Table of Contents Author Guidelines Submit a Manuscript
Modelling and Simulation in Engineering
Volume 2017, Article ID 7470204, 12 pages
https://doi.org/10.1155/2017/7470204
Research Article

A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

1School of Information Technology and Engineering, VIT University, Tamil Nadu, India
2School of Computer Science and Engineering, VIT University, Tamil Nadu, India

Correspondence should be addressed to V. Madhu Viswanatham; ni.ca.tiv@mahtanawsivuhdamv

Received 25 August 2016; Revised 26 October 2016; Accepted 20 November 2016; Published 4 January 2017

Academic Editor: Aiguo Song

Copyright © 2017 Srinivas Koppu and V. Madhu Viswanatham. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. J. Paul, P. Mythili, and K. Paulose Jacob, “Matrix based cryptographic procedure for efficient image encryption,” in Proceedings of the IEEE Recent Advances in Intelligent Computational Systems (RAICS '11), pp. 173–177, Trivandrum, India, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Wang, W. Pei, L. Zou, A. Song, and Z. He, “On the security of 3D Cat map based symmetric image encryption scheme,” Physics Letters A, vol. 343, no. 6, pp. 432–439, 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Li, A. Song, and X. Zhang, “Haptic texture rendering using single texture image,” in Proceedings of the 3rd International Symposium on Computational Intelligence and Design (ISCID '10), pp. 7–10, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. X. Cindy Guo and D. Hatzinakos, “Image authentication using added signal-dependent noise,” Journal of Electrical and Computer Engineering, vol. 2007, Article ID 47549, 5 pages, 2007. View at Publisher · View at Google Scholar
  5. X. Zhang, C. Wang, S. Zhong, and Q. Yao, “Image encryption scheme based on balanced two-dimensional cellular automata,” Mathematical Problems in Engineering, vol. 2013, Article ID 562768, 10 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. G. Yang, H. Jin, and N. Bai, “Image encryption using the chaotic Josephus matrix,” Mathematical Problems in Engineering, vol. 2014, Article ID 632060, 13 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Zhang, D. Hou, and H. Ren, “Image encryption algorithm based on dynamic DNA coding and Chen's hyperchaotic system,” Mathematical Problems in Engineering, vol. 2016, Article ID 6408741, 11 pages, 2016. View at Publisher · View at Google Scholar
  8. W. Wang, D. Peng, H. Wang, H. Sharif, and H.-H. Chen, “Energy-constrained quality optimization for secure image transmission in wireless sensor networks,” Advances in Multimedia, vol. 2007, Article ID 25187, 9 pages, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. I. Maglogiannis, “Towards the adoption of open source and open access electronic health record systems,” Journal of Healthcare Engineering, vol. 3, no. 1, pp. 141–161, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Zhang and Y. Zhang, “An image encryption algorithm based on balanced pixel and chaotic map,” Mathematical Problems in Engineering, vol. 2014, Article ID 216048, 7 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Liu, B. Lu, and H. Li, “Secure access control and large scale robust representation for online multimedia event detection,” The Scientific World Journal, vol. 2014, Article ID 219732, 12 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. K. Zhang and J.-B. Fang, “Color image encryption algorithm based on TD-ERCS system and wavelet neural network,” Mathematical Problems in Engineering, vol. 2015, Article ID 501054, 10 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. S. S. Askar, A. A. Karawia, and A. Alshamrani, “Image encryption algorithm based on chaotic economic model,” Mathematical Problems in Engineering, vol. 2015, Article ID 341729, 10 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Kanso and M. Ghebleh, “An efficient and robust image encryption scheme for medical applications,” Communications in Nonlinear Science and Numerical Simulation, vol. 24, no. 1–3, pp. 98–116, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  16. P. Tian-Gong and L. Da-Yong, “A novel image encryption using arnold cat,” International Journal of Security and Its Applications, vol. 7, no. 5, pp. 377–386, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, “A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption,” Optics Communications, vol. 284, no. 19, pp. 4331–4339, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. H. S. Kwok and W. K. S. Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos, Solitons & Fractals, vol. 32, no. 4, pp. 1518–1529, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. V. K. Kushwaha and K. Anusudha, “Based double encryption approach for secure transaction of medical images,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no. 4, pp. 1418–1423, 2013. View at Google Scholar
  20. M. Ahmad and T. Ahmad, “A framework to protect patient digital medical imagery for secure telediagnosis,” Procedia Engineering, vol. 38, pp. 1055–1066, 2012. View at Publisher · View at Google Scholar
