Monday, January 12, 2015

An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Chaotic Functions with ShiftColumns Manipulation

AMIT KUMAR PRADHAN
B-Tech in Computer science and engineering
amitvicky91@gmail.com


Abstract
In my paper, I have implemented new approaches which are forming Advance Cryptography Encipherment system whose resist all types of attack and secure data from adversary. It’s basically belonging to AES category, built as a substitution permutation networks and bits are changed in every round. In particular, each round, we XOR the input with the round key Ki, then send the result through a substitution phase, and finally send the result through a permutation layer, that all layers in AES are reversible. Our vision is not only secure data (like image), recovery with serious damage and secure form cryptanalysis and Statistical Attack.
Keywords: Advance image encryption, logistic map, henon map, whirpool.

1.      INTRODUCTION

D
ata Encryption is one of the important fields of the cryptograph, so before sending the information to another side the user needs to make his data unreadable by using any encrypting methods e.g.: encrypting the E-mail password. If we consider about multimedia data like image; is not like protecting the data since the image needs special rules to encrypt it. Until now, various data encryption algorithms have been used over the internet; to protect the data transmissions between the users such as: RSA, IDEA or DES. If we apply those methods on the image, we need a long of time to encrypt and decrypt the image and some of them may not be useful to encrypt the data in a real time communication. Furthermore, the chaos theory was firstly used in the computer system by Edward Lorenz 1963.
The deterministic behavior of the chaos system, initial sensitivity, parameter sensitivity and unpredictability are the main reasons that bring chaos on the image encryption. Many researchers try to solve this problem by using different chaos systems, like [11] they used a hybrid method for image encryption by applying multi-chaotic systems; to increase the key space and make system’s breaking very difficult. Where, the calculations and the executions time to encrypt the image are very large. Therefore, in they used Rossler chaotic system to encrypt the image by applying changes in the pixels value and their position to increase the uncertainty in the cipher image.  The one time pads with the Logistic Map (as a chaotic function) are used in to encrypt the image and increase the size of the encrypted keys. Others like proposed new modifications to the Advanced Encryption Standard (MAES) to increase the security level by using a chaotic system.
Edward Lopez derived a Chaos theory which is a part of mathematical physics. A chaotic system based on confusion and diffusion was developed in 1989 Chaotic systems are sensitive, non-liner, deterministic and easy to reconstruct after filling in the image. Hénon Map is one of the chaotic maps used for generating Pseudo-random sequence required for encryption. Hénon chaotic map discovered in 1978 is used as a symmetric key stream cipher cryptographic system. It is mathematical in nature.
A linear independence between adjacent pixels and to use a logistic map use for image shuffling and Hénon Map use for image encryption, and end of the stage, i implemented a   Substitute Bytes encryption system for special use of matrix manipulation technique that belong to WHIRPOOL CIPHER this uses the ShiftColumns transformation which makes the cryptosystem very efficient and robust.

No comments:

Post a Comment