Abstract
The paper presents an amalgam approach for image encryption and authentication. An ideal image cipher should be such that any adversary cannot modify the image and if any modifications are made, can be detected. The proposed scheme is novel and presents a unique approach to provide two level security to the image. Hashing and two chaotic maps are used in the algorithm where hash of the plain image is computed and the image is encrypted using key dependent masking and diffusion techniques. Initial key length is 132-bits which is extended to 148-bits. Performance and security analysis show that the proposed scheme is secure against different types of attacks and can be adopted for real time applications.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Sinha, A., Singh, K.: A technique for image encryption using digital signature. Optics Communications 1, 229–234 (2003)
Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering 51(6), 665–673 (2013)
Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)
Kwok, H.S., Tang, W.K.S.: A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals 32, 1518–1529 (2007)
Shateesh Sam, I., Devraj, P., Bhuvaneshwaran, R.S.: A novel image cipher based on transformed logostic maps. Springer Science + Business Media, LLC (2010)
Qiu, J., Wang, P.: An image encryption and authentication scheme. In: 2011 Seventh International Conference on Computational Intelligence and Security (CIS), December 3-4, pp. 784–787. IEEE (2011)
Sabery, M., Yaghoobi, M.: A New Approach for Image encryption using Chaotic logistic map. 978-0-7695-3489-3/08 ©. IEEE (2008)
Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurcat. Chaos. 14, 3613–3624 (2004)
Matthew, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 8(1), 29–42 (1989)
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)
Pareek, N.K., Patidar, V., Sud, K.K.: Diffusion-Substitution bsed gray image encryption scheme. Digital Signal Processing 23(3), 894–901 (2013)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372, 5973–5978 (2008)
Sun, F., Liu, S., Li, Z., Lu, Z.: A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38, 631–640 (2008)
Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Physics Letters A 372, 394–400 (2008)
Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67, 2411–2417 (2012)
Wei, X., Guo, L., Zhanga, Q., Zhang, J., Lian, S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. The Journal of Systems and Software 85, 290–299 (2011)
Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52, 2028–2035 (2010)
Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 69, 1995–2007 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Rajput, A.S., Sharma, M. (2015). A Novel Image Encryption and Authentication Scheme Using Chaotic Maps. In: El-Alfy, ES., Thampi, S., Takagi, H., Piramuthu, S., Hanne, T. (eds) Advances in Intelligent Informatics. Advances in Intelligent Systems and Computing, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-319-11218-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-11218-3_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11217-6
Online ISBN: 978-3-319-11218-3
eBook Packages: EngineeringEngineering (R0)