A Novel Technique for Simultaneous Encryption of Multiple Images Using 3D Chaotic Permutation

نویسندگان

  • Prabhudev Jagadeesh
  • P. Nagabhushan
چکیده

With the swift increase of digital data exchange and increased usage of digital images, it is important to protect the confidential image data from illegitimate access. Digital image scrambling or encryption is the solution which transforms a meaningful image into a meaningless or disordered image in order to enhance the ability to tackle attack and in turn improve the security. However inherent features of image data such as bulky nature, high redundancy and high correlation among pixels demand the need to treat an image in a different way from text data regarding confidentiality. In this paper a novel scheme is proposed to simultaneously encrypt multiple images in an image database or image folder. Images are stacked and are viewed as a 3D block of images. Permutation of image pixels/blocks across the images is done using 3D chaotic permutation and pixel substitution using three-way grid based noise induction. 2D grid structure projected on each dimension of the 3D block of images defines the scrambling nature of pixels resulting in varied distortion of information. The proposed novel model of perceiving multiple images as 3D block of images and simultaneous scrambling provides an additional level of complexity for unauthorized access. The proposed scheme is more apt for secured storage of images. The experimental results demonstrate that the proposed algorithm can effectively and simultaneously scramble the images, and the security analysis of the algorithm also reveals that the proposed scheme can survive various attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods

⎯ This paper presents a novel chaos-based cryptosystem for secure transmitted images. In the proposed block encryption/decryption algorithm, two chaotic permutation methods (key-dependant shift approach and Socek method) are used to shuffle the image pixel bits. These methods are controlled using a perturbed chaotic PWLCM map. The perturbing orbit technique improves the dynamical statistical pr...

متن کامل

A New Chaos-Based Cryptosystem for Secure Transmitted Images

This paper presents a novel and robust chaos-based cryptosystem for secure transmitted images and four other versions. In the proposed block encryption/decryption algorithm, a 2D chaotic map is used to shuffle the image pixel positions. Then, substitution (confusion) and permutation (diffusion) operations on every block, with multiple rounds, are combined using two perturbed chaotic PWLCM maps....

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015