American Journal of Signal Processing
p-ISSN: 2165-9354 e-ISSN: 2165-9362
2011; 1(1): 24-33
doi: 10.5923/j.ajsp.20110101.05
S. Shyamsunder , Ganesan Kaliyaperumal
TIFAC-CORE in Automotive Infotronics, VIT University, Vellore, Pincode, 632014, India
Correspondence to: Ganesan Kaliyaperumal , TIFAC-CORE in Automotive Infotronics, VIT University, Vellore, Pincode, 632014, India.
Email: | ![]() |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
In this paper we have proposed a scheme which incorporates the concept of modular arithmetic and chaos theory, for image encryption and decryption. In the proposed scheme, we have used chaos theory to generate the necessary random matrix and used the same for Image encryption. For Decryption, we have used look-up table approach to find the element by element modular inverse of the random matrix and use it for decryption of an encrypted image. Our proposed scheme seems to be robust against various attacks.
Keywords: Logistic Map, Sine Map, Chebyshev Map, Modular Inverse, Look-Up-Table
Cite this paper: S. Shyamsunder , Ganesan Kaliyaperumal , "Image Encryption and Decryption Using Chaotic Maps and Modular Arithmetic", American Journal of Signal Processing, Vol. 1 No. 1, 2011, pp. 24-33. doi: 10.5923/j.ajsp.20110101.05.
![]() | (1) |
![]() | (2) |
![]() | (3) |
![]() | (4) |
![]() | Algorithm 1. The above algorithm is our proposed scheme using the Logistic map |
![]() | Algorithm 2. The above algorithm is our proposed scheme using the Chebyshev map |
![]() | Algorithm 3. The above algorithm is our proposed scheme using the Sine map |
![]() | Figure 1. The look-up table operation. |
![]() | Figure 2. Encryption and decryption of the Image by our proposed Scheme using Logistic map. (a) Original Lenna Image, (b) Encrypted Lenna Image and (c) Decrypted Lenna Image. |
![]() | Figure 3. Encryption and decryption of the Image by our proposed Scheme using Chebyshev map. (a) Original Lenna Image, (b) Encrypted Lenna Image and (c) Decrypted Lenna Image. |
![]() | Figure 4. Encryption and decryption of the Image by our proposed Scheme using Sine map. (a) Original Lenna Image, (b) Encrypted Lenna Image and (c) Decrypted Lenna Image. |
![]() | Figure 11. Histograms of the original Image. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | Figure 12. Histograms of an encrypted image with Logistic map. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | Figure 13. Histograms of an encrypted image with Chebyshev map. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | Figure 14. Histograms of an encrypted image with Sine map. (a) Histogram of red component, (b) Histogram of green component and (c) Histogram of blue component. |
![]() | (5) |
![]() | (6) |
![]() | (7) |
![]() | (8) |
![]() | (9) |
![]() | Figure 15. Correlation analysis for the original image. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | Figure 16. Correlation analysis of the encrypted image with Logistic map. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | Figure 17. Correlation analysis of the encrypted image with Chebyshev map. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | Figure 18. Correlation analysis of the encrypted image with Sine map. (a) Correlation of two horizontally adjacent pixels, (b) Correlation of two vertically adjacent pixels, and (c) Correlation of two diagonally adjacent pixels. |
![]() | (10) |
|
![]() | (11) |
![]() | (12) |
![]() | (13) |
![]() | (14) |
![]() | Figure 19. Chosen/known-plaintext attack for the Logistic map. (a) Original Lenna Image, (b) Encrypted Lenna Image, (c) XOR mask, (d) Unknown cipher-text ( the original image was “Baboon”), and (e) Failed attempt to crack the cipher image of “Baboon”. |
![]() | Figure 20. Chosen/known-plaintext attack for the Chebyshev map. (a) Original Lenna Image, (b) Encrypted Lenna Image, (c) XOR mask, (d) Unknown cipher-text ( the original image was “Baboon”), and (e) Failed attempt to crack the cipher image of “Baboon”. |
![]() | Figure 21. Chosen/known-plaintext attack for the Sine map. (a) Original Lenna Image, (b) Encrypted Lenna Image, (c) XOR mask, (d) Unknown cipher-text ( the original image was “Baboon”), and (e) Failed attempt to crack the cipher image of “Baboon”. |
|
[1] | L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems”, Phys. Rev. Lett. 64, pp. 821-824, 1990 |
[2] | L. Kocarev, M. Sterjev, A. Fekete, and G. Vattay, “Public-key encryption with chaos”, Chaos 14, pp. 1078-1082, 2004 |
[3] | S. H. Wang, J. Y. Kuang, J. H. Li, Y. L. Luo, H. P. Lu, and G. Hu, “Chaos-based secure communications in a large community”, Phys. Rev. E 66, 065202, 2002 |
[4] | H. P. Lu, S. H. Wang, X. W. Li, G. N. Tang, J. Y. Kuang, W. P. Ye, and G. Hu, “A new spatiotemporally chaotic cryptosystem and its security and performance analyses”, Chaos 14, pp. 617-629, 2004 |
[5] | X. G. Wang, M. Zhan, C.-H. Lai, and G. Hu, “Error function attack of chaos synchronization based encryption schemes”, Chaos 14, pp. 128–137, 2004 |
[6] | X. G. Wang, X. F. Gong, M. Zhan, and C.-H. Lai, “Public-key encryption based on generalized synchronization of coupled map lattices”, Chaos 15, 023109, 2005 |
[7] | Zhang Yong, “Image Encryption with Logistic Map and Cheat Image”, International Conference on Computer Research and Development, pp. 97-101, March 2011 |
[8] | RashidahKadir, RosdianaShahril, and MohdAizainiMaarof, “A modified image encryption scheme based on 2D chaotic map”, International Conference on Computer and Communication Engineering, pp. 1-5, May 2010 |
[9] | M.Lakshmanan, and S.Rajasekar, “Nonlinear Dynamics: Integrability, Chaos, and Patterns”, Springer- Verlag Berlin Heidelberg, 2003 |
[10] | William Stallings, “Cryptography and Network Security”, Prentice-Hall of India, Fourth edition, 2006 |
[11] | Behrouz A. Forouzan, “Cryptography and Network Security”, Tata McGraw-Hill, Special Indian Edition 2007 |
[12] | K. Ganesan, Ishan Singh, and MansiNarain, “Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps”, Fifth International Conference on Computer Graphics, Imaging and Visualization, pp. 211-216, 26-28 August 2008 |
[13] | FangjunHuang ,Zhi-Hong Guan, “Cryptosystem using chaotic keys”, Chaos, Solitons and Fractals, 23, pp.851-855, 2005 |
[14] | K.Ganesan, R.Muthukumar, K.Murali, “Look-up Table Based Chaotic Encryption of Audio Files”,IEEE Trans. CircSyst 2006, APCCAS 2006, pp. 1951-1954, 2006 |
[15] | N.K. Pareek, VinodPatidar, K.K. Sud, “Image encryption using chaotic logistic map”, ScienceDirect, Image and Vision Computing, Volume 24, Issue 9, pp.926-934, 1 September 2006 |
[16] | Nawal El-Fishawy and Osama M. Abu Zaid, “Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms”, International Journal of Network Security, Volume 5, No.3, pp. 241–251, November2007 |
[17] | Daniel Socek, Shujun Li, Spyros S. Magliveras and BorkoFurht, “Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption”, IEEE International conference on security and privacy for emerging areas in communication, pp. 406-407, Sep2005 |