Abstract
We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Yang, M., Bourbakis, N., & Shujun, L. (2004). Data-image-video encryption. IEEE Potentials, 23, 28–34.
Fridrich, J. (1997). Image encryption based on chaotic maps. In Systems, man, and cybernetics, 1997 IEEE international conference on computational cybernetics and simulation (Vol. 2, pp. 1105–1110).
Chen, G. R. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21, 749–761.
Guan, Z. H., Huang, F. J., & Guan, W. J. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346, 153–157.
Lian, S. G., Sun, J. S., & Wang, Z. Q. (2005). A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons and Fractals, 26, 117–129.
Mao, Y. B., Chen, G. R., & Lian, S. G. (2004). A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 14, 3613–3624.
Zhang, L., Liao, X., & Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals, 24, 759–765.
Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals, 29, 393–399.
Pareek, N. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.
Borujeni, S. E., & Eshghi, M. (2009). Chaotic image encryption design using Tompkins-Paige algorithm. Journal of Mathematical Problems in Engineering, 2009, Modeling experimental nonlinear dynamics and chaotic scenarios, p. 22. doi:10.1155/2009/762652.
Singh, N., & Sinha, A. (2008). Optical image encryption using fractional Fourier transform and chaos. Optics and Lasers in Engineering, 46, 117–123.
Borujeni, S. E. (2000). Speech encryption based on fast Fourier transform permutation. In The 7th IEEE international conference on electronics, circuits and systems, 2000. ICECS 2000 (Vol. 1, pp. 290–293).
Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2, 345–351.
Mitra, Y. V., Rao, S., & Prasanna, S. R. M. (2006). A new image encryption approach using combinational permutation techniques. International Journal of Computer Science, 1, 127–131.
Prasanna, S. R. M., Rao, Y. V. S., & Mitra, A. (2006). An image encryption method with magnitude and phase manipulation using carrier images. International Journal of Computer Science, 1, 132–137.
Wang, X., Zhao, D., & Chen, L. (2006). Image encryption based on extended fractional Fourier transform and digital holography technique. Optics Communications, 260, 449–453.
Acharya, T., & Ray, A. K. (2005). Digital image processing algorithms and applications. New York: Wiley.
Gonzalez, A., Woods, A., & Eddins, A. (2004). Digital image processing using MATLAB (1st edn.). Knoxville: Gatesmark.
Alligood, K. T., Sauer, T., & Yorke, J. A. (1996). CHAOS: an introduction to dynamical systems. Berlin: Springer.
Cristea, B., Cehan, C., Serbanescu, A., & Grecu, D. (2002). Applications of chaos theory in cryptography. In International conference METRA2002, Bucharest, Romania.
Rincu, C. I., Iana, V. G., Serban, G., & Tutanescu, I. (2007). Hardware implementation of a tent map-based chaotic generator. In ELECO’2007 5’th international conference on electrical and electronics engineering, Bursa, Turkey.
Schuster, H. G., & Just, W. (2005). Deterministic chaos: an introduction (4th edn.). Weinheim: Wiley-VCH.
Asim, M., & Jeoti, V. (2007). On image encryption: comparison between AES and a novel chaotic encryption scheme. In International conference on signal processing, communications and networking, 2007. ICSCN ’07 (pp. 65–69).
Rijndael (2001). Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197.
Kwok, H. S., & Tang, W. K. S. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals, 32, 1518–1529.
Alvarez, G., & Li, S. J. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16, 2129–2151.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Etemadi Borujeni, S., Eshghi, M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52, 525–537 (2013). https://doi.org/10.1007/s11235-011-9458-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9458-8