IJCNIS Vol. 4, No. 7, 8 Jul. 2012
Cover page and Table of Contents: PDF (size: 979KB)
Full Text (PDF, 979KB), PP.19-26
Views: 0 Downloads: 0
Image Encryption, Chaos, Logistic Map, Cipher Block Chaining, Cryptanalysis
In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryption is proposed. It is a simple block cipher based on logistic chaotic maps and cipher block chaining (CBC). The new system utilizes simplicity of implementation, high quality, and enhanced security by the combined properties of chaos and CBC cipher. Implementation of the proposed technique has been realized for experimental purposes, and tests have been carried out with detailed analysis, demonstrating its high security. Results confirm that the scheme is unbreakable with reference to many of the well-known attacks. Comparative study with other algorithms indicates the superiority of CMBC security with slight increase in encryption time.
Ibrahim S. I. Abuhaiba, Hanan M. Abuthraya, Huda B. Hubboub, Ruba A. Salamah, "Image Encryption Using Chaotic Map and Block Chaining", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.7, pp.19-26, 2012. DOI:10.5815/ijcnis.2012.07.03
[1]M. A. Bani and A. Jantan, "Image Encryption Using Block Base Transformation Algorithm," IJCSNS International Journal of Computer Science and Network Security, vol. 8 no. 4, pp. 191-197, 2008.
[2]C. Chang, M. Hwang, and T. Chen, "A New Encryption Algorithm for Image Cryptosystem," The Journal of Systems and Software, vol. 58, pp. 83–91, 2001.
[3]J. Cheng Yen and J. Guo, "A new chaotic key-based design for image encryption and decryption," In Proc. IEEE Int. Symp. Circuits and Systems (ISCAS'2000), Lausanne, vol. 4, 2000, pp. 49–52.
[4]Y. Zhang, F. Zuo, Z. Zhai, C. Xiaobin , "A New Image Encryption Algorithm Based on Multiple Chaos System," Proc. 2008 International Symp. Electronic Commerce and Security, Guangzhou, China, Aug. 2008, pp. 347-350.
[5]H. Eldean Ahmed, H. M. Kalash, and O. S. Faragallah, "Implementation of RC5 block cipher algorithm for image cryptosystem," International Journal of Information Technology, vol. 3, no. 4, pp. 245-250, 2004.
[6]S. Li and X. Zheng, "Cryptanalysis of a chaotic image encryption method," in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS'2002), Arizona, vol. 2, 2002, pp. 708–711.
[7]H. Chen and J. Yen, "A new cryptography system and its VLSI realization," Journal of Systems Architecture, vol. 49, no. 7, pp. 355-367(13), October 2003.
[8]S. Lian, J. Sun, and Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Phys. Lett. A 351, pp. 645-661, 2005.
[9]S. Li, C. Li, G. Chen, and K-T Lo, "Cryptanalysis of the RCES/RSES image encryption scheme," The Journal of Systems and Software, vol. 81, no. 7, pp. 1130-1143, 2008.
[10]E. Weisstein (11, 2008). Logistic Equation. MathWorld- A Wolfram Web Resource, Available: http://mathworld.wolfram.com/ LogisticEquation.html
[11]B. Furht and D. Kirovski, "Multimedia Security Handbook," CRC Press LLC, December 2004, ch. 4.
[12]E. Weisstein (11, 2008). Logistic Map. MathWorld- A Wolfram Web Resource, Available: http://mathworld.wolfram.com/LogisticMap.html
[13]S. Li, "Analyses and new designs of digital chaotic ciphers," Ph.D. dissertation, Info. And Comm. Eng., Xi'an Jiaotong Univ., China, 2007.