A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach

  • PDF / 2,987,698 Bytes
  • 25 Pages / 439.37 x 666.142 pts Page_size
  • 96 Downloads / 233 Views

DOWNLOAD

REPORT


A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach Vijay Kumar 1

& Ashish Girdhar

2

Received: 31 December 2019 / Revised: 21 July 2020 / Accepted: 9 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

This paper presents a novel color image encryption approach. The proposed approach utilizes the basic concepts of DNA cryptography along with Lorenz and Rossler chaotic system and 2D logistic map. The proposed approach encrypts RGB images using DNA cryptography techniques. In diffusion phase, at pixel level Lorenz and Rossler chaotic system is used to encrypt the three channels of test images. Afterwards, at bit level 2D logistic map is used for performing bitwise chaotic ponytail process on these diffused Red, Green, and Blue channels in confusion phase. Simulation of the proposed approach on test images reveals that the color images have been encrypted very efficiently. Keywords 2D logistic map . DNA crypto system . Image encryption . Lorenz Rossler chaotic system

1 Introduction Information security has become indispensable ever since the Internet crept into our lives. With almost anything and everything available to everyone on the planet after making a few clicks, safeguarding confidential information present over the Internet is crucial. One way of securing information is hiding it inside a harmless looking cover file which can be a naïve 3D object [16]. This is termed as information hiding [24]. Another way is conversion of the image into some incomprehensible form so that it seems some random noisy image. This process is known as image encryption. Image encryption has been a matter of interest for researchers across the world for quite some time. The conventional encryption techniques like DES and RSA are

* Vijay Kumar [email protected]

1

Computer Science and Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh, India

2

Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, Punjab, India

Multimedia Tools and Applications

unfit for image encryption [37]. Hence, need to develop novel image encryption algorithms arises. Image encryption process consists of two phases namely permutation and substitution. In permutation, the pixel values of plain image are interchanged. No new pixel values are generated in this phase. But in case of substitution, new pixel values are generated. Depending upon the substitution algorithm, these values are altered. These phases require the use of a mask generated from random systems to increase the randomness in the plain image. Generally, permutation operation is performed first on plain image. Then, substitution operation is done on the permuted image. The main objective of image encryption algorithm is to enhance image entropy and decrease correlation among pixels. Image entropy value indicates randomness of pixels in image. Thus a larger value of image entropy in an encrypted image is desirable. The corre