Full Paper View Go Back

Image Encryption using Linear Cryptanalysis and different Fuzzy operations

Dipankar Dey1

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.4 , pp.1-8, Aug-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i4.18


Online published on Aug 31, 2018


Copyright © Dipankar Dey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dipankar Dey, “Image Encryption using Linear Cryptanalysis and different Fuzzy operations,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.1-8, 2018.

MLA Style Citation: Dipankar Dey "Image Encryption using Linear Cryptanalysis and different Fuzzy operations." International Journal of Scientific Research in Computer Science and Engineering 6.4 (2018): 1-8.

APA Style Citation: Dipankar Dey, (2018). Image Encryption using Linear Cryptanalysis and different Fuzzy operations. International Journal of Scientific Research in Computer Science and Engineering, 6(4), 1-8.

BibTex Style Citation:
@article{Dey_2018,
author = {Dipankar Dey},
title = {Image Encryption using Linear Cryptanalysis and different Fuzzy operations},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {4},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {1-8},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=778},
doi = {https://doi.org/10.26438/ijcse/v6i4.18}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.18}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=778
TI - Image Encryption using Linear Cryptanalysis and different Fuzzy operations
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Dipankar Dey
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 1-8
IS - 4
VL - 6
SN - 2347-2693
ER -

678 Views    863 Downloads    184 Downloads
  
  

Abstract :
Nowadays, the security of digital image is one of the most essential terms. In this article, a piecewise linear chaotic map based image encryption has been proposed. For implementation protection from different types of attacks, the Linear Cryptanalysis system is applied to encrypt the image. The irreducible polynomial is implemented to design the confusion - diffusion architecture that scrambles the pixel position of the image. To alter pixel intensity, the Fuzzy operations have been applied which makes the scheme more secure. The proposed encryption scheme is applied to resist some cryptanalysis method such as plaintext or cipher text attacks. The different theoretical and statistical analysis shows that the scheme has high -level security. The two main statistical factors, the number of pixel change rate and the information entropy, gives the better result in this article.

Key-Words / Index Term :
Encryption, PWLC map, irreducible polynomial, Fuzzy operations, Linear Cryptanalysis

References :
[1] Thang Manh Hoang and Hoang Xuan Thanh, “Cryptanalysis and security improvement for a symmetric color image encryption algorithm”, Optik International Journal for Light and Electron Optics, Vol. 155, pp. 366-383, 2018.
[2] David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez, Wolfgang A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm”, Chaos, Solitons and Fractals, Vol. 41, pp. 2613-2616, 2009.
[3] G. Alvarez, Shujun Li, “Cryptanalyzing a nonlinear chaotic algorithm NCA) for image encryption”, Commun Nonlinear Sci Numer Simulat, Vol. 14, pp. 3743-3749, 2009.
[4] https://en.wikipedia.org/wiki/Irreducible polynomial
[5] Chao-Lin Kuo, Lung-Chuan Huang, Shun-Jih Wang, Jui-Sheng Lin, Cheng-Chi Wang and Jun-Juh Yan, “Image Encryption Based on Fuzzy Synchronization of Chaos Systems”, IEEE 37th Annual Computer Software and Applications Conference, Vol. 23, pp. 153-154, 2013.
[6] Hinal M. Mudia and P. V. Chavan, “Fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme-review”, International Conference on Advances in Computer Engineering and Applications, Vol. 10, pp. 404 - 408, 2015.
[7] Xingyuan Wang and Dahai Xu, “A novel image encryption scheme using chaos and Langtons Ant cellular automaton”, Nonlinear Dynamics, Vol. 79, pp. 2449-2456, 2015.
[8] M. Ghebleh, A. Kanso and D. Stevanovic, “A novel image encryption algolorithm based on piecewise linear chaotic maps and least squares approximation”, Springer Science+Business Media New York, Vol. 77, pp. 7305-7326, 2018.
[9] Wun-She Yap, Raphael C.-W. Phan, Wei-Chuen Yau and Swee-Huay Heng, “Cryptanalysis of a new image alternate encryption algorithm based on chaotic map”, Nonlinear Dynamics, Vol. 80, pp. 483-1491, 2015.
[10] Eun-Jun Yoon and Kee-YoungYoo, “Cryptanalysis of a modulo image encryption scheme with fractal keys”, Optics and Lasers in Engineering, Vol. 48, pp. 821826, 2010.
[11] Xiao Jun Tong, ZhuWang , Miao Zhang , Yang Liu , Hui Xu and Jing Ma, “An image encryption algorithm based on the perturbed high-dimensional chaotic map”, Nonlinear Dynamics, Vol. 80, No. 3, pp. 1493-1508, 2015.
[12] X. Deng and W. Wen, “Optical multiple-image encryption based on fully phase encoding and interference”, Optik-International Journal for Light and Electron Optics, Vol. 126(21), pp. 3210-3214, 2015.
[13] N.K.Pareek, VinodPatidar and K.K.Sud, “Image encryption using chaotic logistic map”, Image and Vision Computing, Vol. 24, pp. 926-934 ,2006.
[14] Kwok-Wo Wong, “Image Encryption Using Chaotic Maps”, Intelligent Computing Based on Chaos, Vol. 184, pp. 333-354, 2009.
[15] Yasaman Hashemi, “Design a new image encryption using fuzzy integral permutation with coupled chaotic maps”, International Journal of Research in Computer Science, Vol. 3, pp. 27- 34, 2013.
[16] Jun-xin Chen Zhi-liang Zhu, Chong Fu and Hai Yu, “Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation