A Review on Chaos-Based Image Encryption Using Fractal Function

A Review on Chaos-Based Image Encryption Using Fractal Function

Anandkumar R., Kalpana R.
Copyright: © 2020 |Pages: 15
DOI: 10.4018/978-1-7998-0066-8.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The tremendous development in the field of telecommunication and computer technologies leads to the preference of transferring information as a digital data. In this transformation of information, cryptography helps in encrypting/decrypting digital data, so that intruders will not be able to sniff the highly confidential information. Most information is transferred as a digital image, where image encryption is done by scrambling the original pixels of the image, and hence, the correlation between the original pixel and scrambled pixel differs leading to confusion to unauthorized accesses. Chaotic image encryption is one of the recent technologies in cryptosystems, where a pseudorandom and irregular key is used for encryption/decryption, as the key suffers a great change if some initial conditions are altered, leading to highly secured transmission in the network. In this chapter, a detailed survey is conducted on chaotic image encryption using fractal function, in which fractal key is used for encryption and decryption of an image.
Chapter Preview
Top

Introduction

Encryption of images transferred through an open medium, can be very easily hacked by unauthorized users and is vulnerable to unexpected changes in the image leading to the breech of confidential information. Various procedures are being proposed till now, in order to protect the confidentiality of the image based information from intruders. All techniques encompass the vital criteria mentioned in the following section:

  • Low Correlation: The original image and the encrypted image should not correlate can be preferably so zero, so that the attackers will not be able to predict the encrypted image (Kumari et al., 2017).

  • Large Key Size: The larger the key size, there will be very less probability for brute force attack (Kumari et al., 2017).

  • Key Sensitivity: When an intruder tries to manipulate the image pixel in order to decrypt the confidential image, that activity or any minute change, should lead to a completely different encrypted image (Kumari et al., 2017).

  • Less Time-Complexity: The whole image encryption/decryption methodology should consume very less time, as the performance may degrade if the methodology has higher time (Kumari et al., 2017).

  • There are more than 15 image encryption techniques, which preserves the image from unintended users as well as, encompassing the above discussed criteria. The following are the image-based encryption algorithm:

    • o

      Vigene`re Cipher

    • o

      Data Encryption Standard (DES)

    • o

      International Data Encryption Algorithm (IDEA)

    • o

      Blowfish

    • o

      Visual Cryptography

    • o

      RC4, RC5, RC6

    • o

      Triple Data Encryption Standard (TDES)

    • o

      Advanced Encryption Standard (AES)

    • o

      Scheme Based on Intertwining Chaotic Maps

    • o

      Scheme Based on Chaotic Function Using Linear Congruence’s

    • o

      Scheme Based on Mixed Transform Logistic Maps

    • o

      Scheme Based on Peter De Jong Chaotic Map and RC4 Stream Cipher

    • o

      Scheme Based on Chaotic Map and Vigene`re Scheme

Performance analysis was done on all 15 image algorithms wherein correlation, key size, key sensitivity and time complexity were taken as performance evaluators. Table 1 depicts the performance measure of the above presented image encryption algorithms (Kumari et al., 2017).

Table 1.
Performance evaluation of image encryption methods
Performance evaluator/Image encryption methodsCorrelationKey sizeKey sensitivityTime Complexity
Vigene`reHighreasonableLowleast
DESModerateLowHighhigh
IDEAModerateLowHighHigh
BlowfishModerateLowHighModerate
VisualVery lowmoderateLeastLeast
RC4Very lowreasonableHighLeast
RC5moderatereasonableHighHigh
RC6moderatereasonableHighHigh
TDESHighreasonableLowHigh
AESModerateModerateHighLow
Chaotic MapsVery lowModerateHighLow
Chaotic functionVery lowModerateHighHigh
Logistic mapsVery lowModerateHighModerate
Chaotic map and RC4Very lowMaximumHighModerate
Chaotic map &Vigene’reVery lowMaximumHighLeast

Key Terms in this Chapter

Chaos Mapping: Chaotic map is an evolution function that shows some part of chaotic behavior. The chaotic mapping will be either discrete or continuous.

Chaos Theory: Chaos theory is the branch of mathematics deals with complicated linear dynamic systems.

Cryptography: Art of secret writing.

Encryption: Encryption is process of converting a plain text to cipher text.

Decryption: Decryption is a process of converting cipher text to plain text.

Complete Chapter List

Search this Book:
Reset