Abstract
Recent years have witnessed a strong relationship between chaos and cryptography. Owing to this relationship, development in one field directly impacts the other field. High computational resources are consumed in re-designing of the complete cryptosystem due to a newly developed chaotic map. Also, the tools developed to discern chaos leads to easy cryptanalysis of chaotic cryptosystems. To save resources and overcome easy cryptanalysis, this paper proposes a spatial domain based chaotic cryptosystem that employs different chaotic maps during permutation-substitution process. Multiple iterations have been performed to achieve resistance against various cryptanalytic and error function attacks, that are specifically designed for chaos based cryptosystems. The proposed technique has been generalized and verified for different chaotic maps. A significant benefit of the proposed cryptosystem is its support for chaotic system free property, which allows replacement of an existing chaotic map with a different map at a later stage. Thorough performance, security and comparative analysis ascertains efficacy of the proposed technique.









Similar content being viewed by others
References
Álvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14:3743–3749
Álvarez G, Montoya F, Romeraa M, Pastor G (2000) Cryptanalysis of a chaotic encryption system. Phys Lett A 276:191–196
Álvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys Lett A 319:334–339
Behnia S, Akhsani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366(4–5):391–396
Bose R, Pathak S (2006) A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circuits Syst I 53(4):848–857
Chang W-D (2009) Digital secure communication via chaotic systems. Digit Signal Process 19(4):693–699
Chen G, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 12:749–761
Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I, Fundam Theory Appl 48(12):1498–1508
Dachselt F, Kelber K, Schwarz W, Vundewalle J (1998) Chaotic versus classical stream ciphers—a comparative study, vol IV. In: Proc. int. symp. circuits syst., Monterey, CA, USA, pp 518–521
El-Bakary EM, Zahran O, El-Dolil SA, Abd El-Samie FE (2009) Chaotic maps: a tool to enhance the performance of OFDM systems. Int J Commun Netw Inf Secur 1(2):54–58
Guan Z-H, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153–157
Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77
Johnson M, Ishwar P, Prabhakaran V, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10, Part 2):2992–3006
Li S, Mou X, Cai Y (2001) Improving security of chaotic encryption approach. Phys Lett A 290:127–133
Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: Proc. IEEE international symp. circuits syst., Arizona, vol 2, pp 708–711
Li S, Li C, Lo K-T, Chen G (2006) Cryptanalysis of an image encryption scheme. J Electron Imaging 15(4), article number 043012
Li S, Li C, Chen G, Bourbakis NG, Lo K-T (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process, Image Commun 23(3):212–223
Marion A (1991) An introduction to image processing. Chapman and Hall, London
Norcen R, Podesser M, Pommer A, Schmidt H-P, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(7):277–292
Peterson G (1997) Arnold’s cat map. Available from http://online.redwoods.cc.ca.us/instruct/darnold/maw/catmap3.htm
Pommer A, Uhl A (2002) Application scenarios for selective encryption of visual data. In: Dittmann J, Fridrich J, Wohlmacher P (eds) Multimedia and security wkshp., ACM Multimedia, pp 71–74
Schonberg D, Draper SC, Yeo C, Ramchandran K (2008) Toward compression of encrypted images and video sequences. IEEE Trans Inf Forensics Secur 3(4):749–762
Sun F, Liu S, Li Z Lu Z (2008) A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38:631–640
Uhl A, Pommer A (2005) Application scenarios for the encryption of visual data. In: Image and video encryption from digital rights management to secured personal communication, vol 15. Advances in inform. security. Springer, Berlin, pp 31–43
Wang X, Zhan M, Lai C-H, Gang H (2004) Error function attack of chaos synchronization based encryption schemes. Chaos (American Institute of Phyics) 14(1):128–137
Wong K-W, Sin-Hung Kwok B, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652
Xing-Yuan W, Qing Y (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574–581
Yang H, Liao X, Wong K-w, Zhang W, Wei P (2009) A new cryptosystem based on chaotic map and operations algebraic. Chaos Solitons Fractals 40(5):2520–2531
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Taneja, N., Raman, B. & Gupta, I. Chaos based cryptosystem for still visual data. Multimed Tools Appl 61, 281–298 (2012). https://doi.org/10.1007/s11042-011-0837-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-011-0837-7