Advanced SearchSearch Tips
An Efficient Image Encryption Scheme Based on Quintuple Encryption Using Gumowski-Mira and Tent Maps
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : International Journal of Contents
  • Volume 11, Issue 4,  2015, pp.56-69
  • Publisher : The Korea Contents Association
  • DOI : 10.5392/IJoC.2015.11.4.056
 Title & Authors
An Efficient Image Encryption Scheme Based on Quintuple Encryption Using Gumowski-Mira and Tent Maps
Hanchinamani, Gururaj; Kulkarni, Linganagouda;
  PDF(new window)
This paper proposes an efficient image encryption scheme based on quintuple encryption using two chaotic maps. The encryption process is realized with quintuple encryption by calling the encrypt(E) and decrypt(D) functions five times with five different keys in the form EDEEE. The decryption process is accomplished in the reverse direction by invoking the encrypt and decrypt functions in the form DDDED. The keys for the quintuple encryption/decryption processes are generated by using a Tent map. The chaotic values for the encrypt/decrypt operations are generated by using a Gumowski-Mira map. The encrypt function E is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage scrambles all the rows and columns to chaotically generated positions. This stage reduces the correlation radically among the neighboring pixels. The pixel value rotation stage circularly rotates all the pixels either left or right, and the amount of rotation is based on chaotic values. The last stage performs the diffusion four times by scanning the image in four different directions: Horizontally, Vertically, Principal diagonally and Secondary diagonally. Each of the four diffusion steps performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. This stage ensures the resistance against the differential attacks. The security and performance of the proposed method is investigated thoroughly by using key space, statistical, differential, entropy and performance analysis. The experimental results confirm that the proposed scheme is computationally fast with security intact.
Quintuple Encryption;Gumowski-Mira map;Tent Map;Statistical Attacks;Differential Attacks;
 Cited by
Guodong Ye and Kwok Wo Wong, “An efficient chaotic image encryption algorithm based on a generalized Arnold map,” Nonlinear Dynamics, vol. 69, no. 4, 2012, pp. 2079-2087. crossref(new window)

Ahmed A. Abd El-Latif, Li Li, Tiejun Zhang, Ning Wang, Xianhua Song, and Xiamu Niu, “Digital image encryption scheme based on multiple chaotic systems,” Sensing and Imaging, vol. 13, no. 2, 2012, pp. 67-88. crossref(new window)

Shatheesh Sam, P. Devaraj, and R. S. Bhuvaneswaran, "A novel image cipher based on mixed transformed logistic maps," Multimedia Tools and Applications, vol. 56, no. 2, 2012, pp. 315-330. crossref(new window)

M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Processing: Image Communications, vol. 27, no. 3, 2012, pp. 249-259. crossref(new window)

Nidhi Taneja, Balasubramanian Raman, Indra Gupta, “Combinational domain encryption for still visual data,” Multimedia Tools and Applications, vol. 159, no. 3, 2012, pp. 775-793. crossref(new window)

Shantheesh Sam, P. Devaraj, and R. S. Bhuvaneswaran, “An intertwining chaotic maps based image encryption scheme,” Nonlinear Dynamics, vol. 69, no. 4, 2012, pp. 1995-2007. crossref(new window)

Xiaoling Huang, “Image encryption algorithm using chaotic Chebyshev generator,” Nonlinear Dynamics, vol. 67, no. 4, 2012, pp. 2411-2417. crossref(new window)

Xiaofeng Liao, Shiyue Lai, and Qing Zhou, “A novel image encryption algorithm based on self-adaptive wave transmission,” Signal processing, vol. 90, no. 9, 2010, pp. 2714-2722. crossref(new window)

Guanrong Chen, Yaobin Mao, and Charles K. Chui’ “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos solitons and fractals, vol. 21 no. 3, 2004, pp. 749-761. crossref(new window)

Lequan Min and Guanrong Chen, “A novel stream encryption scheme with avalanche effect,” The European Physical Journal B, vol. 86, 2013, p. 459. crossref(new window)

D. Chattopadhyay, M. K. Mandal, and D. Nandi, “Symmetric key chaotic image encryption using circle map,” Indian Journal of Science and Technology, vol. 4, 2010, pp. 593-599.

A Akhshani, S Behnia, A Akhavan, H Abu Hassan, and Z Hassan, “A novel scheme for image encryption based on 2D piecewise chaotic maps,” Optics Communications, vol. 283, no. 17, 2010, pp. 3259-3266. crossref(new window)

Guodong Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, 2010, pp. 347-354. crossref(new window)

Gonzalo Alvarez and Shujun Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, 2006, pp. 2129-2151. crossref(new window)

V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution diffusion based image cipher using chaotic standard and Logistic maps,” Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 7, 2009, pp. 3056-3075. crossref(new window)

N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic Logistic map,” Image Vision and Computing, vol. 24, no. 9, 2006, pp. 926-934. crossref(new window)

Bruce schneier, “Applied cryptography,” John Wiley & sons, 2001.