  21. A. Al-Haj, G. Abandah, and N. Hussein, “Crypto-based algorithms for secured medical image transmission,” IET Information Security, vol. 9, no. 6, article 365, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. L. O. M. Kobayashi, S. S. Furuie, and P. S. L. M. Barreto, “Providing integrity and authenticity in DICOM images: a novel approach,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 4, pp. 582–589, 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. X. Q. Zhou, H. K. Huang, and S. L. Lou, “Authenticity and integrity of digital mammography images,” IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784–791, 2001. View at Publisher · View at Google Scholar · View at Scopus
  24. H.-M. Chao, C.-M. Hsu, and S.-G. Miaou, “A data-hiding technique with authentication, integration, and confidentiality for electronic patient records,” IEEE Transactions on Information Technology in Biomedicine, vol. 6, no. 1, pp. 46–53, 2002. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Gueron, “AES-GCM for efficient authenticated encryption,” in Proceedings of the Workshop on Real-World Cryptography, pp. 1–32, January 2013.
  26. D. Brat Ojha, A. Sharma, A. Dwivedi, B. Kumar, and A. Kumar, “An authenticated two-tier security on transmission of medical image using codebase cryptosystem over teeming channel,” Internationnal Journal of Computer Applications, vol. 12, no. 9, pp. 22–26, 2011. View at Google Scholar
  27. W. Puech and J. M. Rodrigues, “A new crypto-watermarking method for medical images safe transfer,” in Proceedings of the 12th European Signal Processing Conference (EUSIPCO '04), pp. 1481–1484, Vienna, Austria, 2004.
  28. F. Cao, H. K. Huang, and X. Q. Zhou, “Medical image security in a HIPAA mandated PACS environment,” Computerized Medical Imaging and Graphics, vol. 27, no. 2-3, pp. 185–196, 2003. View at Publisher · View at Google Scholar · View at Scopus
  29. Z. Hua, Y. Zhou, C.-M. Pun, and C. L. P. Chen, “2D Sine Logistic modulation map for image encryption,” Information Sciences, vol. 297, pp. 80–94, 2015. View at Publisher · View at Google Scholar
  30. M. François, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Processing: Image Communication, vol. 27, no. 3, pp. 249–259, 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Physics Letters A, vol. 372, no. 4, pp. 394–400, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014. View at Publisher · View at Google Scholar · View at Scopus
  33. Y. Zhou, L. Bao, and C. L. P. Chen, “Image encryption using a new parametric switching chaotic system,” Signal Processing, vol. 93, no. 11, pp. 3039–3052, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. C.-J. Cheng and C.-B. Cheng, “An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 10, pp. 2825–2837, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  35. K. Jasteazebski and Z. Kotulski, “On improved image encryption scheme based on chaotic map lattices,” Engineering Transcations, vol. 69, no. 84, 2009. View at Google Scholar
  36. J. B. Lima, F. Madeiro, and F. J. R. Sales, “Encryption of medical images based on the cosine number transform,” Signal Processing: Image Communication, vol. 35, pp. 1–8, 2015. View at Publisher · View at Google Scholar · View at Scopus
  37. C. K. Huang and H. H. Nien, “Multi chaotic systems based pixel shuffle for image encryption,” Optics Communications, vol. 282, no. 11, pp. 2123–2127, 2009. View at Publisher · View at Google Scholar · View at Scopus
  38. S. Som and S. Sen, “A non-adaptive partial encryption of grayscale images based on chaos,” Procedia Technology, vol. 10, pp. 663–671, 2013. View at Publisher · View at Google Scholar
  39. G. Alvarez and S. Li, “Breaking an encryption scheme based on chaotic baker map,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 352, no. 1-2, pp. 78–82, 2006. View at Publisher · View at Google Scholar · View at Scopus
  40. N. Kumar and H. T. Panduragha, “Advanced partial image encryption using two-stage hill cipher technique,” Iternational Journal of Computer Applications, vol. 60, no. 16, pp. 14–19, 2012. View at Google Scholar
  41. X. W. Li, S. J. Cho, and S. T. Kim, “High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques,” Optics and Lasers in Engineering, vol. 55, pp. 162–182, 2014. View at Publisher · View at Google Scholar · View at Scopus
  42. C. Ye, Z. Xiong, Y. Ding, X. Zhang, G. Wang, and F. Xu, “Joint fingerprinting/encryption for medical image security,” International Journal of Security and Its Applications, vol. 9, no. 1, pp. 409–418, 2015. View at Publisher · View at Google Scholar · View at Scopus
  43. https://en.wikipedia.org/wiki/Lanczos_algorithm.
  44. J. Zhang, D. Fang, and H. Ren, “Image encryption algorithm based on DNA encoding and chaotic maps,” Mathematical Problems in Engineering, vol. 2014, Article ID 917147, 10 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  45. X. Liao, S. Lai, and Q. Zhou, “A novel image encryption algorithm based on self-adaptive wave transmission,” Signal Processing, vol. 90, no. 9, pp. 2714–2722, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  46. Y. Wu, J. P. Noonan, and S. Agaian, “A wheel-switch chaotic system for image encryption,” in Proceedings of the International Conference on System Science and Engineering (ICSSE '11), pp. 23–27, Guiyang, China, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  47. Y. Wu, G. Yang, H. Jin, and J. P. Noonan, “Image encryption using the two-dimensional logistic chaotic map,” Journal of Electronic Imaging, vol. 21, no. 1, Article ID 013014, 2012. View at Publisher · View at Google Scholar