Chaotic image encryption system using phase-magnitude transformation and pixel substitution

We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telecommunication systems 2013-02, Vol.52 (2), p.525-537
Hauptverfasser: Etemadi Borujeni, Shahram, Eshghi, Mohammad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 537
container_issue 2
container_start_page 525
container_title Telecommunication systems
container_volume 52
creator Etemadi Borujeni, Shahram
Eshghi, Mohammad
description We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.
doi_str_mv 10.1007/s11235-011-9458-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1417881255</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2999992931</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhosouK7-AG8BL16imaRp06MsfsGCFz15CGma7nbppjXTgvvvTa0HETzNB887DE-SXAK7AcbyWwTgQlIGQItUKqqOkgXInE8THMeegaKpytLT5Axxx9iUKhbJ-2pruqGxpNmbjSPO23Doh6bzBA84uD0ZsfEb0m8NOhoR3wxj5cgQjMe6C3vzzRpfkb75dC3BscQhMtP6PDmpTYvu4qcuk7eH-9fVE12_PD6v7tbUirQYqMjKNLeiclBnmVSSZ05B5TJeggReMCttXTkLhZKS56zMU8krVRdpLUojVCWWyfV8tw_dx-hw0PsGrWtb4103ooYUcqWASxnRqz_orhuDj99pEFmRcRAwUTBTNnSIwdW6D9FPOGhgehKnZ9066taTbq1ihs8ZjKzfuPDr8r-hL5Idg1Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1369621315</pqid></control><display><type>article</type><title>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</title><source>SpringerLink Journals - AutoHoldings</source><creator>Etemadi Borujeni, Shahram ; Eshghi, Mohammad</creator><creatorcontrib>Etemadi Borujeni, Shahram ; Eshghi, Mohammad</creatorcontrib><description>We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.</description><identifier>ISSN: 1018-4864</identifier><identifier>EISSN: 1572-9451</identifier><identifier>DOI: 10.1007/s11235-011-9458-8</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Algorithms ; Analysis ; Artificial Intelligence ; Business and Management ; Chaos theory ; Communications networks ; Computer Communication Networks ; Computer engineering ; Computer simulation ; Data encryption ; Encryption ; Fourier transforms ; Fractals ; Frequency domains ; Image processing systems ; IT in Business ; Mathematical analysis ; Multimedia communications ; Noise ; Pixels ; Probability Theory and Stochastic Processes ; Studies ; Telecommunications systems ; Time domain ; Transformations</subject><ispartof>Telecommunication systems, 2013-02, Vol.52 (2), p.525-537</ispartof><rights>Springer Science+Business Media, LLC 2011</rights><rights>Springer Science+Business Media New York 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</citedby><cites>FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11235-011-9458-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11235-011-9458-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Etemadi Borujeni, Shahram</creatorcontrib><creatorcontrib>Eshghi, Mohammad</creatorcontrib><title>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</title><title>Telecommunication systems</title><addtitle>Telecommun Syst</addtitle><description>We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.</description><subject>Algorithms</subject><subject>Analysis</subject><subject>Artificial Intelligence</subject><subject>Business and Management</subject><subject>Chaos theory</subject><subject>Communications networks</subject><subject>Computer Communication Networks</subject><subject>Computer engineering</subject><subject>Computer simulation</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Fourier transforms</subject><subject>Fractals</subject><subject>Frequency domains</subject><subject>Image processing systems</subject><subject>IT in Business</subject><subject>Mathematical analysis</subject><subject>Multimedia communications</subject><subject>Noise</subject><subject>Pixels</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Studies</subject><subject>Telecommunications systems</subject><subject>Time domain</subject><subject>Transformations</subject><issn>1018-4864</issn><issn>1572-9451</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE1LxDAQhosouK7-AG8BL16imaRp06MsfsGCFz15CGma7nbppjXTgvvvTa0HETzNB887DE-SXAK7AcbyWwTgQlIGQItUKqqOkgXInE8THMeegaKpytLT5Axxx9iUKhbJ-2pruqGxpNmbjSPO23Doh6bzBA84uD0ZsfEb0m8NOhoR3wxj5cgQjMe6C3vzzRpfkb75dC3BscQhMtP6PDmpTYvu4qcuk7eH-9fVE12_PD6v7tbUirQYqMjKNLeiclBnmVSSZ05B5TJeggReMCttXTkLhZKS56zMU8krVRdpLUojVCWWyfV8tw_dx-hw0PsGrWtb4103ooYUcqWASxnRqz_orhuDj99pEFmRcRAwUTBTNnSIwdW6D9FPOGhgehKnZ9066taTbq1ihs8ZjKzfuPDr8r-hL5Idg1Q</recordid><startdate>20130201</startdate><enddate>20130201</enddate><creator>Etemadi Borujeni, Shahram</creator><creator>Eshghi, Mohammad</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20130201</creationdate><title>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</title><author>Etemadi Borujeni, Shahram ; Eshghi, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-36b47c3de1f6658526e81de62b151290c5cfdec19855270b7452d8f94f3ba38d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Algorithms</topic><topic>Analysis</topic><topic>Artificial Intelligence</topic><topic>Business and Management</topic><topic>Chaos theory</topic><topic>Communications networks</topic><topic>Computer Communication Networks</topic><topic>Computer engineering</topic><topic>Computer simulation</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Fourier transforms</topic><topic>Fractals</topic><topic>Frequency domains</topic><topic>Image processing systems</topic><topic>IT in Business</topic><topic>Mathematical analysis</topic><topic>Multimedia communications</topic><topic>Noise</topic><topic>Pixels</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Studies</topic><topic>Telecommunications systems</topic><topic>Time domain</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Etemadi Borujeni, Shahram</creatorcontrib><creatorcontrib>Eshghi, Mohammad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Telecommunication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Etemadi Borujeni, Shahram</au><au>Eshghi, Mohammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Chaotic image encryption system using phase-magnitude transformation and pixel substitution</atitle><jtitle>Telecommunication systems</jtitle><stitle>Telecommun Syst</stitle><date>2013-02-01</date><risdate>2013</risdate><volume>52</volume><issue>2</issue><spage>525</spage><epage>537</epage><pages>525-537</pages><issn>1018-4864</issn><eissn>1572-9451</eissn><abstract>We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11235-011-9458-8</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1018-4864
ispartof Telecommunication systems, 2013-02, Vol.52 (2), p.525-537
issn 1018-4864
1572-9451
language eng
recordid cdi_proquest_miscellaneous_1417881255
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Analysis
Artificial Intelligence
Business and Management
Chaos theory
Communications networks
Computer Communication Networks
Computer engineering
Computer simulation
Data encryption
Encryption
Fourier transforms
Fractals
Frequency domains
Image processing systems
IT in Business
Mathematical analysis
Multimedia communications
Noise
Pixels
Probability Theory and Stochastic Processes
Studies
Telecommunications systems
Time domain
Transformations
title Chaotic image encryption system using phase-magnitude transformation and pixel substitution
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T14%3A39%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Chaotic%20image%20encryption%20system%20using%20phase-magnitude%20transformation%20and%20pixel%20substitution&rft.jtitle=Telecommunication%20systems&rft.au=Etemadi%C2%A0Borujeni,%20Shahram&rft.date=2013-02-01&rft.volume=52&rft.issue=2&rft.spage=525&rft.epage=537&rft.pages=525-537&rft.issn=1018-4864&rft.eissn=1572-9451&rft_id=info:doi/10.1007/s11235-011-9458-8&rft_dat=%3Cproquest_cross%3E2999992931%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1369621315&rft_id=info:pmid/&rfr_iscdi=true