Day of Hunger
Hi, welcome everyone in my page.....
Sunday, February 1, 2015
Monday, January 12, 2015
An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Chaotic Functions with ShiftColumns Manipulation
AMIT KUMAR PRADHAN
B-Tech in Computer science and engineering
amitvicky91@gmail.com
Abstract
In
my paper, I have implemented new approaches which are forming Advance
Cryptography Encipherment system whose resist all types of attack and secure
data from adversary. It’s basically belonging to AES
category, built as a substitution permutation networks and bits are changed in
every round. In particular, each round, we XOR the input with the round key Ki,
then send the result through a substitution phase, and finally send the result
through a permutation layer, that all layers in AES are reversible. Our vision
is not only secure data (like image), recovery with serious damage and secure
form cryptanalysis and Statistical Attack.
Keywords: Advance image encryption,
logistic map, henon map, whirpool.
1.
INTRODUCTION
D
|
ata Encryption is one of the
important fields of the cryptograph, so before sending the information to
another side the user needs to make his data unreadable by using any encrypting
methods e.g.: encrypting the E-mail password. If we consider about multimedia
data like image; is not like protecting the data since the image needs special
rules to encrypt it. Until now, various data encryption algorithms have been
used over the internet; to protect the data transmissions between the users
such as: RSA, IDEA or DES. If we apply those methods on the image, we need a
long of time to encrypt and decrypt the image and some of them may not be
useful to encrypt the data in a real time communication. Furthermore, the chaos
theory was firstly used in the computer system by Edward Lorenz 1963.
The deterministic behavior of the
chaos system, initial sensitivity, parameter sensitivity and unpredictability
are the main reasons that bring chaos on the image encryption. Many researchers
try to solve this problem by using different chaos systems, like [11] they used
a hybrid method for image encryption by applying multi-chaotic systems; to
increase the key space and make system’s breaking very difficult. Where, the
calculations and the executions time to encrypt the image are very large.
Therefore, in they used Rossler chaotic system to encrypt the image by applying
changes in the pixels value and their position to increase the uncertainty in
the cipher image. The one time pads with
the Logistic
Map (as a chaotic function) are used in to encrypt the image and
increase the size of the encrypted keys. Others like proposed new modifications
to the Advanced Encryption Standard (MAES) to increase the security level by
using a chaotic system.
Edward Lopez derived a Chaos
theory which is a part of mathematical physics. A chaotic system based on
confusion and diffusion was developed in 1989 Chaotic systems are sensitive,
non-liner, deterministic and easy to reconstruct after filling in the image. Hénon
Map is one of the chaotic maps used for generating Pseudo-random
sequence required for encryption. Hénon chaotic map discovered in 1978 is used
as a symmetric key stream cipher cryptographic system. It is mathematical in
nature.
A linear independence between
adjacent pixels and to use a logistic map use for image shuffling and Hénon Map
use for image encryption, and end of the stage, i implemented a Substitute Bytes encryption system for
special use of matrix manipulation technique that belong to WHIRPOOL CIPHER
this uses the ShiftColumns transformation which makes the cryptosystem very
efficient and robust.
Sunday, July 20, 2014
Subscribe to:
Comments (Atom)