Conference Paper

Digital Image Encryption Algorithm Based on Chaos and Improved DES.

DOI: 10.1109/ICSMC.2009.5346839 Conference: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009
Source: DBLP

ABSTRACT In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. Chaos based image encryption technique is a new encryption technique for images. It utilizes chaos random sequence to encrypt image, which is an efficient way to deal with the intractable problem of fast and highly secure image encryption. However, the chaos based image encryption technique has some deficiencies, such as the limited accuracy problem. This paper researches on the chaotic encryption, DES encryption and a combination of image encryption algorithm, and simulate these algorithms, through analysis of the algorithm to find the gaps. And on this basis, the algorithm has been improved. The new encryption scheme realizes the digital image encryption through the chaos and improving DES. Firstly, new encryption scheme uses the logistic chaos sequencer to make the pseudo-random sequence, carries on the RGB with this sequence to the image chaotically, then makes double time encryptions with improvement DES, displays they respective merit. Theoretical analysis and the simulation indicate that this plan has the high starting value sensitivity, and enjoys high security and the encryption speed. In addition it also keeps the neighboring RGB relevance close to zero. The algorithm can be used in the actual image encryption.

2 Bookmarks
 · 
246 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: The unbelievable evolution of Internet technologies & its applications need very high level the security of data during transmission over the unsafe communication network. Image steganography is a technique for hiding information into a cover image. Least Significant-Bit (LSB) based approach is most common steganographic technique in spatial domain due to its easiness and hiding capacity. All of existing methods of steganography focus on the embedding strategy with less concern to the pre-processing, such as encryption of secrete image. The conventional algorithm does not provide the preprocessing required in image based steganography for better security, as they do not offer flexibility, robustness and high level of security. The proposed work presents a unique technique for Image steganography based on the Data Encryption Standard (DES) using 64 bit block size of plaintext & 56 bits of Secrete key. The preprocessing provide high level of security as extraction of image is not possible without the knowledge of mapping rules of S -Box and secrete key of the function.
    Communication Systems and Network Technologies (CSNT), 2013 International Conference on; 01/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: The incredible evolution of Internet technologies & its applications require high level the security of data over the communication channel. Image steganography is a digital technique for concealing information into a cover image. Least Significant-Bit (LSB) based approach is most popular steganographic technique in spatial domain due to its simplicity and hiding capacity. All of existing methods of steganography focus on the embedding strategy with less consideration to the pre-processing, such as encryption of secrete image. The conventional algorithm does not provide the preprocessing required in image based steganography for better security, as they do not offer flexibility, robustness and high level of security. The proposed work presents a unique technique for Image steganography based on the Data Encryption Standard (DES) using the strength of S- Box mapping & Secrete key. The preprocessing of secrete image is carried by embedding function of the steganography algorithm using two unique S-boxes. The preprocessing provide high level of security as extraction is not possible without the knowledge of mapping rules and secrete key of the function. Additionally the proposed scheme is capable of not just scrambling data but it also changes the intensity of the pixels which contributes to the safety of the encryption.
    Advance Computing Conference (IACC), 2013 IEEE 3rd International; 01/2013
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The significance of cipher communication has been strongly felt by the cyber law makers against hackers. In this direction a yet another double edged knife cipher methodology employing image encryption (first edge) and multilayered cryptic key (second edge) has been proposed. In this paper, a rapid key encryption procedure employing symmetric key adopting matrix array was practiced. A complex and multilayered key generation scheme employing pseudorandom sequence, DCT, quantization and scrambling was adapted. The operations like diffusion and substitutions were inherently inducted in the proposed scheme to provide faster convergence of cipher image. The effectiveness of the proposed scheme was verified by performing security analysis and also metrics evaluation. Further the presents results were compared with the available results and the merits of the same has been highlighted.
    AEU - International Journal of Electronics and Communications 11/2014; · 0.55 Impact Factor