A Multi-chaotic Fibonacci Algorithm for Digital Image Encryption

Actually, images are widely used in various real applications, such as Internet communication, multimedia systems, medical imaging, telemedicine, monitoring, and military communication, so their security is becoming very important. Basically, encryption i

  • PDF / 550,676 Bytes
  • 7 Pages / 439.37 x 666.142 pts Page_size
  • 25 Downloads / 227 Views

DOWNLOAD

REPORT


Abstract. Actually, images are widely used in various real applications, such as Internet communication, multimedia systems, medical imaging, telemedicine, monitoring, and military communication, so their security is becoming very important. Basically, encryption is one of the best alternative way to ensure information security. In this research work, we propose a hybrid encryption algorithm for the digital grayscale image. The developed approach is based on the combination of Fibonacci sequence with the chaotic logistic map to create the secret key in order to improve encryption quality. Numerical results using a set of image benchmarks have shown the capability of the proposed encryption model to produce a better image security compared to results given by some other recently literature works. Keywords: Internet communication  Security Fibonacci sequence  Chaotic logistic map



Encryption algorithm



1 Introduction Nowadays, the transmission of digital images over the Internet and wireless networks is in full effervescence development, due to the rapid developments in digital image processing and network communications fields. It needs serious protection of the communicated image information against illegal usage, especially for those requiring reliable, fast and robust secure systems to store and transmit, such as military image databases, confidential video conference, medical imaging system, online private photograph album, and so on [1]. Image encryption process try to convert original image to another image that is hard to understand by unauthorized people; to keep the image confidential between users, it is essential that nobody could get to know the content without a key for decryption [2]. Furthermore, a user can retrieve the initial image by applying a decryption method on the cipher image, which is usually a reverse execution of the encryption procedure [3]. Most traditional encryption techniques, such as Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (AES), Linear Feedback Shift Register (LFSR), etc. [4, 5] with high computational security consider plaintext as either block cipher or data stream and are not suitable for image/video encryption in real time for some reasons. Firstly, image data have high redundancy and strong correlation among image pixels. Secondly, they have usually a huge data volume. and strong correlation among image pixels. The implementation of © Springer Nature Switzerland AG 2019 Y. Farhaoui and L. Moussaid (Eds.): ICBDSDE 2018, SBD 53, pp. 169–175, 2019. https://doi.org/10.1007/978-3-030-12048-1_18

170

L. Chaabane

traditional algorithms for image encryption is even more complicated when they are realized by software. Therefore, these well known encryption algorithms are suitable for textual data not for multimedia data [6]. In this research work we aim to present a novel encryption method to enhance the image security. The developed approach consists in hiding the plain image bits with the bits of the pseudo-ran