Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach

Full Text (PDF, 740KB), PP.60-66

Views: 0 Downloads: 0

Author(s)

Tarun Kumar 1,* Shikha Chauhan 1

1. Department of Computer Science Engineering Radha Govind Group of Institutions, Meerut UP, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2018.03.07

Received: 27 Sep. 2017 / Revised: 6 Oct. 2017 / Accepted: 13 Oct. 2017 / Published: 8 Mar. 2018

Index Terms

Matrix Array Symmetric Key, Chaos based Encryption, Cryptography, Image Security, Image Encryption

Abstract

With the increase in use of digital technology, use of data items in the format of text, image and videos are also increases. To securely send this data, many users and smart applications have adapted the image encryption approach. But the existing concepts are based on general AES approach. There is need to securely send the data with the addition of some expert image encryption and key generation approach. In this paper, we are using Matrix Array Symmetric Key (MASK) for the key generation and Chaos based approach for the image encryption. The main function of MASK is to generate the key for the encryption and decryption. The encryption process involves the generation of key. We have considered the key of MASK-256 for the encryption having 16 rounds. Chaos based concept has been considered for the encryption of image. Here, permutation- substitution based chaos based approach has been adopted for the image encryption. Moreover, in this approach, we have adapted the concept of partial encryption of image pixels instead of complete encryption so that in case of arrack, intruder can be confused with the partial encrypted image. In this approach, different image samples having different sizes have been considered. Further, concept is evaluated based on the parameters of Information Entropy, Elapsed Time, Precision, Recall and F-Measure.

Cite This Paper

Tarun Kumar, Shikha Chauhan, "Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.3, pp.60-66, 2018. DOI:10.5815/ijcnis.2018.03.07

Reference

[1]Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. Handbook of applied cryptography, CRC press 1996.
[2]Stallings, W. Cryptography and network security: principles and practices. Pearson Education India 2006.
[3]Stark, E., Hamburg, M., & Boneh, D., “Symmetric cryptography in javascript”, Computer Security Applications Conference, 2009. ACSAC'09. Annual (pp. 373-381). IEEE.
[4]Ganesan, R..U.S. Patent No. 5,737,419. Washington, DC: U.S. Patent and Trademark Office 1998.
[5]Roy, A., Misra, A. P., & Banerjee, S. “Chaos-based image encryption using vertical-cavity surface-emitting lasers”, arXiv preprint arXiv: 1705.00975 2017.
[6]Chai, X., Chen, Y., & Broyde, L. “A novel chaos-based image encryption algorithm using DNA sequence operations”, Optics and Lasers in Engineering, 88, 197-213 2017.
[7]Wang, J. “Digital Image Encryption Algorithm Design
Based on Genetic Hyperchaos”, International Journal of Optics, 2016.
[8]Li, C. “Cracking a hierarchical chaotic image encryption algorithm based on permutation”, Signal Processing, 118, 203-210 2016.
[9]Zhao, J., Guo, W., & Ye, R. “Achaos-based image encryption scheme using permutation-substitution architecture”, Int. J. Comput. Trends Technol, 15(4), 174-185 2014.
[10]Paul, A. J., & Nair, L. R. “Matrix based Substitution and Diffusion Procedure for Fast Image Encryption”, International Journal of Computer Applications, 80(3) 2013.
[11]Paul, V., & Mythili, P. (2007). “Matrix Array Symmetric-Key Encryption”. Journal of the CSI Vol, 37(1) 2007.
[12]Usama, M., Khan, M. K., Alghathbar, K., & Lee, C. “Chaos-based secure satellite imagery cryptosystem”. Computers & Mathematics with Applications, 60(2), 326-337 2010.
[13]Belazi, A., El-Latif, A. A. A., Diaconu, A. V., Rhouma, R., & Belghith, S. “Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms.” Optics and Lasers in Engineering, 88, 37-50 2017.
[14]Belazi, A., Khan, M., El-Latif, A., & Belghith, S. “Efficient cryptosystem approaches: S-boxes and permutation substitution based encryption”, Nonlinear Dynamics, 87(1), 337-361 2017.
[15]Shannon, C. E. “Communication theory of secrecy systems”, Bell system technical journal, 28(4), 656-715 1949.
[16]Debnath, D., Deb, S., & Kar, N. “An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography” In Computational Intelligence and Networks (CINE), International Conference on (pp. 178-183). IEEE 2015.
[17]Avasare, M., & Kelkar, V. “Image Encryption using Chaos Theory”, International Journal of Global Technology Initiatives, 3(1), B135-B142 2104.
[18]Dadhich, A., & Yadav, S. K. “Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptography and Cryptanalysis: State-of-the-art review”, optimization, 3(6) 2014.
[19]M.I.Khalil, "Real-Time Encryption/Decryption of Audio Signal", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.25-31, 2016.DOI: 10.5815/ijcnis.2016.02.03
[20]M.I.Khalil, “Real-Time Encryption/Decryption of Audio Signal”, International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.25-31, 2016.DOI: 10.5815/ijcnis.2016.02.03
[21]Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, “New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher”, International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.4, pp. 29-36, 2017.DOI: 10.5815/ijcnis.2017.04.04