Professional Documents
Culture Documents
Image Encryption Scheme Based On Composition of Chaotics Maps
Image Encryption Scheme Based On Composition of Chaotics Maps
0.8
for data encryption is certainly not new idea and can be 0.7
0.5
0.2
1
2019, JEERD
Journal of Electronic Engineering Research and Development (JEERD)
Volume 1, Issue 1, August 2019
[ ] [ ][ ]
( ) (4)
where x (mod 1) means the fractional parts of a real
Fig. 2. Discretized baker map number x by subtracting or adding an appropriate integer.
The map is known to be chaotic. The unit square is first
Now, how the pixels in each box are mapped to a row of stretched by the linear transform and then folded by the
pixels need to be specified. Since the original baker map is modulo operation. The results of applying the cat map to the
continuous on each box, the only plausible discretization is to test image after 1, 2, and 9 iterations are shown in Fig.5.
map the box column by column. An example for N = 16,
is shown below. The rectangle
is mapped to a row of 16 pixels as follows in Fig. 3.
The results of applying the discretized baker map to the test
image after 1, 2, and 9 iterations are shown in Fig.4.
(a) (b)
2
2019, JEERD
Journal of Electronic Engineering Research and Development (JEERD)
Volume 1, Issue 1, August 2019
105 208 122 96 123 3 246 144 98 126 102 224 236 9 52 41
1 64 32 163 52 73 175 6 241 215 28 156 132 202 11 41
40 238 54 117 175 174 235 206 172 29 127 182 149 99 205 122
178 34 79 106 36 58 225 13 120 99 135 203 39 177 116 251
230 89 220 199 195 193 232 224 49 16 245 33 145 112 139 31
190 88 202 129 81 99 200 90 151 219 6 166 134 122 63 111
1 62 230 230 135 67 200 61 166 114 19 85 228 129 61 240
118 38 166 226 198 39 120 92 224 79 36 183 119 130 242 36
70 124 142 31 9 223 73 25 125 108 246 62 148 36 151 200
62 200 88 166 177 117 33 3 177 237 63 117 101 100 181 78
149 222 47 109 104 48 132 58 17 253 236 27 28 160 48 132
197 55 220 198 107 143 144 60 83 39 20 105 22 17 191 204
153 58 245 186 200 3 64 113 124 106 30 175 254 189 228 32
184 68 35 79 13 45 230 83 76 146 247 218 39 123 184 156
200 24 66 44 104 54 26 81 244 129 151 183 155 211 41 85
192 154 155 218 251 202 151 163 72 203 235 93 148 3 30 47
3
2019, JEERD
Journal of Electronic Engineering Research and Development (JEERD)
Volume 1, Issue 1, August 2019
8 bits 8 bits
Plaintext (8 bits) Cyphertext (8 bits) Cyphertext (8 bits) Plaintext (8 bits)
Fig. 7. Encryption and decryption schemes: (a) encryption scheme, (b) decryption scheme
(a) (b)
(a) (b) Fig. 12. The 2D Spectrum: (a) the Plane Image, (b) the
Fig. 8. Plane Images: (a) Lena, (b) Twin Encrypted Image
4
2019, JEERD
Journal of Electronic Engineering Research and Development (JEERD)
Volume 1, Issue 1, August 2019
a different initial value and control parameter will result in a security and faster enciphering and deciphering speeds that is
different S-box. The result of statistical test of the proposed suitable for multimedia applications. So the proposed
scheme is shown in Table III. scheme is very suitable for the real-time digital image
encryption.
III. The result of statistical test of the proposed scheme
REFERENCES
0.8
AES
0.7 SAFER-K64
Blowfish
0.6
The Proposed Algorithm
0.5
Time(Sec)
0.4
0.3
0.2
0.1
0
64 4096 16384 65536
Plaintext Size (Byte)
6) CONCLUSION
In this paper, new encryption scheme using dynamical
S-box and chaotic maps has been proposed. Security analysis
and other tests of this scheme are performed. The proposed
encryption scheme passes test for FIPS PUB 140-2, Security
Requirements for Cryptographic Modules of National
Institute of Standard and Technology. To sum up, our
proposed new scheme of the chaotic image encryption has
good confusion and diffusion properties. Comparing with
existing traditional ciphers, the new scheme has higher
5
2019, JEERD