Abstract

An innovative method proposed for encrypting color images is comprised of one-time keys and chaos theory using a distinctive concept of rotor machine. The novelty of this scheme is that the rows and columns of 2-dimensional images are converted into circular object called rotor and can be rotated at 360 degrees in clockwise or anti clockwise direction. The rotation will change the existing rotor into new one and can be used in substitution process of plain image. This process can be repeated $\beta $ times and each time a new rotor is created just by a simple rotation. The rotation is performed in terms of pixels so degree of angle is converted into number of pixels. Using this method, same object with new face (after rotation) is used for encryption. The pixels of color image are permuted using the sorted index of logistic sequence. Then, three pseudo-random images are created from Piecewise Linear Chaotic Map (PWLCM). For substitution, both the permuted color channels and pseudo-random images are transformed into rotors. The angle is obtained from Chen chaotic system. The one-time keys are for chaotic maps are generated by using 512-bits hash of plain image. The simulated outcomes demonstrate that the proposed system has high quality of results and requires only single round of encryption to achieve high encryption along with high robustness against the transmission noises.

Highlights

  • Information security is an active research area from decades

  • The plain image I is used in system, has size of N 2 × 3 and encryption is achieved using following steps: Input: The I is a 24-bit color image,s0, t0, p0, w0, x0, y0, and β are the seeds for different chaotic systems

  • The initial seeds used for trials/simulation are required by Logistic, Piecewise Linear Chaotic Map (PWLCM) maps are: s0 = 0.123456789010, p0 = 0.2345678900 and t0 = 0.3456789012

Read more

Summary

INTRODUCTION

Information security is an active research area from decades. Even in the old era, the transmission of information required security and can be accessed by unauthorized eavesdroppers. The one-time pad is used to modify the common initial conditions of chaotic maps by 512-bits hash of plain image to survive against chosen plaintext attack. The substitution phase is based on the concept of rotor cipher in which each alphabet is mapped to some fixed alphabet and rotors rotate one step In this technique, a rotor of a plain image is added under the modulus 2 operation with a pseudo-rotor generated from the random image. The proposed system uses the idea of rotor substitution cipher to achieve image encryption using chaotic maps. N 2 The array C consists of N 2 angles and the proposed system requires only a few of these to rotate the rotors created from pseudo images.

3) SUMMARY OF METHODOLOGY
EXPERIMENTS AND RESULTS
ROBUSTNESS AGAINST NOISE ATTACKS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call