A Novel Image Encryption Algorithm Using Multi Chaotic Schemes as Elliptic Curve, Quasi Group and also with Genetic Algorithm

Monisha Sharma*, M. Kowar**, Manisha Sharma***
*Reader ,Department of Electronics and Telecommunication ,Shri Shankaracharya College of Engineering and Technology,Bhilai.
**Principal,Bhilai Institute of Technology.
***Associate Professor,Department of Electronics and Tele communication,Bhilai Institute of Technology.,Durg
Periodicity:May - July'2008
DOI : https://doi.org/10.26634/jfet.3.4.610

Abstract

In the present paper, a novel Elliptic curve and quasi pseudo random sequence based Genetic algorithm for data encryption has been proposed. By combining the spatial domain encryption of digital image by the proposed technique and a new pseudo random generator, the security of encryption scheme has been enhanced effectively. Instead of encrypting an image in a chaotic signal directly, the proposed scheme uses multi-chaotic systems based on the idea of higher level of secrecy. Two of the chaotic systems are used to generate a pseudo random sequence, which is better than the existing ones. The other chaotic system is used for encryption purpose. The encryption by this method is such that the real time signal can be transformed into completely disordered data. The security of encryption scheme is analyzed in detail. The proposed algorithm possesses interesting features like, High level of security, Less memory usage requirement, Low computational complexity, Larger key space, Sensitive to key and can resist brute force attacks, Small key size, Faster implementation and Less Bandwidth. Thus the proposed scheme is very much suitable for the digital image encryption.

Keywords

Quasi Pseudo Random Sequence, Genetic, Chaotic sequence, Chaotic system, Elliptic Curve.

How to Cite this Article?

Monisha Sharma, M. Kowar and Manisha Sharma (2008). A Novel Image Encryption Algorithm Using Multi Chaotic Schemes as Elliptic Curve, Quasi Group and also with Genetic Algorithm. i-manager’s Journal on Future Engineering and Technology, 3(4), 70-79. https://doi.org/10.26634/jfet.3.4.610

