13 February 2013 Secure transmission of images based on chaotic systems and cipher block chaining
Mahdieh Karimi Lakhani, Hamid Behnam, Arash Karimi
Author Affiliations +
Abstract
The ever-growing penetration of communication networks, digital and Internet technologies in our everyday lives has the transmission of text data, as well as multimedia data such as images and videos, possible. Digital images have a vast usage in a number of applications, including medicine and providing security authentication, for example. This applicability becomes evident when images, such as walking or people’s facial features, are utilized in their identification. Considering the required security level and the properties of images, different algorithms may be used. After key generation using logistic chaos signals, a scrambling function is utilized for image agitation in both horizontal and vertical axes, and then a block-chaining mode of operation may be applied to encrypt the resultant image. The results demonstrate that using the proposed method drastically degrades the correlation between the image components and also the entropy is increased to an acceptable level. Therefore, the image will become greatly resistant to differential attacks. However, the increasing scrambling rounds and the decreasing number of bits of the blocks result in increasing the entropy and decreasing the correlation.
© 2013 SPIE and IS&T 0091-3286/2013/$25.00 © 2013 SPIE and IS&T
Mahdieh Karimi Lakhani, Hamid Behnam, and Arash Karimi "Secure transmission of images based on chaotic systems and cipher block chaining," Journal of Electronic Imaging 22(1), 013025 (13 February 2013). https://doi.org/10.1117/1.JEI.22.1.013025
Published: 13 February 2013
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Complex systems

Data communications

Chaos

Computer security

Algorithm development

Digital watermarking

RELATED CONTENT

Video frames encryption based on DNA sequences and chaos
Proceedings of SPIE (August 14 2019)
Chaotic encryption scheme for real-time digital video
Proceedings of SPIE (February 27 2002)
Cryptography based on spatial chaotic system
Proceedings of SPIE (August 20 2010)
Collusion issue in video watermarking
Proceedings of SPIE (March 21 2005)

Back to Top