Abstract

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).

Highlights

  • Cryptography provides secure communication among individuals, governmental organization, corporations through the utilizing of codes and it can be used effectively to nullify the value of cyber threats in the presence of malicious third-parties, phishing, interception of information being stored in database or sent via networks

  • To evaluate the efficiency of the proposed encryption technique according to the above security measurements, a number of experimental tests were performed, as shown in Tables.[1,2,3], on more than 500 color/gray image samples collected from different color maps data sets of various dimensions and format types

  • From the results displayed in the previous Table, it is clearly indicated in 1st row that the obtained Histogram and Entropy for both original and cipher images are not changed when just applying the proposed 2-D key matrix permutation

Read more

Summary

Introduction

Cryptography provides secure communication among individuals, governmental organization, corporations through the utilizing of codes and it can be used effectively to nullify the value of cyber threats in the presence of malicious third-parties, phishing, interception of information being stored in database or sent via networks Only those intended parties for whom the information was sent can interpret and analyze it. Chaos-based schemes are dominant techniques due to high randomization, simple cryptographic processes, and its sensitivity to initial control parameters, such that a minor deviation in its input parameters can lead to a large change in the output range values. This will guarantee that the plain-data and/or secret key can’t be reconstructed 5, 8, 9

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call