Image encryption algorithm based on chaotic mapping

Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, inte...

Full description

Saved in:
Bibliographic Details
Main Authors: Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi
Format: Article
Language:en
Published: Penerbit UTM Press 2003
Subjects:
Online Access:http://eprints.utm.my/2075/1/JTMKK39%28D%29bab1.pdf
http://eprints.utm.my/2075/
http://www.penerbit.utm.my/onlinejournal/39/D/JTMKK39D01.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1845470608341598208
author Salleh, Mazleena
Ibrahim, Subariah
Isnin, Ismail Fauzi
author_facet Salleh, Mazleena
Ibrahim, Subariah
Isnin, Ismail Fauzi
author_sort Salleh, Mazleena
building UTM Library
collection Institutional Repository
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
continent Asia
country Malaysia
description Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, integrity as well as the authenticity of images has become a major concern. This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. Unlike other popular encryption algorithms such as Triple-DES and IDEA, SIP manipulates pixels rather than bits. Generally, SIP comprises of three main components: (1) horizontalvertical transformation function (HVT); (2) shift function (S), and (3) gray scale function (GS). HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. GS function extends the algorithm to three-dimension, whereby, the third dimension refers to the level of the grayscale of a pixel. The algorithm supports two modes of operation namely Electronic Code Book (ECB) and Cipher Block Chaining (CBC). From the analysis done, SIP manage to encrypt images of various sizes even with the usage of weak keys that exist in Baker’s map encryption algorithm.
format Article
id my.utm.eprints-2075
institution Universiti Teknologi Malaysia
language en
publishDate 2003
publisher Penerbit UTM Press
record_format eprints
spelling my.utm.eprints-20752017-11-01T04:17:40Z http://eprints.utm.my/2075/ Image encryption algorithm based on chaotic mapping Salleh, Mazleena Ibrahim, Subariah Isnin, Ismail Fauzi QA75 Electronic computers. Computer science Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, integrity as well as the authenticity of images has become a major concern. This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. Unlike other popular encryption algorithms such as Triple-DES and IDEA, SIP manipulates pixels rather than bits. Generally, SIP comprises of three main components: (1) horizontalvertical transformation function (HVT); (2) shift function (S), and (3) gray scale function (GS). HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. GS function extends the algorithm to three-dimension, whereby, the third dimension refers to the level of the grayscale of a pixel. The algorithm supports two modes of operation namely Electronic Code Book (ECB) and Cipher Block Chaining (CBC). From the analysis done, SIP manage to encrypt images of various sizes even with the usage of weak keys that exist in Baker’s map encryption algorithm. Penerbit UTM Press 2003-12 Article PeerReviewed application/pdf en http://eprints.utm.my/2075/1/JTMKK39%28D%29bab1.pdf Salleh, Mazleena and Ibrahim, Subariah and Isnin, Ismail Fauzi (2003) Image encryption algorithm based on chaotic mapping. Jurnal Teknologi D (39D). pp. 1-12. ISSN 0127-9696 http://www.penerbit.utm.my/onlinejournal/39/D/JTMKK39D01.pdf
spellingShingle QA75 Electronic computers. Computer science
Salleh, Mazleena
Ibrahim, Subariah
Isnin, Ismail Fauzi
Image encryption algorithm based on chaotic mapping
title Image encryption algorithm based on chaotic mapping
title_full Image encryption algorithm based on chaotic mapping
title_fullStr Image encryption algorithm based on chaotic mapping
title_full_unstemmed Image encryption algorithm based on chaotic mapping
title_short Image encryption algorithm based on chaotic mapping
title_sort image encryption algorithm based on chaotic mapping
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/2075/1/JTMKK39%28D%29bab1.pdf
http://eprints.utm.my/2075/
http://www.penerbit.utm.my/onlinejournal/39/D/JTMKK39D01.pdf
url_provider http://eprints.utm.my/