Regular Articles

Secure transmission of images based on chaotic systems and cipher block chaining

[+] Author Affiliations
Mahdieh Karimi Lakhani

Iran University of Science and Technology, Department of Electrical Engineering, Tehran, Iran

Hamid Behnam

Iran University of Science and Technology, Department of Electrical Engineering, Tehran, Iran

Arash Karimi

Iran University of Science and Technology, Department of Electrical Engineering, Tehran, Iran

J. Electron. Imaging. 22(1), 013025 (Feb 13, 2013). doi:10.1117/1.JEI.22.1.013025
History: Received November 13, 2012; Revised January 16, 2013; Accepted January 28, 2013
Text Size: A A A

Abstract.  The ever-growing penetration of communication networks, digital and Internet technologies in our everyday lives has the transmission of text data, as well as multimedia data such as images and videos, possible. Digital images have a vast usage in a number of applications, including medicine and providing security authentication, for example. This applicability becomes evident when images, such as walking or people’s facial features, are utilized in their identification. Considering the required security level and the properties of images, different algorithms may be used. After key generation using logistic chaos signals, a scrambling function is utilized for image agitation in both horizontal and vertical axes, and then a block-chaining mode of operation may be applied to encrypt the resultant image. The results demonstrate that using the proposed method drastically degrades the correlation between the image components and also the entropy is increased to an acceptable level. Therefore, the image will become greatly resistant to differential attacks. However, the increasing scrambling rounds and the decreasing number of bits of the blocks result in increasing the entropy and decreasing the correlation.

Figures in this Article
© 2013 SPIE and IS&T

Citation

Mahdieh Karimi Lakhani ; Hamid Behnam and Arash Karimi
"Secure transmission of images based on chaotic systems and cipher block chaining", J. Electron. Imaging. 22(1), 013025 (Feb 13, 2013). ; http://dx.doi.org/10.1117/1.JEI.22.1.013025


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.