possibility of integrating the proposed encryption scheme with JPEG compression algorithm without affecting encoding work load complexity and compression ratio.Discrete cosines transform(DCT):It's a mathematical transformation that takes asignal and transforms DCT from spatial domain into frequency domain.From the implementation and analysis of the proposed scheme will put it as threepoints to be clear:The experiential checking have high secure,due the following results,has large key space.Sensitive to the slight change in secret keys for both confusion,Correlation coefficients between the image pixels approach zero and the proposition scheme has high value of NPCR nearly 100%.The tests shown that the scheme working is comparatively fast,the cryptosystem is tunable for a set of applications by tuning the parameters of confusion and diffusion,suggesting plan has no impact on pressure efficiency and the size of encrypted image does not increment.The decryption time is more than the time of encryption because there is need to execute extra operations in decryption approach.So the cipher scheme has high avalanche properties(MSE>42 dB),and according to the properties.
Keywords/Search Tags:Selective image encryption, Partial encryption, Chaotic map system, discrete cosine transform
PDF Full Text Request
Related items