A new chaotic algorithm for image encryption

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
1 Chaotic Generator in Digital Secure Communication 張 書 銘 交通大學應用數學系 2008 年 12 月 20 日.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Lightweight Mutual Authentication for IoT and Its Applications
Palette Partition Based Data Hiding for Color Images
Der-Chyuan Lou and Jiang-Lung Liu,
Efficient password authenticated key agreement using smart cards
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Efficient Time-Bound Hierarchical Key Assignment Scheme
Lossy Compression of DNA Microarray Images
Image camouflage by reversible image transformation
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
Separable and error-free reversible data hiding in encrypted images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Improved joint reversible data hiding in encrypted images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Reporter :Liang, Min-Chen Date :2003/05/06
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source: Pattern Recognition Letters 29 (2008)
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Secret Image Sharing Based on Encrypted Pixels
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
A Fast No Search Fractal Image Coding Method
Sourse: Information Sciences, Vol. 494, pp , August 2019
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

A new chaotic algorithm for image encryption Authors: Haojiang Gao, Yisheng Zhang, Shuyun Liang, Dequn Li Source: Chaos, Solitons & Fractals, Volume 29, Issue 2, July 2006, pp. 393-399 Speaker: Chia-Hsuan Lin Date: 2006/7/13

Outline Introduction Proposed scheme Experimental results Conclusions

Introduction Encryption Decryption Lena encrypted image

Flowchart Secret key XOR and Output many times of NCA map 5 pixels encrypted image 5 pixels of Lena

Logistic map

NCA (New Chaotic Algorithm) tangent function power function Iteration property of the NCA map

NCA map Satisfy λ may be defined as (experimental analysis) NCA map

Encryption algorithm(1/2) Block diagram of the chaotic encryption algorithm

Encryption algorithm(2/2) Secret key (x0 ,α,β)=(0.987654321012345, 1.1, 5) 987 mod 256=219, 654 mod 256=142, 321 mod 256=65, 012 mod 256=12, 345 mod 256=89 5 pixels 200 210 220 225 230 XOR 219 142 65 12 89 5 pixels 19 92 157 237 191

Experimental results(1/2)

Experimental results(2/2) Encryption Decryption with wrong key

Conclusions The encryption algorithm is secure.

Logistic map X0 0.3 X1 0.839979 X2 0.537643 X3 0.996915 X4 0.012301 X5 0.048957 X6 0.095869 X7 0.346703 Initial value X0 , 0< X0 <1

Tangent function