Abstract
This paper presents an implementation of 2D chaotic Baker map using different modes of operation in the fractional Fourier transform domain on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation: cipher block chain, cipher feedback, and output feedback, in which the initialization vector works as the main key. We examine its implementation for digital images along with its detailed security analysis. The security analysis includes the statistical analysis, the histogram analysis, the correlation coefficient metric, the maximum deviation metric, the irregular deviation metric, the noise immunity, the processing time, and the key space analysis. Experimental results verify and prove that the proposed image cryptosystem is highly secure from the cryptographic viewpoint, more immune to noise, has high key sensitivity, and takes less processing time.
Similar content being viewed by others
References
Furht, B., Socek, D.: A Survey of Multimedia Security, Technical Report August 21 2003
Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)
Daemen, J., Sand, B., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)
Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. IMA Int. Conf. Crypt. Coding 2260, 205–221 (2001)
Gotz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic cryptosystems-part I: statistical design approach. IEEE Trans. Circuits Syst.-1: Fundam. Theory Appl. 44, 963–970 (1997)
Wang, K., Pei, W., Zou etl, L.: Security of public key encryption technique based on multiple chaotic system. Phys. Lett. A 360, 259–262 (2006)
Huang, F., Feng, Y.: Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm. Front Electr. Electron. Eng. China 4(1), 5–9 (2009)
Peng, J., Jin, S., Chen, G., Yang, Z., Liao, X.: An image encryption scheme based on chaotic map. Presented at the 4th International Conference on Natural Computation, vol. 4, pp. 595–599 (2008)
Zhai, Y., Lin, S., Zhang, Q.: Improving image encryption using multi-chaotic map. Presented at Workshop on Power Electronics and Intelligent Transportation System, pp. 143–148 (2008)
El-din, H., Ahmed, H., Kalash, H.M., Farag Allah, O.S.: An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica 31(1), 121–129 (2007)
McBride, A.C., Kerr, F.H.: On Namias’ fractional Fourier transforms. IMA J. Appl. Math. 39, 159–175 (1987)
Ozaktas, H.M.: Fractional Fourier domains. Signal Process. 46, 119–124 (1995)
Ozaktas, H.M., Zalevsky, Z., Kutay, M.A.: The Fractional Fourier Transform. Wiley, Chichester (2001)
Elashry, I.F., Farag Allah, O.S., Abbas, A.M., El-Rabaie, S., Abd El-Samie, F.E.: Homomorphic image encryption. J. Electro. Imaging 18(3), 033002-1–033002-14 (2009)
El-Fishawy, N., Abu Zaid, O.M.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)
Kuo, C.J.: Novel image encryption technique and its application in progressive transmission. J. Electron. Imaging 2(4), 345–351 (1993)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Elhoseny, H.M., Ahmed, H.E.H., Abbas, A.M. et al. Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. SIViP 9, 611–622 (2015). https://doi.org/10.1007/s11760-013-0490-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11760-013-0490-x