Chaotic image encryption system using phase-magnitude transformation and pixel substitution
We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in...
Gespeichert in:
Veröffentlicht in: | Telecommunication systems 2013-02, Vol.52 (2), p.525-537 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 537 |
---|---|
container_issue | 2 |
container_start_page | 525 |
container_title | Telecommunication systems |
container_volume | 52 |
creator | Etemadi Borujeni, Shahram Eshghi, Mohammad |
description | We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems. |
doi_str_mv | 10.1007/s11235-011-9458-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1417881255</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2999992931</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhosouK7-AG8BL16imaRp06MsfsGCFz15CGma7nbppjXTgvvvTa0HETzNB887DE-SXAK7AcbyWwTgQlIGQItUKqqOkgXInE8THMeegaKpytLT5Axxx9iUKhbJ-2pruqGxpNmbjSPO23Doh6bzBA84uD0ZsfEb0m8NOhoR3wxj5cgQjMe6C3vzzRpfkb75dC3BscQhMtP6PDmpTYvu4qcuk7eH-9fVE12_PD6v7tbUirQYqMjKNLeiclBnmVSSZ05B5TJeggReMCttXTkLhZKS56zMU8krVRdpLUojVCWWyfV8tw_dx-hw0PsGrWtb4103ooYUcqWASxnRqz_orhuDj99pEFmRcRAwUTBTNnSIwdW6D9FPOGhgehKnZ9066taTbq1ihs8ZjKzfuPDr8r-hL5Idg1Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1369621315</pqid></control><display><type>article</type><title>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</title><source>SpringerLink Journals - AutoHoldings</source><creator>Etemadi Borujeni, Shahram ; Eshghi, Mohammad</creator><creatorcontrib>Etemadi Borujeni, Shahram ; Eshghi, Mohammad</creatorcontrib><description>We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.</description><identifier>ISSN: 1018-4864</identifier><identifier>EISSN: 1572-9451</identifier><identifier>DOI: 10.1007/s11235-011-9458-8</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Algorithms ; Analysis ; Artificial Intelligence ; Business and Management ; Chaos theory ; Communications networks ; Computer Communication Networks ; Computer engineering ; Computer simulation ; Data encryption ; Encryption ; Fourier transforms ; Fractals ; Frequency domains ; Image processing systems ; IT in Business ; Mathematical analysis ; Multimedia communications ; Noise ; Pixels ; Probability Theory and Stochastic Processes ; Studies ; Telecommunications systems ; Time domain ; Transformations</subject><ispartof>Telecommunication systems, 2013-02, Vol.52 (2), p.525-537</ispartof><rights>Springer Science+Business Media, LLC 2011</rights><rights>Springer Science+Business Media New York 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</citedby><cites>FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11235-011-9458-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11235-011-9458-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Etemadi Borujeni, Shahram</creatorcontrib><creatorcontrib>Eshghi, Mohammad</creatorcontrib><title>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</title><title>Telecommunication systems</title><addtitle>Telecommun Syst</addtitle><description>We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.</description><subject>Algorithms</subject><subject>Analysis</subject><subject>Artificial Intelligence</subject><subject>Business and Management</subject><subject>Chaos theory</subject><subject>Communications networks</subject><subject>Computer Communication Networks</subject><subject>Computer engineering</subject><subject>Computer simulation</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Fourier transforms</subject><subject>Fractals</subject><subject>Frequency domains</subject><subject>Image processing systems</subject><subject>IT in Business</subject><subject>Mathematical analysis</subject><subject>Multimedia communications</subject><subject>Noise</subject><subject>Pixels</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Studies</subject><subject>Telecommunications systems</subject><subject>Time domain</subject><subject>Transformations</subject><issn>1018-4864</issn><issn>1572-9451</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE1LxDAQhosouK7-AG8BL16imaRp06MsfsGCFz15CGma7nbppjXTgvvvTa0HETzNB887DE-SXAK7AcbyWwTgQlIGQItUKqqOkgXInE8THMeegaKpytLT5Axxx9iUKhbJ-2pruqGxpNmbjSPO23Doh6bzBA84uD0ZsfEb0m8NOhoR3wxj5cgQjMe6C3vzzRpfkb75dC3BscQhMtP6PDmpTYvu4qcuk7eH-9fVE12_PD6v7tbUirQYqMjKNLeiclBnmVSSZ05B5TJeggReMCttXTkLhZKS56zMU8krVRdpLUojVCWWyfV8tw_dx-hw0PsGrWtb4103ooYUcqWASxnRqz_orhuDj99pEFmRcRAwUTBTNnSIwdW6D9FPOGhgehKnZ9066taTbq1ihs8ZjKzfuPDr8r-hL5Idg1Q</recordid><startdate>20130201</startdate><enddate>20130201</enddate><creator>Etemadi Borujeni, Shahram</creator><creator>Eshghi, Mohammad</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20130201</creationdate><title>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</title><author>Etemadi Borujeni, Shahram ; Eshghi, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Algorithms</topic><topic>Analysis</topic><topic>Artificial Intelligence</topic><topic>Business and Management</topic><topic>Chaos theory</topic><topic>Communications networks</topic><topic>Computer Communication Networks</topic><topic>Computer engineering</topic><topic>Computer simulation</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Fourier transforms</topic><topic>Fractals</topic><topic>Frequency domains</topic><topic>Image processing systems</topic><topic>IT in Business</topic><topic>Mathematical analysis</topic><topic>Multimedia communications</topic><topic>Noise</topic><topic>Pixels</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Studies</topic><topic>Telecommunications systems</topic><topic>Time domain</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Etemadi Borujeni, Shahram</creatorcontrib><creatorcontrib>Eshghi, Mohammad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Telecommunication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Etemadi Borujeni, Shahram</au><au>Eshghi, Mohammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</atitle><jtitle>Telecommunication systems</jtitle><stitle>Telecommun Syst</stitle><date>2013-02-01</date><risdate>2013</risdate><volume>52</volume><issue>2</issue><spage>525</spage><epage>537</epage><pages>525-537</pages><issn>1018-4864</issn><eissn>1572-9451</eissn><abstract>We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11235-011-9458-8</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1018-4864 |
ispartof | Telecommunication systems, 2013-02, Vol.52 (2), p.525-537 |
issn | 1018-4864 1572-9451 |
language | eng |
recordid | cdi_proquest_miscellaneous_1417881255 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Analysis Artificial Intelligence Business and Management Chaos theory Communications networks Computer Communication Networks Computer engineering Computer simulation Data encryption Encryption Fourier transforms Fractals Frequency domains Image processing systems IT in Business Mathematical analysis Multimedia communications Noise Pixels Probability Theory and Stochastic Processes Studies Telecommunications systems Time domain Transformations |
title | Chaotic image encryption system using phase-magnitude transformation and pixel substitution |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T14%3A39%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Chaotic%20image%20encryption%20system%20using%20phase-magnitude%20transformation%20and%20pixel%20substitution&rft.jtitle=Telecommunication%20systems&rft.au=Etemadi%C2%A0Borujeni,%20Shahram&rft.date=2013-02-01&rft.volume=52&rft.issue=2&rft.spage=525&rft.epage=537&rft.pages=525-537&rft.issn=1018-4864&rft.eissn=1572-9451&rft_id=info:doi/10.1007/s11235-011-9458-8&rft_dat=%3Cproquest_cross%3E2999992931%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1369621315&rft_id=info:pmid/&rfr_iscdi=true |