28 April 2021 Efficient chaos-based image encryption approach for secure communication
Gokhan Atali, Eyup Sonmez
Author Affiliations +
Abstract

Recently, data hiding and encryption methods have been very important for transmitting information to the relevant people correctly and reliably. Although each newly developed computer-aided data hiding and encryption method is stronger than previous methods, there may be security gaps or speed factors in future use. Therefore, faster and more secure encryption methods are needed. Chaotic systems can be used for high-performance random number generators because their frequency spectrum is wide. Moreover, they show extreme sensitivity to the initial conditions and eliminate the need for large sized keying. This means that a faster and more secure encryption can be made with random numbers generated from a chaotic system. All of these features make chaotic systems stand out in data hiding and encryption applications. Chaos-based image encryption and decryption applications were performed differently than in traditional encryption algorithms in the literature. For the application, a three-dimensional chaotic system was discretized by the Runge–Kutta-4 method, and random numbers were generated. These random numbers were tested by the statistical NIST-800-22 tests, the international top random standard, and their suitability was determined. With the random numbers that passed the tests successfully, the image was successfully encrypted and sent via e-mail; then the encrypted image was decrypted back to the original image by the receiver. Finally, an electronic circuit realization of the chaotic encryption approach was depicted using LabVIEW to confirm the operability of the application.

© 2021 SPIE and IS&T 1017-9909/2021/$28.00© 2021 SPIE and IS&T
Gokhan Atali and Eyup Sonmez "Efficient chaos-based image encryption approach for secure communication," Journal of Electronic Imaging 30(2), 023026 (28 April 2021). https://doi.org/10.1117/1.JEI.30.2.023026
Received: 31 August 2020; Accepted: 12 April 2021; Published: 28 April 2021
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Image processing

Complex systems

Image quality

Binary data

Computer security

Statistical analysis

RELATED CONTENT

Image encryption using the Sudoku matrix
Proceedings of SPIE (April 28 2010)
Joint reversible data hiding and image encryption
Proceedings of SPIE (January 27 2010)

Back to Top