American Journal of Signal Processing
p-ISSN: 2165-9354 e-ISSN: 2165-9362
2011; 1(1): 24-33
doi: 10.5923/j.ajsp.20110101.05
S. Shyamsunder , Ganesan Kaliyaperumal
TIFAC-CORE in Automotive Infotronics, VIT University, Vellore, Pincode, 632014, India
Correspondence to: Ganesan Kaliyaperumal , TIFAC-CORE in Automotive Infotronics, VIT University, Vellore, Pincode, 632014, India.
| Email: | ![]() |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
In this paper we have proposed a scheme which incorporates the concept of modular arithmetic and chaos theory, for image encryption and decryption. In the proposed scheme, we have used chaos theory to generate the necessary random matrix and used the same for Image encryption. For Decryption, we have used look-up table approach to find the element by element modular inverse of the random matrix and use it for decryption of an encrypted image. Our proposed scheme seems to be robust against various attacks.
Keywords: Logistic Map, Sine Map, Chebyshev Map, Modular Inverse, Look-Up-Table
Cite this paper: S. Shyamsunder , Ganesan Kaliyaperumal , "Image Encryption and Decryption Using Chaotic Maps and Modular Arithmetic", American Journal of Signal Processing, Vol. 1 No. 1, 2011, pp. 24-33. doi: 10.5923/j.ajsp.20110101.05.
![]() | (1) |
. It is possible to prove that a has a multiplicative inverse in Zn if gcd(n,a)=1. Whereaandn are said to be relatively prime.The Extended Euclidean algorithm can be used to find the multipicative inverse of b in Zn[10],[11]. Hence, using Extended Euclidean algorithm we calculate the inverse of a number and store it in a look-up table.![]() | (2) |
![]() | (3) |
![]() | (4) |
![]() | Algorithm 1. The above algorithm is our proposed scheme using the Logistic map |
![]() | Algorithm 2. The above algorithm is our proposed scheme using the Chebyshev map |
helps us to remove the negative numbers in our selection of positive odd numbers.![]() | Algorithm 3. The above algorithm is our proposed scheme using the Sine map |
![]() | Figure 1. The look-up table operation. |
Lenna colour Image. Look-Up-Table concept in the proposed scheme makes the decryption time to be much faster. We shall see the time performance of our scheme with the corresponding chaotic maps in the next section 6.7. We have also carried out various attacks and the results are shown in the section 6. Our proposed scheme happens to be robust and faster when compared to the other schemes.The Figures. 2,3,4 are the experimental results of our proposed scheme. We have shown the encryption and decryption results.![]() | Figure 2. Encryption and decryption of the Image by our proposed Scheme using Logistic map. (a) Original Lenna Image, (b) Encrypted Lenna Image and (c) Decrypted Lenna Image. |
![]() | Figure 3. Encryption and decryption of the Image by our proposed Scheme using Chebyshev map. (a) Original Lenna Image, (b) Encrypted Lenna Image and (c) Decrypted Lenna Image. |
![]() | Figure 4. Encryption and decryption of the Image by our proposed Scheme using Sine map. (a) Original Lenna Image, (b) Encrypted Lenna Image and (c) Decrypted Lenna Image. |
is encrypted using the secret key 1489035384202401 and as a result we get an encrypted image 5(b).2. The same original image is then encrypted by changing the secret key by 1 digit i.e. 1489035384202402 and as a result we get an encrypted image 5(c).![]() | Figure 11. Histograms of the original Image. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | Figure 12. Histograms of an encrypted image with Logistic map. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | Figure 13. Histograms of an encrypted image with Chebyshev map. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | Figure 14. Histograms of an encrypted image with Sine map. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | (5) |
![]() | (6) |
![]() | (7) |
![]() | (8) |
![]() | (9) |
image. We randomly choose 1000 pairs of two adjacent pixels (horizontal, vertical and diagonal) and plotted in a graph against each other. From Figures. 16 to 18, it is clear that there is a very negligible correlation between the two adjacent pixels in the encrypted images.![]() | Figure 15. Correlation analysis for the original image. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | Figure 16. Correlation analysis of the encrypted image with Logistic map. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | Figure 17. Correlation analysis of the encrypted image with Chebyshev map. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | Figure 18. Correlation analysis of the encrypted image with Sine map. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | (10) |