References

[1]. Li Chang-Gang, Han Zheng-Zhi, and Zhang Hao- Ran, "Image Encryption Techniques: A Survey", Journal of Computer Research and Development, Vol. 39, No. 10, pp. 1317-1324, Oct. 2002.
[2]. Wei Ding, Wei-qi Yan, and Dong-xu Qi, "A Novel Digital Hiding Technology Based on Tangram Encryption", IEEE Proceedings of on NEWCAS 2005, and "Conways Game", Proceeding of 2000 International Conference on Image Processing, Vol. 1, pp. 601 -604, Sept. 2000.
[3]. Zhao Xue-feng, "Digital Image Scrambling Based on the Baker's Transformation", Journal of Northwest Normal University (Natural Science), Vol. 39, No. 2, pp. 26-29, Feb. 2003.
[4]. Bao Guan-jun, Ji Shi-ming, and Shen Jian-bin, "Magic Cube Transformation and Its Application in Digital Image Encryption", Computer Applications, Vol. 22, No. 11, pp. 23-25, Nov. 2002.
[5]. Zhu Guibin, Cao Changxiu, Hu Zhongyu, et al., "An Image Scrambling and Encryption Algorithm Based on Affine Transformation", Journal of Computer-Aided Design & Computer Graphics, Vol. 15, No. 6, pp. 711 -715, June 2003.
[6]. Jiri Fridrich, "Image Encryption Based on Chaotic Maps", Proceelng of IEEE Conference on Systems, Man, and Cybernetics, pp. 1105-1110,1997.
[7]. Jui-Cheng Yen, and Jiun-ln Guo, "A New Chaotic Key- Based Design for Image Encryption and Decryption", IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000.
[8]. M.I.Sobhy and A.R.Shehata, "Chaotic Algorithms for Data Encryption", IEEE Proceeding of ICASSP 2001, Vol .2, pp. 997-1000, May 2001.
[9]. Mazleena Sallen, Subariah Ibrahim, and Ismail Fauzi Isnin, "Enhanced Chaotic Image Encryption Algorithm Based on Vaker's Map", IEEE Proceedings of ISCAS 2003, Vol. 2, pp. 11-508-11-511, May 2003.
[10]. Shaojiang Deng, Linhua Zhang, and Di Xiao, "Image Encryption Scheme Based on Chaotic Neural System", J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872,2005.
[11 ]. WangYing, Zheng DeLing, Ju Lei etal., "TheSpatial- Domain Encryption of Digital Images Based on High- Dimension Chaotic System", Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December, 2004.
[12]. M.I.Sobhy and A.R.Shehata, "Methods of Attacking Chaotic Encryption and Countermeasures", IEEE Proceeding of ICASSP 2001, Vol. 2, pp. 1001-1004, May 2001.
[13]. Jiun-ln Guo, Jui-Cheng Yen, "A new mirror-like image encryption algorithm and its VLSI architecture". Department of Electronics Engineering, National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
[14]. Tony Warnock. "Random-Number Generators" Los Alamos Science Special issue, 1987.
[15]. ligoroski, Markovski and Knapskog, * A Fix of the MD4 Family of Hash Functions - Quasigroup Fold '.NIST Cryptographic Hash Workshop 31 Oct.-l Nov. 2005.
[16]. Dimitrova and J. Markovski, "On Quasigroup Pseudo Random Sequence Generators", Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University, Arhimedova 5, PO Box 162, 1000Skopje, Macedonia.
[17]. Smile Markovski Danilo Gligoroski", Differential cryptanalysis of the quasigroup cipher". University of Kuopio, Finland, SS Cyril and Methodius University, Republic of Macedonia.
[18]. Smile Markovski Danilo Gligoroski," Construction of quasi groups of huge order", Ss Cyril and Methodius University Skopje, Macedonia, ICDMA7 June 17-20, Bansko, Bulgaria.
[19]. Monisha Sharma, Manisha Sharma, and Swagota Bera," On Quasi Pseudo Random Sequence Generator", I.E.I (Rajastan State Center) 22nd National Conference, 4-5 August 2006.
[20]. Dr. Navin Rajpal, Anil Kumar, Sureka Dudhani and Pravesh Raja Jindal, "Copyright protection using non¬linear forward feedback shift register and error-correction technique" \n Map India Conference, 2002.
[21]. S.Moni and R.L. Kashyap, "Image communication over a distributed multimedia system".
[22]. J.H. Holland. "Adaptation in natural and artificial systems", MIT press 1975,
[23]. David Beasley, David R. Bull and Ralph R. Martin "An Overview of Genetic Algorithms: Part 1 Fundamentals" University computing 1993,15(2)58-69.
[24]. Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, Jr, and Gary B. Lamont, " Novel Steganography Detection using an Artificial Immune System".
[25]. Melanie Mitchell, * An Introduction to Genetic Algorithm", MIT Press, 1996.
[26]. N. Chaiyaratana and A.M.S. Zalzala, "Recent Developments in Evolutionary and Genetic Algorithm: Theory and Applications" IEEE Conference Publication, No:446, Sept. 2-4,1997.
[27]. Monisha Sharma and Manisha Sharma, "An Evolutionary algorithm in security based software Engineering", International conference In Wireless Communication and Sensor Network in IIIT-Allahabad with IEEE.
[28]. Tariq Jamil and Afaq Ahmed "An investigation into the application of linear feedback shift register for steganography" in IEEE proceedings South East Conference, 2002.
[29]. Anderson, R.J. and Petitcolas, F.A.R, "On the limits of steganography", IEEE Journal of Selected areas In Communications, Special issue on Encrypted Image using on the limits of Steganography, Vol. 16,Mayl990.
[30]. F.A.R Petitcolas and R.J. Anderson and M.G. Kuhn, "Information Hiding A Survey," Proc IEEE. Vol. 87,1999.
[31 ]. Monisha Sharma and Manisha Sharma ," An Novel data system using genetic algorithm". International conference in computer design in Las Vegas , Nevada USA on June 26-29,2006.
[32]. N. Kobiltz 1987, Elliptic curve cryptosystems, Mathematics of computations: 203-209.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.