An Efficient Method of Image Encryption Using Rossler Chaotic System
Keywords:Encrypted-image; initial conditions; encryption key; RC4; Rossler chaotic system.
In this study, a new approach of image encryption has been proposed. This method is depends on the symmetric encryption algorithm RC4 and Rossler chaotic system. Firstly, the encryption key is employed to ciphering a plain image using RC4 and obtains a ciphered-image. Then, the same key is used to generate the initial conditions of the Rossler system. The system parameters and the initial conditions are used as the inputs for Rossler chaotic system to generate the 2-dimensional array of random values. The resulted array is XORed with the ciphered-image to obtain the final encrypted-image. Based on the experimental results, the proposed method has achieved high security and less computation time. Also, the proposed method can be resisted attacks like (statistical, brute-force, and differential).
2. Amalarethinam, D. and Geetha J. (2015). Image Encryption and Decryption in Public Key Cryptography Based on MR. Proceedings of 2015 IEEE International Conference on Computing and Communications Technologies (ICCCT’15), Chennai, India.
3. Arab, A., Rostami, M. and Ghavami, B. (2019). An Image Encryption Method Based on Chaos System and AES Algorithm. Springer, The Journal of Supercomputing, 75(10):6663–6682.
4. Belazi, A., El-Latif, A., Rhouma, R. and Belghith, S. (2015). Selective Image Encryption Scheme Based on DWT, AES S-Box and Chaotic Permutation. Proceedings 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, Dubrovnik, Croatia.
5. Belazi, A., Rhouma, R. and Belghith, S. (2015). A Novel Approach to Construct S-Box Based on Rossler System. IEEE, Proceedings 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), 611-615, Dubrovnik, Croatia.
6. Dixit P., Gupta A., Trivedi M. and Yadav V. (2018) Traditional and Hybrid Encryption Techniques: A Survey. In: Perez G., Mishra K., Tiwari S. and Trivedi M. (Ed.) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, 4: 239-248, Springer, Singapore.
7. Fu, C., Zhang, G., Zhu, M., Chen, Z. and Lei, W. (2018). A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. Hindawi: Security and Communication Networks, 2018:1-13.
8. Han, M. and Kim, Y. (2017). Unpredictable 16 bits LFSR-based True Random Number Generator. IEEE: Proceedings 2017 International SoC Design Conference (ISOCC) 284-285, Seoul, South Korea.
9. Jawad, L. and Sulong, G. (2015). A Survey on Emerging Challenges in Selective Color Image Encryption Techniques. Indian Journal of Science and Technology, 8(27):1-12.
10. Jindal, P. and Singh, B. (2015). RC4 Encryption-A Literature Survey. Elsevier: Procedia Computer Science, 46(2015): 697-705.
11. Kumari, M., Gupta, S. and Sardana, P. (2017). A Survey of Image Encryption Algorithms. Springer: 3D Display Research Center, 8(37):1-35.
12. Laiphrakpam, D. and Khumanthem, M. (2017). Cryptanalysis of Symmetric Key Image Encryption Using Chaotic Rossler System. Elsevier: Optik, 135(2017): 200–209.
13. Mandal, M., Kar, M., Singh, S. and Barnwal, V. (2014). Symmetric Key Image Encryption Using Chaotic Rossler System. Wiley: Security and Communication Networks, 7(11): 2145–2152.
14. Mondal, B. Sinha, N. and Mandal, T. (2016). A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator. In: Nagar A., Mohapatra D. and Chaki N. (Ed.) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, 43: 227-237, Springer, New Delhi.
15. Rehman, A., Liao, X., Kulsoom, A., and Abbas, S. (2015). Selective Encryption For Gray Images Based on Chaos and DNA Complementary Rules. Springer, Multimedia Tools Application, 74(13): 4655–4677.
16. Shan，Y., He，M., Yu，Z. and Wu, H. (2018). Pixel level Image Encryption Based on Semantic Segmentation. IEEE, Proceedings 2018 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), 147-153, Prague, Czech Republic.
17. Tang, Z., Yang, Y., Xu, S., Yu, C. and Zhang, X. (2019). Image Encryption with Double Spiral Scans and Chaotic Maps, Hindawi: Security and Communication Networks, 2019:1-15.
18. Wen, W., Zhang, Y., Fang, Z. and Chen, J. (2015). Infrared Target-based Selective Encryption by Chaotic Maps. Elsevier, Optics Communications, 341: 131–139.
How to Cite
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to email@example.com.