Generic placeholder image

Current Signal Transduction Therapy

Editor-in-Chief

ISSN (Print): 1574-3624
ISSN (Online): 2212-389X

Research Article

A Hybrid Security System Based on Bit Rotation and Chaotic Maps

Author(s): Majdi Al-qdah*

Volume 14, Issue 2, 2019

Page: [152 - 157] Pages: 6

DOI: 10.2174/1574362413666180813113001

Abstract

Background: This paper presents an image security system by combining bit rotation with block based chaotic maps cryptography.

Methods: The system uses permutation technique that divides the image into blocks before applying right/left rotation of bits to the pixel values based on a randomly generated key. Then, the image blocks are fused together. A scrambling operation followed by chaotic map is applied on the rotated image to diffuse the image pixels using another randomly generated key. The chaotic map scatters all the pixel positions in the image. The decryption is the complete reversal operation of the encryption process.

Results & Conclusion: The performance of the proposed technique is evaluated using several metrics: Histograms of both original and cipher images, correlation of adjacent pixels and correlation between the original and cipher images, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR). The results indicate a very secure technique to protect all types of images.

Keywords: Encryption, decryption, bit rotation, chaotic maps, security, images.

Graphical Abstract

[1]
Tian J. Reversible data embedding using a difference expansion. IEEE T Circ Syst Vid 2013; p. 13.
[2]
Asadollahi H, Saberi Kamarposhti M, Moosavian Jandaghi E. Image encryption using cellular automata and arnold cat’s map. Aust J Basic Appl Sci 2011; 5(8)587593
[3]
Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE T Circ Syst Vid 2011; p. 16.
[4]
Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-LSB data embedding. IEEE T Image Process 2012.
[5]
Jawad LM, Sulong G. Chaotic map-embedded Blowfish algorithm for security enhancement of color image encryption. Nonlinear Dyn 2015; 81(4): 2079-93.
[http://dx.doi.org/10.1007/s11071-015-2127-9]
[6]
Ozturk I, Sogukpinaar I. Analysis and comparison of image encryption algorithms. Tran on Engineering. Comput Tech 2004; 3: 38-42.
[7]
Cho K, Miyano T. Chaotic cryptography using augmented lorenz equations aided by quantum key distribution. IEEE Trans Circuits Syst I Regul Pap 2015; 62(2): 478-87.
[http://dx.doi.org/10.1109/TCSI.2014.2365767]
[8]
Cao WJ, Zhou YC, Chen CLP, Xia LM. Medical image encryption using edge maps. Signal Processing 2016; 132: 96-109.
[http://dx.doi.org/10.1016/j.sigpro.2016.10.003]
[9]
Chen G, Mao Y, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21 Elsevier Ltd 2004; 79-761.
[10]
Wei-bin C, Xin Z. Image encryption algorithm based on Henon chaotic system. International Conference of Image Analysis and Signal Processing. 94-7.
[http://dx.doi.org/10.1109/IASP.2009.5054653]
[11]
Ur Rehman A, Liao X, Kulsoom A. Abbas S Selective encryption for gray images based on chaos and dna complementary rules. Multimed Tools Appl 2015.
[12]
Raghava N S, Kumar A. Image encryption using henon chaotic map with byte sequence IJCSEITR December 2013; 3(5).
[13]
Prasad M, Sudha KL. Chaos image encryption using pixel shuffling. CS & IT. Columbia, MO: Missouri Agric. Exp. Stn 2011; pp. 169-179,CSCP.
[14]
Wu Y, Joseph P. Noonan, Sos Agaian NPCR and UACI Randomness tests for image encryption Cyber Journals: Multidisciplinary Journals in Science and Technology JSAT 2011
[15]
Fu C, Lin B, Miao Y, Liu X. Chen, J. A Novel chaos-cased bit-level permutation scheme for digital image encryption. Opt Commun 2011; 284: 5415-23.
[http://dx.doi.org/10.1016/j.optcom.2011.08.013]
[16]
Telem ANK, Segning CM, Kenne G, Fotsin HB. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Adv Multim 2014; p. 602921.
[17]
Zhang X, Shao L, Zhao Z, Liang Z. An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electr Eng 2014; 40: 931-41.
[http://dx.doi.org/10.1016/j.compeleceng.2013.08.008]
[18]
Gupta P, Singh S, Mangal I. Image encryption based on arnold cat map and S-Box. Int J Adv Res Comput Sci Softw Eng 2014; 4(8)
[19]
Thamp C, Jose D. More secure color image encryption scheme based on 3D chaotic maps. IJARET 2015; 1(IX): 1-5.
[20]
Al-qdah M, Lin Yi Hu. Simple encryption/decryption application IJCSS 2008; 1(1).
[21]
Wanga Y. wong K W, Liao X F, Chen G R. A New chaos-based fast image encryption algorithm. Appl Soft Comput 2011; 11(1): 514-22.
[http://dx.doi.org/10.1016/j.asoc.2009.12.011]

© 2024 Bentham Science Publishers | Privacy Policy