Computer Algorithms for Direct Encryption and Decryption of Digital Images for Secure Communication
نویسندگان
چکیده
In this paper we design a new practical computer algorithm based on chaotic map lattices which allows direct encryption and decryption of color digital images. The basic idea is to convert, pixel by pixel, the image color to logistic chaotic maps one-way coupled by initial conditions. After small numbers of iterations and cycles, the image becomes indistinguishable due to inherent properties of chaotic systems. The image can be completely recovered by the corresponding decryption algorithm in the case if all secure keys, such as map parameters, number of iterations, number of cycles, and the image size are exactly known. We test our algorithm with a real color image and prove that our cryptosystem incorporates necessary properties inherent to a good cryptosystem. These are (i) high sensitivity to any changes in the image, (ii) high sensitivity to secret keys, (iii) absence of any patterns in the encoded image, and (iv) robustness against cryptographic attacks. We also discuss possibilities for improving our algorithm with further developments in computer techniques and new coupled schemes. Key-Words: Cryptography, chaos, logistic map, image encryption, secure communication
منابع مشابه
Image Encryption by Using Combination of DNA Sequence and Lattice Map
In recent years, the advancement of digital technology has led to an increase in data transmission on the Internet. Security of images is one of the biggest concern of many researchers. Therefore, numerous algorithms have been presented for image encryption. An efficient encryption algorithm should have high security and low search time along with high complexity.DNA encryption is one of the fa...
متن کاملPerformance analysis of Encryption and Decryption Algorithms for Securing Images
This paper focuses mainly on the different image encryption algorithms and various parameters. As the use of digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various techniques to encrypt the images for making the images more secure. Therefore, along with ...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملPartial encryption of compressed images and videos
The increased popularity of multimedia applications places a great demand on eecient data storage and transmission techniques. Network communication, especially over a wireless network , can easily be intercepted and must be protected from eavesdroppers. Unfortunately, en-cryption and decryption are slow and it is often diicult, if not impossible, to carry out real-time secure image and video c...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کامل