Abstract
Background: This paper presents an image security system by combining bit rotation
with block based chaotic maps cryptography.
Methods: The system uses permutation technique that divides the image into blocks before applying
right/left rotation of bits to the pixel values based on a randomly generated key. Then, the image
blocks are fused together. A scrambling operation followed by chaotic map is applied on the
rotated image to diffuse the image pixels using another randomly generated key. The chaotic map
scatters all the pixel positions in the image. The decryption is the complete reversal operation of
the encryption process.
Results & Conclusion: The performance of the proposed technique is evaluated using several
metrics: Histograms of both original and cipher images, correlation of adjacent pixels and correlation
between the original and cipher images, Number of Pixel Change Rate (NPCR), Unified Average
Changing Intensity (UACI), Mean Square Error (MSE), and Peak Signal to Noise Ratio
(PSNR). The results indicate a very secure technique to protect all types of images.
Keywords:
Encryption, decryption, bit rotation, chaotic maps, security, images.
Graphical Abstract
[1]
Tian J. Reversible data embedding using a difference expansion. IEEE T Circ Syst Vid 2013; p. 13.
[2]
Asadollahi H, Saberi Kamarposhti M, Moosavian Jandaghi E. Image encryption using cellular automata and arnold cat’s map. Aust J Basic Appl Sci 2011; 5(8)587593
[3]
Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE T Circ Syst Vid 2011; p. 16.
[4]
Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-LSB data embedding. IEEE T Image Process 2012.
[6]
Ozturk I, Sogukpinaar I. Analysis and comparison of image encryption algorithms. Tran on Engineering. Comput Tech 2004; 3: 38-42.
[9]
Chen G, Mao Y, Chui C K. A symmetric image encryption scheme
based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21
Elsevier Ltd 2004; 79-761.
[11]
Ur Rehman A, Liao X, Kulsoom A. Abbas S Selective encryption for gray images based on chaos and dna complementary rules. Multimed Tools Appl 2015.
[12]
Raghava N S, Kumar A. Image encryption using henon chaotic map with byte sequence IJCSEITR December 2013; 3(5).
[13]
Prasad M, Sudha KL. Chaos image encryption using pixel shuffling. CS & IT. Columbia, MO: Missouri Agric. Exp. Stn 2011; pp. 169-179,CSCP.
[14]
Wu Y, Joseph P. Noonan, Sos Agaian NPCR and UACI Randomness tests for image encryption Cyber Journals: Multidisciplinary Journals in Science and Technology JSAT 2011
[16]
Telem ANK, Segning CM, Kenne G, Fotsin HB. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Adv Multim 2014; p. 602921.
[18]
Gupta P, Singh S, Mangal I. Image encryption based on arnold cat map and S-Box. Int J Adv Res Comput Sci Softw Eng 2014; 4(8)
[19]
Thamp C, Jose D. More secure color image encryption scheme based on 3D chaotic maps. IJARET 2015; 1(IX): 1-5.
[20]
Al-qdah M, Lin Yi Hu. Simple encryption/decryption application IJCSS 2008; 1(1).