|
images: I, I' and J'. Here I' is the encrypted image of the image I using a key k. J' is the another cipher text image which was encrypted using the same algorithm with the same key k. Im is the mask image which was obtained by XOR-ing the plaintext image I with its corresponding cipher text image I'. If we use the XOR-ing based techniques for encryption, then we can recover the unknown plaintext image J by XOR-ing the Im mask with the unknown cipher text image J' [17]. But our proposed schemes are very much robust that there is no scope of recovering the unknown plain text image J.If the encryption technique is XOR based then the recovery of unknown image J is possible[17]. This is done by the following equations:![]() | (11) |
![]() | (12) |
![]() | (13) |
![]() | (14) |
![]() | Figure 19. Chosen/known-plaintext attack for the Logistic map. (a) Original Lenna Image, (b) Encrypted Lenna Image, (c) XOR mask, (d) Unknown cipher-text ( the original image was “Baboon”), and (e) Failed attempt to crack the cipher image of “Baboon”. |
image. The Table 3 shows the encryption and decryption time of our proposed scheme. By viewing the data, we see that the logistic map and our schemehas the least time and hence is the fastest of our proposed scheme with different chaotic maps.![]() | Figure 20. Chosen/known-plaintext attack for the Chebyshev map. (a) Original Lenna Image, (b) Encrypted Lenna Image, (c) XOR mask, (d) Unknown cipher-text ( the original image was “Baboon”), and (e) Failed attempt to crack the cipher image of “Baboon”. |
![]() | Figure 21. Chosen/known-plaintext attack for the Sine map. (a) Original Lenna Image, (b) Encrypted Lenna Image, (c) XOR mask, (d) Unknown cipher-text ( the original image was “Baboon”), and (e) Failed attempt to crack the cipher image of “Baboon”. |
|
| [1] | L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems”, Phys. Rev. Lett. 64, pp. 821-824, 1990 |
| [2] | L. Kocarev, M. Sterjev, A. Fekete, and G. Vattay, “Public-key encryption with chaos”, Chaos 14, pp. 1078-1082, 2004 |
| [3] | S. H. Wang, J. Y. Kuang, J. H. Li, Y. L. Luo, H. P. Lu, and G. Hu, “Chaos-based secure communications in a large community”, Phys. Rev. E 66, 065202, 2002 |
| [4] | H. P. Lu, S. H. Wang, X. W. Li, G. N. Tang, J. Y. Kuang, W. P. Ye, and G. Hu, “A new spatiotemporally chaotic cryptosystem and its security and performance analyses”, Chaos 14, pp. 617-629, 2004 |
| [5] | X. G. Wang, M. Zhan, C.-H. Lai, and G. Hu, “Error function attack of chaos synchronization based encryption schemes”, Chaos 14, pp. 128–137, 2004 |
| [6] | X. G. Wang, X. F. Gong, M. Zhan, and C.-H. Lai, “Public-key encryption based on generalized synchronization of coupled map lattices”, Chaos 15, 023109, 2005 |
| [7] | Zhang Yong, “Image Encryption with Logistic Map and Cheat Image”, International Conference on Computer Research and Development, pp. 97-101, March 2011 |
| [8] | RashidahKadir, RosdianaShahril, and MohdAizainiMaarof, “A modified image encryption scheme based on 2D chaotic map”, International Conference on Computer and Communication Engineering, pp. 1-5, May 2010 |
| [9] | M.Lakshmanan, and S.Rajasekar, “Nonlinear Dynamics: Integrability, Chaos, and Patterns”, Springer- Verlag Berlin Heidelberg, 2003 |
| [10] | William Stallings, “Cryptography and Network Security”, Prentice-Hall of India, Fourth edition, 2006 |
| [11] | Behrouz A. Forouzan, “Cryptography and Network Security”, Tata McGraw-Hill, Special Indian Edition 2007 |
| [12] | K. Ganesan, Ishan Singh, and MansiNarain, “Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps”, Fifth International Conference on Computer Graphics, Imaging and Visualization, pp. 211-216, 26-28 August 2008 |
| [13] | FangjunHuang ,Zhi-Hong Guan, “Cryptosystem using chaotic keys”, Chaos, Solitons and Fractals, 23, pp.851-855, 2005 |
| [14] | K.Ganesan, R.Muthukumar, K.Murali, “Look-up Table Based Chaotic Encryption of Audio Files”,IEEE Trans. CircSyst 2006, APCCAS 2006, pp. 1951-1954, 2006 |
| [15] | N.K. Pareek, VinodPatidar, K.K. Sud, “Image encryption using chaotic logistic map”, ScienceDirect, Image and Vision Computing, Volume 24, Issue 9, pp.926-934, 1 September 2006 |
| [16] | Nawal El-Fishawy and Osama M. Abu Zaid, “Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms”, International Journal of Network Security, Volume 5, No.3, pp. 241–251, November2007 |
| [17] | Daniel Socek, Shujun Li, Spyros S. Magliveras and BorkoFurht, “Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption”, IEEE International conference on security and privacy for emerging areas in communication, pp. 406-407, Sep2005 |