Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 10 , Issue 2 , PP: 08-18, 2022 | Cite this article as | XML | Html | PDF | Full Length Article

Chaos Based Stego Color Image Encryption

M. I. Fath Allah 1 *

  • 1 Assist. Prof. in Communications & Electronics Department at Delta Higher Institute, Mansoura, Egypt - (\mismail1885@yahoo.com)
  • Doi: https://doi.org/10.54216/JCIM.100201

    Received: May 01, 2022 Accepted: August 01, 2022
    Abstract

    Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.

    Keywords :

    Double Random Phase Encoding (DRPE) , Discrete Cosine Transform (DCT) , Fast Fourier Transform (FFT) , Fractional Fast Fourier Transform (FRFFT) , Discrete Wavelet Transform (DWT) , Red-Green-Blue (RGB)

    References

    [1]  R. Vijayaraghavan, S. Sathya, N. R. Raajan, "Encryption for an Image Using Circular Budge on Bit-Planes" , International Journal of Applied Engineering Research, Vol. 9, No. 2, 2014, pp. 60 –153. 

    [2]  M. A. Mohamed, A.S. Samarah, M.I. Fath Allah, "Optical Encryption Techniques: An Overview", International Journal for Computer Science Issues (IJCSI), Vol. 11, No. 2, 2014, pp. 125 -129.

    [3]  F. Mosso, M. Tebaldi, "All-Optical Encrypted Movie", Optical Society of America, Vol. 19, No. 6, 2011, pp. 5706-5712. 

    [4]  Y. Liu, J. Lin, J. Fan, N. Zhou, "Image Encryption Based on Cat Map and Fractional Fourier Transform", Journal of Computational Information Systems, Vol. 8, No. 18, 2012, pp. 7485-7492. 

    [5]  P.  R´efr´egier,  B.  Javidi,  "Optical  Image  Encryption  Based  on  Input  Plane  &  Fourier  Plane Random Encoding", Optics. Letters, Vol. 20, 1995, pp. 767-769. 

    [6]  R. Vijayaraghavan, S. Sathya, N. R. Raajan, "Image Encryption based on the Reflected Binary Code Method with the  Combination of FFT", Indian Journal of Science and Technology, Vol. 8, No. 36, 2015, pp. 1-10. 

    [7]  C. S. Narayanan, S. A. Durai, "A Critical Study on Encryption Based Compression Techniques", Journal of Computers, Vol. 11, No. 5, 2015, pp. 380 -399. 

    [8]  X.  Li,  C.  Li,  S.  T.  Kim,  I.  K.  Lee,  "An  Optical  Image  Encryption  Scheme  Based  on  Depth Conversion Integral Imaging and Chaotic Maps", arXiv: 1501. 04167v1 [cs. CR], 2015, pp. 1-18. 

    [9]  Z. Liu, H. Chen, "Color image encryption by using Arnold Transform and Color-blend Operation in Discrete Cosine Transform Domains", Optics Communications Vol. 284, 2015, pp. 123 –128. 

    [10]  X. Deng, X. Zhu, "A Simple and Practical Color Image Encryption with the Help of QR Code", Optica Applicata, Vol.. XLV, No. 4, 2015, pp. 513-521. 

    [11]  M. A. Mohamed, H. M. Abdel-Atty, A. M. Abutaleb, M. G. Abdel-Fattah, A. S. Samrah, "Hybrid Watermarking  Scheme  for  Copyright  Protection  Using  Chaotic  Maps  Cryptography", International Journal of Computer Applications (0975 – 8887), Vol. 128, No. 1, 2015, pp. 1:14. 

    [12]  [Rajendran, S. and M. Doraipandian, Chaotic Map Based Random Image Steganography Using LSB Technique. IJ Network Security, 2017. 19(4): p. 593-598. 

    [13]  Razzaq,  M.A.,  et  al.,  Digital  image  security:  Fusion  of  encryption,  steganography  and watermarking. International Journal of Advanced Computer Science and Applications (IJACSA), 2017. 8(5). 

    [14]  Zear, A., A.K. Singh, and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia tools and applications, 2018. 77(4): p. 4863-4882. 

    [15]  HASHIM, M., et al., A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN. Journal of Theoretical & Applied Information Technology, 2018. 96(4). 

    [16]  Valandar, M.Y., et al., An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools and Applications, 2019. 78(8): p. 9971-9989. 

    [17]  Bhnassy, M.A., et al., Image encryption and watermarking combined dynamic chaotic hopping pattern with double random phase encoding DRPE. Optical and Quantum Electronics, 2019. 51(7): p. 246. 

    [18]  M. I. Fath Allah, M. M. Eid, "Chaos Based 3D Color Image Encryption," Ain Shams Engineering Journal (ASEJ), Vol. 11, Issue 1, p. 67 – 75, March 2020. 

    [19]  Huang, L., Wang, S., Xiang, J., Sun, Y., "Chaotic Color Image Encryption Scheme using Deoxyribonucleic  Acid  (DNA)  Coding  Calculations  and  Arithmetic  over  the  Galois  Field," Mathematical  Problems  in  Engineering,  Hindawi,  Vol.  2020,  ID:  3965281, https://doi.org/10.1155/2020/3965281, p. 1 – 22, March 2020. 

    [20]  O. F. A.Wahab, A. A. M. Khalaf, A. I. Hussein, and H. F. A. Hamed, ``Hiding data using efficient combination of RSA cryptography, and compression steganography techniques,'' IEEE Access, vol. 9, pp. 31805_31815, 2021.. 

    [21]  B. Huang, et al., "A Novel Color Image Encryption Algorithm Using Coupled Map Lattice with Polymorphic Mapping," Electronics 2022, 11, 3436. https://doi.org/10.3390/electronics11213436. 

    [22]  A.  Alfalou,  C.  Brosseau,  "Optical  Image  Compression  and  Encryption  Methods",  Adv.  Opt. Photon, 1(00516980), 2010, pp. 589-636. 

     

    Cite This Article As :
    I., M.. Chaos Based Stego Color Image Encryption. Journal of Cybersecurity and Information Management, vol. , no. , 2022, pp. 08-18. DOI: https://doi.org/10.54216/JCIM.100201
    I., M. (2022). Chaos Based Stego Color Image Encryption. Journal of Cybersecurity and Information Management, (), 08-18. DOI: https://doi.org/10.54216/JCIM.100201
    I., M.. Chaos Based Stego Color Image Encryption. Journal of Cybersecurity and Information Management , no. (2022): 08-18. DOI: https://doi.org/10.54216/JCIM.100201
    I., M. (2022) . Chaos Based Stego Color Image Encryption. Journal of Cybersecurity and Information Management , () , 08-18 . DOI: https://doi.org/10.54216/JCIM.100201
    I. M. [2022]. Chaos Based Stego Color Image Encryption. Journal of Cybersecurity and Information Management. (): 08-18. DOI: https://doi.org/10.54216/JCIM.100201
    I., M. "Chaos Based Stego Color Image Encryption," Journal of Cybersecurity and Information Management, vol. , no. , pp. 08-18, 2022. DOI: https://doi.org/10.54216/JCIM.100201