Abstract
The traditional image encryption schemes, implementing fully layered encryption, seem to be undesirable in situations where there exists high data rate with limited bandwidth. A fully layered image encryption scheme first scrambles the image (to destroy the high correlation between neighbouring pixels) then encrypts it, resulting in a high computational overhead. In recent times, partial or selective encryption schemes are gaining popularity especially in situations demanding constrained communication such as mobile communications with limited computational power. In this paper, the performance of a chaos based partial image encryption scheme is evaluated in terms of a set of evaluation criteria. Exhaustive experimental simulation is performed to analyse the efficacy of the encryption scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shannon, C.E.: Communication theory of secrecy systems, Declassified Report (1946)
Som, S., Kotal, A., Mitra, A., Palit, S., Chaudhuri, B.B.: A chaos based partial image encryption scheme. In: Proceedings of IEEE International Conference on ICBIM 2014 (2014)
Box, G.E.P., Jenkins, G.M., Reinsel, G.C.: Time Series Analysis: Forecasting and Control, 3rd edn. Prentice-Hall, Upper Saddle River, NJ (1994)
Pareek, N.K., Patidar, V., Sud, K.K.: A random bit generator using chaotic maps. Int. J. Netw. Secur. 10(1), 32–38 (2010)
Massoudi, A., Lefebvre, F., Vleeschouwer, C., Macq, B., Quisquarter, J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Secur. (2008)
University of Southern California, Signal and Image Processing Laboratory. http://sipi.usc.edu/database. Accessed 12 Jan 2013
Computer Vision Group, University of Granada. http://decsai.ugr.es/cvg. Accessed 12 Jan 2013
Jolfaei, A., Mirghadri, A.: Image encryption using chaos and block cipher. Comput. Inf. Sci. 4(1), 172–185 (2011)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Chen, G., Mao, Y., Chui, C.K.: A symmetric encryption scheme based on 3D chaotic map. Chaos Solitons Fract. 21, 749–761 (2004)
Mitra, A., Palit, S., Chaudhuri, B.B., Kundu, S., Pathak, S., Datta, R.: A new partial image encryption method for secure multimedia communication. In: Proceedings of Workshop on Mobile Systems (WoMS), WBUT, Kolkata (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Som, S., Palit, S., Dey, K. (2017). Evaluating the Performance of a Chaos Based Partial Image Encryption Scheme. In: Chaki, R., Saeed, K., Cortesi, A., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 567. Springer, Singapore. https://doi.org/10.1007/978-981-10-3409-1_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-3409-1_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3408-4
Online ISBN: 978-981-10-3409-1
eBook Packages: EngineeringEngineering (R0)