Skip to main content

A Highly Robust and Secure Digital Image Encryption Technique

  • Conference paper
  • First Online:
Information Science and Applications 2017 (ICISA 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Included in the following conference series:

  • 2739 Accesses

Abstract

Robust and secure image encryption requires primarily a very large key-space and immunity to differential attack. We report in this paper a new novel encryption technique using chaotic Logistic map, a support image, and a hyper-chaotic 4-D system. The support image, which is available both with the transmitter and the receiver, is utilized to enhance the robustness and security possible from the encryption algorithms based on chaotic Logistic map and Hyper-chaotic system. The support image is used in two different ways in two schemes that provide different levels of key-space enhancement and immunity to differential attacks. The final stage of the technique uses either one round or two rounds of pixel value diffusion with hyper-chaotic system. The results reported here are encouraging to defeat attacks attempted with high computing resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wong, K., Kwok, B.S., Law, W.: A fast image encryption scheme based on chaotic standard map. Elsevier Phys. Lett. A 372, 2645–2652 (2008)

    Article  MATH  Google Scholar 

  2. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8, 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  3. Scharinger, J.: Fast encryption of image data using Kolmogorov flows. J. Electron. Imaging 7, 318–325 (1998)

    Article  Google Scholar 

  4. Xiao, H., Zhang, G.: An image encryption scheme based on chaotic systems In: Fifth International Conference on Machine Learning and Cybernetics, Dalian, pp. 2707–2711 (2006)

    Google Scholar 

  5. Fu, C., Huang, J., Wang, N., Hon, Q., Lei, W.: A symmetric chaos-based image cipher with an improved bit-level permutation strategy. Entropy 16, 770–788 (2014)

    Article  Google Scholar 

  6. Gao, T., Chen, Z.: A new encryption algorithm based on hyper-chaos. Elsevier Physics Letters A, pp. 396–400 (2008)

    Google Scholar 

  7. Vaidyanathan, S., Volos, C., Pham, V.: Hyperchaos, adaptive control and synchronization of a novel 5-D hyperchaotic system with three positive Lyapunav exponents and its SPICE implementation. Arch. Control Sci. 24(4), 409–446 (2014)

    MathSciNet  MATH  Google Scholar 

  8. Tong, X., Liu, Y., Zhang, M., Xu, H., Wang, Z.: An image encryption scheme based on hyperchaotic Rabinovich and exponential chaos maps. Entropy 17, 181–196 (2015)

    Article  Google Scholar 

  9. Fu, C., Lin, B.B., Miao, Y.S., Chen, J.J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284, 5415–5423 (2011)

    Article  Google Scholar 

  10. Zhu, Z.L., Zhang, W., Womg, K.W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181, 1171–1186 (2011)

    Article  Google Scholar 

  11. Zhang, G.J., Shen, Y.: A novel bit-level image encryption method based on chaotic map and dynamic grouping. Commun. Theor. Phys. 58, 520–524 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  12. Hussain, M.A.: Simple encryption encoding for data hiding and security applications. In: The 3rd International Conference on Multimedia Technology, Published by Atlantis Press, Guangzhou, China, pp. 1621–1628 (2013)

    Google Scholar 

  13. Bora, P., Bora, J., Hussain, M.A.: A novel and robust mage encryption algorithm using logistic map and hyper chaotic system. In: IEEE Conference I2CT 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Anwar Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Hussain, M.A., Bora, P., Bora, J. (2017). A Highly Robust and Secure Digital Image Encryption Technique. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics