ISSN: 1813-0410

Keywords : Chaotic map


Fast And Secure Image Encryption System For Real Time Applications And Mobile Communications

Manaf Mohammed Ali

journal of kerbala university, Volume 11, Issue 2, Pages 19-31

The strength of image encryption systems are depending on confusion (change the pixel position ) and diffusion(change the pixel value) and most of researchers separate these operations and perform these in cascading form with different algorithms, so there are some drawbacks in this cryptosystem and may be cryptanalyzed soon. In this paper proposed image encryption system based on chaotic map due to special properties of chaotic theory, such as pseudo-randomness, no periodicity and sensitivity to initial conditions. The two operations confusion-diffusion are processed in same loop based on two dimension chaotic standard map with different secret keys. Experimental results show that the proposed scheme has high security and computationally secure , it withstands different types of attacks such as statistical attack, differential attack and brute force attack and the processing time of encryption is high (0.29 second) which is suitable for mobile communication and real time applications

A Selective Image Encryption Based on Chaos Algorithm

Abeer Matti Yousif; Manaf Mohammed Ali

journal of kerbala university, Volume 8, Issue 4, Pages 136-149

Selective encryption is a new trend in image and video content protection. It's aim to reduce the amount of data to protect while preserving a sufficient level of security by connected with chaotic theory. Due to their features of ergodicity, sensitivity to initial conditions, pseudo randomly, chaotic maps have good potential for information encryption. In this work, selective image encryption based on chaos algorithm has suggested, This technique adopted two main operations one to decorrelate the relationship between adjacent pixels of plain image which is based on 2D Chaotic Standard map and the other to decorrelate the relationship between the plain image and encrypted image which is based on 4D Chaotic Map. Experimental results show that the proposed scheme is computationally secure, it withstands different types of attacks such as brute force attack, differential attack, chosen-plaintext and chosen-ciphertext attacks. Also, Experimental results show that the proposed scheme is suitable for multimedia application with real time operation. Where the average execution time is (1 second) when the encryption ratio is equal to (6.25 %).