An Image Encryption Technique based on Chaotic S-Box and Arnold Transform
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
In recent years, chaos has been extensively used in cryptographic systems. In this regard, one dimensional chaotic maps gained increased attention because of their intrinsic simplicity and ease in application. Many image encryption algorithms that are based on chaotic substitution boxes (S-boxes) have been studied in the last few years but some of them appear to be vulnerable to robustness. We, in this paper, propose an efficient scheme for image encryption that utilizes a composition of chaotic substitution based on tent map with the scrambling effect of the Arnold transform. The proposed construction algorithm for substitution box is, on one hand, straightforward and saves omputational labour, while on the other, it provides highly efficient performance outcomes. The understudy scheme uses an S-box, that is based on 1-D chaotic tent map. We partially encrypt the image using this S-box and then apply certain number of iterations of the Arnold transform to attain the fully encrypted image. For decryption we apply the reverse process. The strength of the proposed method is determined through the most significant techniques used for the statistical analysis and it is proved that the anticipated algorithm shows coherent results.
Authors and Affiliations
Shabieh Farwa, Tariq Shah, Nazeer Muhammad, Nargis Bibi, Adnan Jahangir, Sidra Arshad
An Improved Grunwald-Letnikov Fractional Differential Mask for Image Texture Enhancement
Texture plays an important role in identification of objects or regions of interest in an image. In order to enhance this textural information and overcome the limitations of the classical derivative operators a tw...
RISK ASSESSMENT OF NETWORK SECURITY BASED ON NON-OPTIMUM CHARACTERISTICS ANALYSIS
This paper discusses in detail the theory of non-optimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network...
Exploring Mechanisms for Pattern Formation through Coupled Bulk-Surface PDEs in Case of Non-linear Reactions
This work explores mechanisms for pattern forma-tion through coupled bulk-surface partial differential equations of reaction-diffusion type. Reaction-diffusion systems posed both in the bulk and on the surface on station...
Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of p...
A Reduced Switch Voltage Stress Class E Power Amplifier Using Harmonic Control Network
In this paper, a harmonic control network (HCN) is presented to reduce the voltage stress (maximum MOSFET voltage) of the class E power amplifier (PA). Effects of the HCN on the amplifier specifications are investigated....